Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Import IP Address with IP Address Management (IPAM) into Windows Server 2012

How do I import IP addresses using IPAM into Windows Server 2012?

The IP Address Management (IPAM) client in Server Manager allows you to manually add and edit IP addresses, but if you have been recording IP address utilization in a spreadsheet, you will probably want to try and import that data into IPAM. In this article, I’ll show you how to format IP address information in a file correctly to import bulk IP addresses into Windows Server 2012 using IPAM.

Format the Import File

IPAM is poorly documented in my opinion, making a useful feature harder to use and understand than it should be. Importing data into IPAM is very simple once you know how. Let’s start by looking at what information about IP addresses we can actually import. To do this, log on to your IPAM server and open Server Manager:

  • Click IPAM in far left pane of Server Manager.
  • In the IPAM client, select IP Address Blocks under IP ADDRESS SPACE, and make sure that Current view is set to IP Addresses in the drop-down menu.
  • If you look along the top the window, you will see the IP address fields listed along the top, such as IP Address and IP Address State. You can add or remove fields by right-clicking on one of the existing fields.

IP Address Management (IPAM): IP address fields

If you want to import IP Address and Assignment Type information, you need to add these fields to the first line of your import file, without spaces, as shown below:

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.


Alternatively, you can keep the spaces in the field names and enclose with quotation marks, for example, “IP Address” and “IP Address State”. The actual IP address data should then follow, comma delimited in the same order that you specified the fields as shown above.

Some fields, such as IP Address State, will require you to look and see what the valid input options are. To find out what the possible options are:

  • Click Tasks in the far right corner of the IPAM client and select Add IP Address from the menu.
  • In the Add IP Address window, select the drop-down menu by the side of the field to see the possible options. For instance, the IP Address State field can be set to In-Use, Inactive or Reserved.

Import IP addresses

Once you’ve decided what information to import and formatted it correctly in a comma delimited file (.csv), you’re ready to import the IP addresses into IPAM:

  • Make sure that IP Address Blocks is still selected in IPAM under IP Address Space.
  • Select Import IP Addresses from the Tasks menu on the far right of the IPAM client.
  • In the open file dialog, select your .csv file of IP addresses and click Open.
  • When the import process has completed, click OK in the Import IP Addresses dialog.

Once the IP addresses have been imported, they should appear in the main window if the current view is set to IP Addresses.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

IT consultant, Contributing Editor @PetriFeed, and trainer @Pluralsight. All about Microsoft, Office 365, Azure, and Windows Server.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: