Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Size: px
Start display at page:

Download "Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices."

Transcription

1

2 About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes, from small corporate LANs to large enterprises or highly distributed environments. You can install and configure Foglight NMS in minutes, which will then automatically start discovering system resources and their metrics, including hardware, operating systems, virtualization, databases, middleware, applications and services. Key features of the product include: Monitoring applications where you can view the performance of an application and identify issues which may help you prevent an application from failing. Dashboards that you can manage and customize to display information about your sites' networks, such CPU load, memory, disk space utilization, network interface traffic, network latency, and packet loss. Analyzing network traffic to identify patterns and usage, which will allow you to determine how traffic impacts the overall health of a network through real-time packet capture. Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices. Creating alerts and notifications that automatically notify you when there is a network performance issue, allowing you to resolve it before it impacts your sites' networks. Creating custom SNMP monitors to provide complete SNMP (Simple Network Management Protocol) coverage on any network by defining a SNMP OID to monitor a SNMP device regardless of the manufacturer or type of device.

3 What's New in Foglight NMS Version 6.0 These features are new to Foglight NMS in this release. Global Policies A policy defines how you work with the information collected from your devices. Global Policies work very similar to local policies with a few exceptions. With global policies you can: view all policies across a site and change any setting on an individual device without applying that change to all the devices in the policy. For more information on the new Global Policies feature, see Overview of Global Policies. Creating Custom Reports Any data that PacketTrap collects from the devices in the network can be shown in a report. Using the custom reports feature, you can determine what type of data to show and how to organize it in the report. After you create a custom report, you can generate it, schedule it, send a PDF or HTML version of the report by , and export it from Foglight NMS to any location. For more information on the new Custom Reports feature, see Creating Custom Reports.

4 Finding Information Topics in this section Viewing Online Documentation Contacting Support

5 Viewing Online Documentation There are a variety of documents available online to help you get the most out of your Foglight products, as well as an online version of this help. You can view the following Foglight NMS documents online: Foglight NMS Integration User's Guide. Go to https://support.quest.com/ to view this guide. API User's Guide Go to https://support.quest.com/ to view this guide.

6 Contacting Support Support for Foglight NMS is available to sites who have a trial version of Foglight NMS or who have purchased Foglight NMS. Visit the Foglight NMS support site at From the Support page, click the Case Management link. You must create an account or sign in to your account to enter a support case. From the Support page, you can retrieve solutions from the online Knowledgebase or contact a technical support representative for more information. You can also contact support in the following ways: In the Foglight NMS Studio: Click Technical Support in the Help drop-down menu. Phone: (949) , press option 1 or (800) When you send an to the Support team, it is recommended that you include "Foglight Network Management System" in the subject line along with a brief description of the issue or question. You should include as many details as possible about the issue, including your contact information, and any other relevant details in the body of the . Quest Support will create a support ticket and you will receive an about your case. If you are updating a support case or ticket, you should include the following string in the subject line of your "CaseID:8xxxx" where "8xxxx" is your case number that you wish to update. Keep in mind the string is case sensitive (capital C, I, and D) and there are no spaces. If you follow the syntax protocol, the case will be updated and the support representative will receive an with your update.

7 Setting Up Your Product Topics in this section How to Set Up Foglight NMS System Requirements Adding sites Adding Groups Enabling Devices for Monitoring Running Network Discovery

8 How to Set Up Foglight NMS There are a couple of factors that you must keep in mind when setting up your product: It is recommended that you assign a public DNS to your product platform server instead of using an IP address. Make sure you open the correct outbound and inbound firewall ports. For more information, click here. The following diagram shows how your product monitors and collects data from your devices and sends it to your product platform server.

9 See Also System Requirements Enabling Devices for Monitoring

10 System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the minimum system requirements. Topics in this section Things to Consider Before You Install Foglight NMS Host Server Hardware and Software System Requirements Device and Collection Agent System Requirements Foglight NMS Studio System Requirements SQL Server System Requirements Installing Foglight NMS on a Virtual Machine

11 Things to Consider Before You Install Foglight NMS When you apply Smart Policy assignments to install Foglight NMS with the default monitor settings, this basic type of installation will perform well on a Dual-Core system with 4 GB of RAM. If you adjust the policies to monitor larger networks or use the Network Traffic Flow module, you need to consider which hardware and system configuration you plan to use. As shown in the tables in the following sections, the minimum system requirements are dependent upon the number of devices that you are monitoring. You must consider the following scalability issues before installing Foglight NMS: Number of monitored devices: If you monitor 500 or more devices, you may need to do some performance tuning on your system. Amount of data collected for each device: If you increase the number of monitors on a device, a spike in the amount of data collected will occur. Changing the default time intervals: If you set a time interval to collect data every five minutes, using a high performance server is recommended to complete the data collection in an efficient and timely manner. Number of Studio connections: A large number of Studio connections simultaneously accessing the system will impact performance. To optimize performance when collecting traffic analysis data, it is recommended that you use a dedicated high performance server when the following conditions exist: You configure the application to collect Traffic Flow data from multiple routers or switches. There exists a large amount of traffic conversations. You set up the application to monitor more than 500 devices.

12 Host Server Hardware and Software System Requirements See the following table for the minimum hardware and software system requirements for your host server. When you download a trial version of Foglight NMS, the application comes with an optimized version of SQL CE installed. This optimized version of SQL CE works when you are trying out Foglight NMS or loading device count installations. However; in your production environment, you must install SQL server Standard or Enterprise Edition. NOTE: The following minimum requirements apply when you install the default configuration. Significantly increasing the device monitoring intervals and network traffic collection may cause an additional load on the server, which may require you to increase your RAM and upgrade your CPU power. Host Server System Requirements Operating System For 32-bit or 64-bit: Microsoft Windows 2003 SP2 or later Microsoft Windows 2008 Server CPU Memory Hard Drive Space.Net Framework Firewall Exceptions - Allowed Programs Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as netflow, syslog, and windows event logs. 50 GB NOTE: You will need a minimum of 3 GB of free space to install the SNMP MIB Library. NOTE: You will need to increase your hard drive space based on the retention settings. 2.0 or higher Version 3.5..NET Framework 3.5 SP1 (Recommended) The following are automatically configured during installation:

13 Host Server System Requirements ptserverservice ptserverconfig ptagentservice ptagentconfig ptstudio Ports The following are the firewall rules for inbound connections: 5053 (TCP) = (128 AES Encrypted Host Server port) 5054 (TCP) = Agent deployment CAB file downloads 5055 (TCP) = (Encrypted Remote Control Tunnel port) 61 (UDP) SNMP Trap collector 69 (UDP) - TFTP Server 514 (UDP) - Syslog collector 2055 (UDP) NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 9995 (UDP) NetFlow Alternative port #3 collector

14 Device and Collection Agent System Requirements See the following table for the minimum hardware and software system requirements for your host server in order to deploy device and collection agents on it. NOTE: When you install a collection agent on Microsoft Windows XP or Microsoft Vista, the limited TCP connections available with these operating systems may impact the monitoring performance. It is recommended that you use Windows Server 2003 or Windows Server 2008 when possible. System Requirements for Device and Collection Agents Operating System For 32-bit or 64-bit: Windows Server 2003 SP2 or later Windows Server 2008 Windows XP SP2 or later Windows Vista SP1 (all versions) Microsoft Windows 7 Ubuntu Server 8 Fedora release 10 Debian 4.0 OpenSuse 11.0 Apple Mac OS X NOTE: Windows Server 2003 or Windows Server 2008 is required if you are collecting Syslog, NetFlow, ad SNMP Traps data..net Framework Ports 2.0 or higher Version 3.5..NET Framework 3.5 SP1 (Recommended) The following are the firewall rules for Outbound connections: 5053 (TCP) = (128 AES Encrypted Host Server port) 5054 (TCP) = Agent deployment CAB file downloads

15 System Requirements for Device and Collection Agents 5055 (TCP) = (Encrypted Remote Control Tunnel port)

16 Foglight NMS Studio System Requirements You can use the following operating systems and browsers to run the web version of the Foglight NMS Studio. Microsoft Windows (all versions) Microsoft Internet Explorer 6 or later Mozilla Firefox 3.6 Google Chrome

17 SQL Server System Requirements See the following table for the minimum SQL Server system requirements. When you download a trial version of Foglight NMS, the application comes with an optimized version of SQL CE installed. This optimized version of SQL CE works when you are trying out Foglight NMS or loading device count installations. However; in your production environment, you must install SQL server Standard or Enterprise Edition. System Requirements for SQL Server Database For 32-bit or 64-bit: Microsoft SQL Server 2005 Standard or Enterprise Editions Windows Server 2008 Standard or Enterprise CPU Memory Dual Core, 3.0 GHz or higher (Recommended) 4 GB RAM NOTE: You will need to increase the amount of memory based on the high-volume data that you are collecting, such as Net- Flow, syslog, and windows event logs. Hard Drive Space Additional Hardware Requirements for SQL Server If you choose to run SQL Server on a separate machine from your Foglight NMS server, the following requirements apply: You must install SQL server on a physical machine. You must have a minimum of 32 GB of RAM. You must use SQL authentication instead of windows authentication.

18 If your machine is collecting traffic and log data, the following minimum system requirements apply: Additional Requirements Operating System Perspective Agent Service Perspective Service Additional RAM per Netflow Device(s) Additional RAM per Netflow Device(s) 2 GB 1 GB 1 GB NoOfFlowDevices * 300MB 1 GB

19 Installing Foglight NMS on a Virtual Machine Because of intense I/O requirements and a high threshold of additional hardware specifications, installing Foglight NMS on a virtual machine in a production environment is not recommend. You should install Foglight NMS in a testing environment to ensure that you and your colleagues and sites have the best user experience possible. The following items are the minimum hardware and software system requirements when installing Foglight NMS on a virtual machine (VM). Operating System: For 64-bit, both Windows Server 2008 or Windows Server 2008 R2 are recommended; however, you can use Windows 7. CPU: Two physical cores dedicated to perspective VM (no hyper-threading core). Memory: 4 GB RAM. NOTE: If you install SQL server, you must include an additional 4 GB RAM. You must provide a minimum of 100Mbs of bandwidth dedicated. You must make sure that your VM is using a physical partition rather than a virtual harddisk.

20 Adding Sites When you have new sites, you can create profiles for them in PacketTrap and then run network discovery to discover the devices in their networks. To create a new site 1. In the Foglight NMS Studio, click New -> site. 2. In the Editor dialog box, type a name and description for the site. This information will appear in the Devices View. 3. Type the host name of the remote site. It is recommended that you use the DNS name of your host; however, you can use the IP address. 4. Click Save. 5. Click Copy URL to download the agent software or click URL to send the link to the machine where you want to install the PacketTrap agent on the remote site. NOTE: Every remote site needs an agent deployed to it. You will be prompted to select a polling agent or to manually install one. A polling agent is the agent the connects back to your platform server. For more information, see Installing Agents Manually. To add devices to your new site 1. In the Devices View, select the new site in the site drop-down list. 2. Click Add New Devices. 3. Go through the screens of the Network Discovery wizard to discover the devices on your site's network. For more information, see Running Network Discovery. See Also Adding Devices by SNMP Adding Devices by Deploying Agent

21 Adding Groups You can create multiple groups to organize the various types of devices in a network. For example, you can group similar devices together, such as adding all the desktops in a network to a group called "Desktop". To add a new group 1. In the Foglight NMS Studio, New -> Group. 2. In the Add a New Group dialog box, type a name for the group. 3. In the Edit Group dialog box, click Add Device Member to start adding devices to the group. 4. In the Select New Device Members, select one or more devices and then click Add. 5. Click Add to finalize your selection and add the devices to the group. 6. Click Save to save your changes. To edit a group

22 1. In the tree view, right-click a group and click Edit. 2. (Optional) Type a new name in the Name field. 3. Click Add to add more devices to the group OR Select one or more devices and click Remove to remove the devices from the group. 4. Click Save to save your changes. To remove a group 1. In the tree view, right-click a group and click Remove. 2. When the message appears, click Yes.

23 Enabling Devices for Monitoring Before Foglight NMS can begin monitoring and collecting data from the devices in a network, you must enable SNMP or WMI. You will need to enable the correct protocol depending on the type of data you are collecting. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. SNMP allows you to collect data from all types of devices, such as desktops, servers, routers, and switches, across any operating system. When you enable SNMP on a device and provide the correct credentials, Foglight NMS can monitor that device and collect data from it. For more information on how you can enable SNMP, see Enabling SNMP on a Device. Windows Management Instrumentation (WMI) Windows Management Instrumentation (WMI) is a programming interface (API) in the Windows operating system that enables devices and systems in a network, typically enterprise networks, to be configured and managed. WMI is based on Web-Based Enterprise Management (WBEM), which stores all definitions in a Common Information Model (CIM) database. WMI allows network administrators to query and set information on workstations, applications and networks, and can also be used to access the Active Directory. Enabling WMI allows Foglight NMS to collect the following specific data from Windows-based devices: Microsoft Exchange SQL Active Directory Windows event logs Windows services Hardware Inventory For more information on how you can enable WMI, see Enabling WMI on Windows Devices.

24 See Also Enabling SNMP on a Device Enabling WMI on Windows Devices Monitoring Your Devices by SNMP Monitoring Your Devices by WMI

25 Enabling SNMP on a Device When you enable SNMP on a device and provide the correct credentials, Foglight NMS begin to monitor that device and collect data from it. Use the SNMP Enablement tool to enable SNMP on the devices in a network. 1. In the PacketTrap Studio, select one or more devices in the Devices View. You can add more devices to your list by clicking Select Targets. 2. Right-click and then click Tools -> Enable SNMP. 3. In the Enable SNMP Wizard, click Next. Foglight NMS begins to determine if the devices are available for SNMP Enablement and will display the results. 4. Click Next. 5. Select the SNMP credential that you want to assign to the devices. Click the Manage Credential link to add new credentials to the Encrypted Credential Store. 6. Click Next. NOTE: If necessary, you can modify the preferred credential assigned to each device by selecting it and then clicking Set Preferred. 7. Click Next. SNMP is now enabled on the devices. 8. Click Finish to complete the process. See Also Monitoring Your Devices by SNMP Enabling Devices for Monitoring

26 Enabling WMI on Windows Devices For Windows-based machines running Windows XP or Vista, by default Microsoft installs and configures WMI. Before you can start monitoring your devices by WMI, you must make sure that the following services are running: Windows Management Instrumentation Windows Management Instrumentation Driver Extensions To enable WMI 1. Go to the Control Panel and double click Administrative Tools. 2. In the Administrative Tools dialog, double-click Computer Management. 3. Expand Services and Applications, right-click WMI Control and follow the Windows menus. For more information on troubleshooting WMI related-issues on Windows XP, click here. For more information on connecting to WMI remotely on Windows Vista, click here. See Also Monitoring Your Devices by WMI Enabling Your Devices for Monitoring

27 Running Network Discovery Network Discovery scans the entire network, and then populates your database with the devices that you want to monitor and manage with Foglight NMS. Using various discovery techniques, such as ping and MAC resolution, network discovery provides a complete set of attributes for all devices. Using the data profile created for devices during discovery, Foglight NMS automatically assigns them to different policies, known as Smart Policies, that are comprised of monitors that best fit what kind of data you want to collect from the devices. The Network Discovery Wizard appears shortly after you install Foglight NMS and open it for the first time. However, if you need to add more devices to your database, you can run network discovery again. To run network discovery from the Studio 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select the method by which you want to add devices:.. See Adding Devices By SNMP for more information See Adding Devices by Deploying Agents for more information 3. Go through the remaining screens of the wizard to complete the process and click Finish. Things to Consider Before You Run Network Discovery Although network discovery detects a device in the network, the data profile that it creates for the device may not be complete because of several factors. It is recommended that you consider the following before you run network discovery: Enable SNMP or WMI on your devices in order to monitor and collect data from it. You do not need to enable SNMP on devices where an agent is deployed; however, if the agent is monitoring and collecting data from other devices, such as routers and switches, you will need to enable SNMP on those devices. NOTE: Enabling WMI allows you to monitor and collect data for Microsoft Exchange, SQL, Active Directory, Windows Event Logs, Windows Services, and Hardware Inventory data types only.

28 Make sure you have the correct credentials. When you run network discovery, you can only enter one credential at a time for each level of security. So you may have to run network discovery more than once to properly discover all devices in the network. You can also set the credentials for a device at a later time using the Set Credential link in the Devices View. If you do not have the correct credentials assigned to a device in Foglight NMS, Foglight NMS will not be able to monitor and collect data from that device. See Also Adding Devices by SNMP Adding Devices by Deploying Agents Managing Credentials Enabling SNMP on a Device Enabling WMI on Windows Devices

29 Adding Devices by SNMP Foglight NMS can use SNMP to discover devices in a network and then provide a complete set of attributes for each discovered device. This type of network discovery will gather technical data including hardware, software, and processes for each device, and then identify devices by responding status, protocols, type, and operating system. When you add a device by SNMP, it requires that you provide the SNMP credentials for the devices and you must make sure that you have the correct port open so that the target machine can accept SNMP packets from that device. 1. In the Foglight NMS Studio, click Add New Devices. 2. In the Add Devices Wizard, select Add Devices Via SNMP Network Discovery. 3. Click Next. 4. In the Enter Targets field, type any one of the following: CIDR, DNS, IP/Subnet Mask or range of IP Addresses. 5. In the Select Network Discovery Techniques section, deselect any of the check-boxes that do not apply to your discovery. For more information on these techniques and configuring the advanced ping settings, see Network Discovery Techniques. 6. In the Choose Device Credentials section, select a credential for each level of security that you want to use to discover each device. For more information on credentials, see Setting Device Credentials for Network Discovery. 7. Click Next to start the discovery process. 8. On page 2 of the Network Discovery Wizard, select the devices on which you want to do a complete discovery. You can use the options in the drop-down list to filter the devices shown on this screen. 9. Click Next. 10. On page 3 of the Network Discovery Wizard, select how you want to assign your devices to a policy. For more information about the Policy Assignment Options, see Applying Smart Policies to Devices. 11. Click Finish to complete the Network Discovery process.

30 See Also Running Network Discovery Network Discovery Techniques Setting Device Credentials for Network Discovery Applying Smart Policies to Devices

31 Network Discovery Techniques Foglight NMS provides 3 different techniques to help you discover the devices in a network. They are: Exclude Existing Devices in Database Use this technique if you have previously run network discovery. It does not include devices that are currently in the database in you new search, which allows Foglight NMS to scan a network faster. Ping Use this technique to send an ICMP command to a device. If the ping monitor is working as expected, a device will respond to the request. There are advanced ping settings that you can configure from the Network Discovery Wizard, which is explained further in the following section. MAC Resolution Foglight NMS uses the MAC Address to uniquely identify and profile a device in the network. Configuring Advanced Ping Settings Foglight NMS provides a way to configure the ping settings so that you can turn a resolution on to display or turn it off from displaying. Click the Advanced Settings link in the Select Network Discovery Techniques section to modify the following settings:

32 Ping Timeout (ms) Maximum amount of time in milliseconds that a ping waits for a response from the target IP address. If the target does not respond within the number of milliseconds set, ping assumes it is not working as expected. Ping Packet TTL (Time-To-Live) Number of hops along the way to the specified address. If you assign a value of 32 to this setting, your ping scan may pass through up to 32 different routers on the way to the remote address before the network throws it away. Pings Per Node You can control the number of ping attempts to send to each address during a scan. When a network containing a Cisco router is scanned, you should set this number to a number greater than 2. If the target IP address is not in the ARP cache of a Cisco router, the router discards the ICMP query while it requests the MAC address of the target IP. The first ping will never arrive at the subnet of the target IP address; however, the Cisco router will respond to the second ping. Delay Between Pings Time in milliseconds between each successive ping to the target address. If you assign a low value to this setting a constant stream of pings is sent to the target IP address. See Also Running Network Discovery Adding Devices by SNMP

33 Setting Device Credentials for Network Discovery When you run network discovery, selecting the correct credentials is essential in order for Foglight NMS to access the devices in a network. When a device is discovered during a scan of the network, Foglight NMS will add it to the database. However, if you incorrectly set the credentials for that device (in the product), Foglight NMS cannot monitor and collect data from it. In the Network Discovery Wizard, choose the correct credential for the devices in the network. Foglight NMS allows you to select a credential for the following protocols: SNMP Version 1 Credential SNMP Version 2 Credential SNMP Version 3 Credential WMI Credential From the Network Discovery Wizard, you can add new credentials to the Encrypted Credential Store by clicking the Managing Credentials link. For more information about credentials, see Managing Your Credentials. See Also Adding Devices by SNMP

34 Adding Devices by Deploying Agents The Deploy Agent Wizard allows you to select one or more devices where you can deploy a local or remote agent. Agents can only be deployed to Windows-based machines running Windows XP, Windows Vista, or Windows Server AS you work through the different screens of the wizard, you will select the device where you want to install the agent, determine if SNMP in enabled on the device, learn the status of that device (if it will support an agent deployed on it), set and manage the device's credentials, set the telnet/ssh credentials in order to connect to the device. For more information about the minimum system requirements the agent device needs to meet, such as which ports you need to open, see Device and Collection Agent System Requirements. 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents and click Next. 3. In the Deploy Agent Wizard, type a CIDR, DNS, IP/SubnetMask or range of IP addresses in the Enter Targets field. 4. Click Next. NOTE: This process may take a few moments to complete. 5. In the Connectivity Results screen, select a device in the list.note: Check the Status column for information about the devices that were discovered. If the returned results have a "Fail" status, you may not be able to select that device. 6. Click Next. 7. Select a preferred credential and type a username and password. You can create a new credential by selecting (new credential) in the drop-down list. 8. Click Next. 9. In the Set Telnet/SSH Credential screen, select the device on which you are installing an agent and click Set Preferred. 10. Click Next. 11. In the Results screen the Results screen will notify you if the Telnet/SSH credential for the device is valid.

35 12. Select a device with the correct WMI credential so that you can monitor and collect specific Windows-based data. For more information, see Monitoring Your Devices by WMI. 13. NOTE: Use the Manage Credential link on this screen to edit your existing credentials or to create a new credential. For more information, see Managing Your Credentials. 14. Click Next. The agent will now be deployed to the device. You can view the log in the agent deployment status. 15. Click Finish. See Also Monitoring Your Devices by Deploying Agents Benefits of Deploying an Agent

36 Benefits of Deploying an Agent You will experience the following benefits when you deploy an agent on a machine: An agent captures and monitors all data from a machine eliminating the need to enable SNMP or WMI on a device. You can use the Patch Management feature. You can remotely gain access to a machine using Expert Assist. Increase a machine's performance by decreasing the amount of traffic between devices. Increase the quality of monitored data by missing fewer monitoring intervals than a SNMP connection. Gives you remote access to various mobile assets, such as laptops. Increase the amount of devices that you can monitor. See Also Monitoring Your Devices by Deploying an Agent

37 Installing Agents Manually You can manually deploy an agent on any windows-based machine. When you install an agent manually, you are downloading the agent software from a known location on your Foglight NMS server. Also, you can use the URL feature to deploy an agent to all the desktops in a network. By ing the location of the agent software to each desktop owner, they can download the agent software onto their desktops. 1. In the Foglight NMS Studio, click Add Devices. 2. In the Add Devices Wizard, select Add Devices By Deploying Agents. 3. Click Next. 4. In the Deploy Agent Wizard, click Install Manually. 5. In the Manually Deploy Agent dialog, select an operating system and do one of the following: Click Copy URL to download the agent software from a known location on your Foglight NMS server. Click URL to send the location of the agent software to all the desktops in a network. 6. Click Close. See Also Adding Devices by Deploying an Agent

38 Applying Smart Policies to Devices When you run a network discovery, Foglight NMS creates an intelligent profile of a device and assigns it to a pre-configured policy called a Smart Policy. A Smart Policy is a product default policy made up of recommended monitors and data gathering time intervals appropriate to a specific type of device, such as a wireless device or desktop device. For example, Foglight NMS assigns a desktop computer to the Desktop Policy, which monitors data specific to desktops such as CPU, memory, and disk volume. Applying Smart Policies during Network Discovery will save you time by automatically assigning all the devices discovered in your site's network to a qualifying Smart Policy. You can edit Local and Global Smart Policies in the Edit Policy window; however, you cannot delete a Global Smart Policy. Smart Policies in your product include: Default Policy NOTE: A device is applied to the Default Policy when Foglight NMS cannot identify what type of device it is. For example, during network discovery, if Foglight NMS cannot identify a device's description, OID, or which services are running on it, that device is assigned to the Default Policy. In the Default Policy, all monitors are selected to cover a wide range of devices to make sure that data is monitored and collected from these devices. It is recommended that you migrate these devices from the Default Policy to the appropriate Smart Policy. Networking Policy Server Policy Desktop Policy Wap Policy VMware Host Policy Applying the Default Policy to Devices By selecting the Default Policy option in the Network Discovery Wizard, you are assigning the discovered devices to the Default Policy (only the devices that you selected on page 2 of the Network Discovery Wizard are applied to it). After the network discovery process is complete, you

39 can reassign devices in the default policy to a different smart policy or to a policy that you created. See Also Overview of Network Discovery Migrating Devices from the Default Policy

40 Updating Your Product There are two ways this software will update. One approach is manual update and the other approach is auto update. Manually Updating Your Product 1. From the Foglight NMS Studio main menu, click Administration. 2. In the Administration window, click Check For Updates. 3. Click Update Now to manually apply the software updates. The program will close and then reopen automatically. Automatically Updating Your Product Upon launching Foglight NMS, the software will check for any updates available at the patch server. The software automatically pulls the updates and stores them in cache. The updates are applied the next time the software is launched.

41 Monitoring Your Devices Topics in this section Monitoring Your Devices by SNMP Monitoring Your Devices by WMI Monitoring Your Devices by Deploying an Agent Collecting Syslog, NetFlow, and SNMP Traps Data

42 Monitoring Your Devices By SNMP Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. SNMP allows you to collect data from all types of devices, such as desktops, servers, routers, and switches, across any operating system. When you enable SNMP on a device and provide the correct credentials, Foglight NMS can monitor that device and collect data from it. Foglight NMS uses SNMP to gather much of the device performance information from a network. If you choose to monitor your devices by SNMP you must first do the following: Enable SNMP on all the devices that you want to monitor. Assign a credential to the device in Foglight NMS. The following diagram shows how Foglight NMS uses SNMP to monitor your devices.

43 See Also Enabling SNMP on a Device

44 Monitoring Your Devices by WMI Windows Management Instrumentation (WMI) is a programming interface (API) in the Windows operating system that enables devices and systems in a network, typically enterprise networks, to be configured and managed. WMI is based on Web-Based Enterprise Management (WBEM), which stores all definitions in a Common Information Model (CIM) database. WMI allows network administrators to query and set information on workstations, applications, and networks and can also be used to access the Active Directory. Similar to SNMP, monitoring your devices by WMI allows Foglight NMS to collect the following data from Windows-based devices: Microsoft Exchange SQL Active Directory Windows event logs Windows services Hardware Inventory The following diagram shows how Foglight NMS monitors your devices by WMI.

45 See Also Enabling WMI on Windows Devices

46 Monitoring Your Devices by Deploying Agents You can choose to deploy one or more agents to your site's site for monitoring and collecting data. Agents can be deployed to all Windows, Mac, and Linux devices. Foglight NMS can only monitor devices such as routers, switches, and printers need to monitor by SNMP. A collection agent is the device responsible for monitoring and collecting data from devices that cannot host an agent, such as a router. You can only deploy a collection agents to a windows-based machine. If you deploy an agent to a Mac or Linux device it can only monitor itself and cannot monitor other devices. NOTE: You do not need to enable SNMP or WMI on an agent machine. The following diagram shows how Foglight NMS monitors your devices by deploying an agent. Note that each desktop and server in this image has an agent deployed on it.

47 See Also Benefits of Deploying an Agent Adding Devices by Deploying Agents

48 Collecting Syslog, NetFlow, and SNMP Traps Data You must log on to the device to configure it to collect syslog, NetFlow, or SNMP Traps data. When you configure the device, you must tell it to export or send the data to the IP address of the collection agent that is monitoring the device. Additionally, when you collect Syslog and SNMP Traps data from devices, you must make sure that the Syslog Listener and SNMP Traps monitors are configured for the policy or policies to which the devices are assigned. Enabling NetFlow You must enable NetFlow on your devices and configure it to export its data to the collection agent that is monitoring NetFlow. Opening Ports for NetFlow, Syslog, and SNMP Traps In order to collect, syslog, NetFlow, and SNMP Traps data, you must make sure that you open the following ports on the devices from where you are collecting this data. 514 (UDP) - Syslog collector 61 (UDP) - SNMP Trap collector 2055 (UDP) - NetFlow collector 6343 (UDP) sflow collector 9555 (UDP) - NetFlow Alternative port #2 collector 995 (UDP) NetFlow Alternative port #3 collector NOTE: You only need to open one port for NetFlow. If port 2055 is in use by another device, you can select an alternate port to open. The following diagram shows how Foglight NMS collects syslog, NetFlow and SNMP Traps data.

49 See Also Enabling NetFlow

50 Using Dashboards to Quickly Diagnose Issues Topics in this section Overview of Dashboards Touring the Dashboard View User Interface Customizing Your Dashboard Adding Dashboard Tabs About Gadgets Adding Gadgets to Your Dashboard Creating Custom Gadgets Editing Gadgets

51 Overview of Dashboards The Dashboard view is a network management dashboard that displays a high-level overview of network performance, fault management, and device availability across all of your sites' networks. It provides you with critical device information, such as CPU load, network interface traffic, latency, and other key performance indicators (KPIs), which can expose devices that are not working as expected and reveal problem areas in a network. You can continuously monitor key assets of a network to make sure that it is always running at peak performance. In the Dashboard view, you can do the following: Monitor device availability, CPU load, memory, disk space utilization, network interface traffic, network latency, and packet loss. Perform advanced monitoring of running services, process availability, and performance counters for MS Exchange, SQL, Active Directory. Make an inventory of gadgets include charts, gauges, lists, text, and web links. Compare networks between sites and organizations. Create a custom view by dragging and dropping gadgets. Restore the default dashboard settings. NOTE: When you select to restore the default settings, all the gadgets and tabs that you created will be deleted from the Dashboard view. The restored default setting includes only the Top-Ten and Alerts and Logs dashboards. Topics in this section Touring the Dashboard View User Interface Customizing Your Dashboard Adding Dashboard Tabs About Gadgets Adding Gadgets to Your Dashboard Creating Custom Gadgets Editing Gadgets

52

53 Touring the Dashboard View User Interface

54 The Main Elements of the Dashboard View 1 The Dashboard Menu Tab: Use the main menu tabs to navigate through the product. You can click the Dashboard tab to navigate to your dashboard from any place in the product. 2 Dashboard Menu Buttons: Use the menu buttons for the following: Adding new dashboard tabs. Adding new gadgets to a dashboard. Restoring the product defaults to your dashboard. NOTE: This action will remove all gadgets and tabs that you added from the dashboard. Refresh the data in your gadgets. 3 Dashboard Navigation Tabs: Each tab represents a unique dashboard. Click a dashboard name to navigate to that dashboard. 4 Right-Click Menu Options: Use the right-click menu options to customize the Dashboard view. 5 Divider Bar: The Divider Bar allows you to adjust the size of each column. To activate the divider bar, place your cursor in the space between the columns. Click and hold the divider bar to move the columns left or right. 6 Gadget: The information displayed in a gadget will vary from gadget to gadget. You can do the following in a gadget: View the performance and activity of one or more devices in a network. Filter the data by clicking a column header. Edit the way in which data is displayed in a gadget. Move the gadget up in the Dashboard view when you click the gadget title bar. Remove the gadget from your dashboard by clicking the Close link.

55 Customizing Your Dashboard You can customize your dashboard by doing the following: Create new dashboard tabs to organize your gadgets. For example, you can create a new dashboard that will display only gadgets that are related to call path data. Add new standard gadgets or add custom gadgets that you created. Edit or remove any of the existing tabs or gadgets. Move gadgets around in the Dashboard view using drag and drop functionality. You can also click on the gadget title bar to move it up on a dashboard. Resize the widths of columns and gadgets by moving the divider bar left or right. Every Foglight NMS user can customize his or her own dashboard to fit their needs. The dashboard that you customize will be available to view only by you. Other Foglight NMS users cannot see your customized dashboard. Dashboard Tab Right-Click Menu Options You can use the right-click menu options to manage the tabs and gadgets on each dashboard. Configure Columns Defines the number of columns on a dashboard. Existing gadgets on the dashboard are automatically resized based on the number of columns you select. Clear Gadgets Removes all gadgets from the selected dashboard. Rename Tab Changes the name of the selected dashboard tab. Close Tab Permanently removes the selected dashboard and all the gadgets contained within it. See Also Adding Gadgets to Your Dashboard Adding Dashboard Tabs

56 Creating Custom Gadgets Editing Gadgets

57 About Gadgets The Dashboard view offers a wide range of gadgets to present any data being collected about your network. Every gadget takes you through a similar and intuitive configuration wizard that allows you to easily and quickly set one up. The following table lists all the available gadgets to add and view on a dashboard. Click a gadget name for more information. Gadget Name Description Location of Gadget Active Directory Monitors the performance counters for the active directory server. Application Performance Alerts In Process Displays a detailed list of triggered alerts. Alerts and Logs Average Latency Chart Average Latency Gauge Average Latency List Average Latency Text Displays the average latency of one or more nodes by charting the ping results. Displays the average latency of a node based on response time and average packet loss. Displays the average latency of a list of one or more nodes by showing the response time and a color indicator bar. Displays the average latency of a node by changing the color of the text to green or red. Device Availability Device Availability Device Availability Device Availability Configuration Backup Displays the current device configuration file and allows you to compare it to a previous configuration file. Alerts and Logs Call Path Jitter Chart Monitors call path jitter via IP SLA on Cisco routers. VoIP Call Path Latency Chart Monitors call path latency via IP SLA on Cisco routers. VoIP Call Path MOS Chart Monitors call path MOS via IP SLA on Cisco routers. VoIP Call Path Packet Loss Chart Monitors call path packet loss via IP SLA on Cisco routers. VoIP Call Path Statistics Monitors call path statistics via IP SLA on Cisco routers. VoIP CPU Chart Monitors the CPU usage percentage of a device. Device Performance CPU Gauge Monitors the CPU usage percentage and average usage percentage of a device. Device Performance

58 Gadget Name Description Location of Gadget CPU List CPU/Memory Chart CPU/Memory Gauge CPU/Memory List Monitors the CPU usage percentage of one or more devices within a network. Monitors the CPU and memory usage percentage of a device. Monitors the CPU and memory usage percentage of a device. Monitors the CPU and memory usage percentage of one or more devices. Device Performance Device Performance Device Performance Device Performance CPU/Memory Status Monitors processor and memory usage. Device Performance Device Alerts - Active Displays the alerts triggered for any given device. Alerts and Logs Device Alerts - All Displays the alerts triggered for any given device. Quest System Info Device Notes Displays notes about any given device. Quest System Info Dial Manager Configuration Displays dial manager configuration via IP SLA on Cisco routers. VoIP Dial Manager Phone Chart Dial Manager Registration Status Displays dial manager phones via IP SLA on Cisco routers. Displays dial manager registration status via IP SLA on Cisco routers. VoIP VoIP Discovered Devices TBD Network Interface Disk Volume Chart Disk Volumes Installed Applications Monitors the disk utilization on a hard drive of a specific device Monitors the disk utilization of each drive as a percent of capacity for a device Displays installed applications via SNMP (some devices will require Telnet or SSH) Device Performance Device Performance Device Performance IP Configuration Displays the IP Configuration information for a device. Device Performance IP SLA Overview Displays dial manager registration status via IP SLA on Cisco routers. VoIP Memory Chart Monitors the memory usage percentage of a device. Device Performance

59 Gadget Name Description Location of Gadget Memory Gauge Memory List MS Exchange Network Ethernet CRC Errors Network Token Ring CRC Errors Network Interface Chart Network Interface List Network Statistics Summary Network Traffic Flow Monitors the memory usage percentage and average usage percentage of a device. Monitors the memory usage percentage of one or more devices in a network. Monitors the performance counters for the MS Exchange server. TBD TBD Monitors the network interface performance for a device. Monitors the network interface performance for a device. Displays network statistics through SNMP. Displays the NetFlow, sflow, JFlow, and ptflow traffic for a switch or a router. Device Performance Device Performance Application Performance Device Performance Device Performance Device Performance Device Performance Device Performance Network Performance Open Source Web Viewer Allows you to choose a browser-based open source network management tool or web site to display. Application Performance Quest Log Information Displays all the log files generated in a single view. Quest System Info Policy Scheduled Actions Displays all the scheduled actions in a single view. Quest System Info Running Processes Shows all the processes that are currently running on a device. OS Details SNMP Traps TBD Alerts and Logs Software Inventory Provides a list of all the applications installed on a device. OS Details SQL Server Monitors the performance counters for SQL Server. Application Performance Syslog Displays all the collected syslog messages for a specific device. Alerts and Logs

60 Gadget Name Description Location of Gadget System Information Displays detailed system information for a device. OS Details Top 10 - Average CPU Usage Top 10 - Average Memory Usage Top 10 - Average Packet Loss Monitors the CPU performance of a list of one or more nodes. Monitors the memory performance of a list of one or more nodes. Displays the average packet loss of a list of one or more nodes. Top 10 Top 10 Top 10 Top 10 - Disk Volume Usage Displays the highest average disk volume usage as a percentage of drive capacity for a list of devices. Top 10 Top 10 - Highest Average Latency Displays the highest average latency of a list of one or more nodes. Top 10 Top 10 - Network Interface Usage Displays the highest network interface usage for a list of nodes. Top 10 Top Network Traffic: Applications (for one or multiple targets) Top Network Traffic: Convs (for one target) Top Network Traffic: Domains (for one or multiple targets) Shows network traffic data, organized by application and dependent on the scope that you select when you create the gadget. Shows network traffic data, organized by conversation and dependent on the scope that you select when you create the gadget. Shows network traffic data, organized by domain and dependent on the scope that you select when you create the gadget. Top 10 Top 10 Top 10 Top Network Traffic: Endpoints (for one or multiple targets) Shows network traffic data, organized by endpoints and dependent on the scope that you select when you create the gadget. Top 10 Virtual Machines Displays VMware ESX Server virtual machines. VMware VMware Host Summary Displays a summary of VMware ESX Server host information. VMware

61 Gadget Name Description Location of Gadget VoIP Active Calls VoIP Call History VoIP Phone Status Windows Event Logs Windows Services Wireless Access Point Displays active calls through IP SLA on Cisco call manager. Displays call history through IP SLA on Cisco call manager. Displays VoIP phone status through IP SLA on Cisco call manager. Displays all event logs collected for a device, including application, security, and system event logs. Displays critical windows services information, such as status and start type. Displays information about key variables of a wireless access point, such as signal strength and quality. VoIP VoIP VoIP Alerts and Logs OS Details Wireless Performance Wireless Access Point List Displays information about all wireless access points on a network. Wireless Performance Wireless Clients Chart Wireless Clients List Shows how many wireless clients are connected to a wireless access point within a given time frame. Displays key variables for each client connected to a wireless access point. Wireless Performance Wireless Performance Wireless Traffic Chart Shows the amount of received and transmitted network traffic generated by a wireless device within a spec- Wireless Performance ified interval of time. See Also Adding Gadgets to Your Dashboard

Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries.

Adobe, Acrobat, and Acrobat Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the U.S. and/or other countries. Legal Notices Copyright 2011 All rights reserved. Under the copyright laws, this manual or the software described within, can not be copied, in whole or part, without the written consent of the manufacturer,

More information

Foglight NMS Overview

Foglight NMS Overview Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates

More information

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Smart Business Architecture for Midsize Networks Network Management Deployment Guide Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES

SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES DATASHEET SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Remote Network Monitoring Software for Managed Services Providers

Remote Network Monitoring Software for Managed Services Providers http://www.packettrap.com Remote Network Monitoring Software for Managed Services Providers PacketTrap MSP provides a cost-effective way for you to offer enterprise-class server, application, and network

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

WhatsUp Gold v16.2 Getting Started Guide

WhatsUp Gold v16.2 Getting Started Guide WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...

More information

WhatsUp Gold 2016 Getting Started Guide

WhatsUp Gold 2016 Getting Started Guide WhatsUp Gold 2016 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 5 STEP 1: Prepare

More information

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6)

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6) MG-SOFT Corporation Net Inspector 2015 GETTING STARTED GUIDE (Document Version: 10.6) Document published on October 16, 2015 Copyright 1995-2015 MG-SOFT Corporation Introduction In order to improve the

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide December 2014 202-11288-04 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Using SolarWinds Orion for Cisco Assessments

Using SolarWinds Orion for Cisco Assessments Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz 8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere

ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor

CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor Contents CHAPTER 1 WhatsUp Flow Monitor Overview What is Flow Monitor?... 1 How does Flow Monitor work?... 2 Supported versions... 2 System requirements... 2 CHAPTER 2 Configuring WhatsUp Flow Monitor

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

SolarWinds Toolset Quick Start Guide

SolarWinds Toolset Quick Start Guide SolarWinds Toolset Quick Start Guide Copyright 1995-2007 SolarWinds.net, Inc., all rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled,

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Software Version 5.2 June 2015. Xerox Device Agent User Guide

Software Version 5.2 June 2015. Xerox Device Agent User Guide Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or

More information

StruxureWare Data Center Expert 7.2.4 Release Notes

StruxureWare Data Center Expert 7.2.4 Release Notes StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

PerleVIEW Device Management System User s Guide

PerleVIEW Device Management System User s Guide PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of Contents 1. Main components... 3 2. License server... 3 3. Supported operating systems... 3 3.1. Agents... 3 3.2.

More information

XMS Quick Start Guide

XMS Quick Start Guide 812-0055-002D XMS Quick Start Guide Overview of Quick Start Steps This guide will quickly get you up and running with the Xirrus Management System (XMS). It includes instructions for setting up the XMS

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

PacketTrap One Resource for Managed Services

PacketTrap One Resource for Managed Services Remote Monitoring Software for Managed Services Providers PacketTrap RMM provides a cost-effective way for you to offer enterprise-class server, application, and network management to your customers. It

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

Orientation Course - Lab Manual

Orientation Course - Lab Manual Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes

Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes The

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Novell PlateSpin Recon

Novell PlateSpin Recon Getting Started Guide AUTHORIZED DOCUMENTATION Novell PlateSpin Recon 3.6.1 March 15, 2010 www.novell.com PlateSpin Recon 3.6 Getting Started Guide Legal Notices Novell, Inc., makes no representations

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

RMM/MDM. Quick Reference Guide

RMM/MDM. Quick Reference Guide RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5

More information

StruxureWare Data Center Expert 7.2.1 Release Notes

StruxureWare Data Center Expert 7.2.1 Release Notes StruxureWare Data Center Expert 7.2.1 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....2 Known Issues...2 Upgrade

More information

McAfee. b Under Self Service, click Product Documentation. d Download the model S7032 installation guide.

McAfee. b Under Self Service, click Product Documentation. d Download the model S7032 installation guide. Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager. DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: dna@danwood.com Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

NetBrain Workstation Professional Edition 2.3 Release notes

NetBrain Workstation Professional Edition 2.3 Release notes NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES

CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information