Configuring and Monitoring Hitachi SAN Servers

Size: px
Start display at page:

Download "Configuring and Monitoring Hitachi SAN Servers"

Transcription

1 Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6

2 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or disclosed to others without the prior permission of eg Innovations, Inc. eg Innovations, Inc. makes no warranty of any kind with regard to the software and documentation, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Trademarks Microsoft Windows, Windows NT, Windows 2000, Windows 2003 and Windows 2008 are either registered trademarks or trademarks of Microsoft Corporation in United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Copyright 2012 eg Innovations, Inc. All rights reserved.

3 Table of Contents CONFIGURING AND MONITORING THE HITACHI AMS SAN COFIGURING THE EG AGENT TO MONITOR THE HITACHI AMS SAN ADMINISTERING THE EG MANAGER TO WORK WITH THE HITACHI AMS SAN MONITORING THE HITACHI AMS SAN SERVER...8 CONFIGURING AND MONITORING THE HITACHI USP SAN CONFIGURING THE EG AGENT TO MONITOR THE HITACHI USP SAN ADMINISTERING THE EG MANAGER TO MONITOR THE HITACHI USP SAN SERVER MONITORING THE HITACHI USP SAN...14 CONCLUSION...15

4 Table of Figures Figure 1.1: Adding a Hitachi AMS SAN server...3 Figure 1.2: List of Unconfigured tests to be configured for the Hitachi AMS SAN server...4 Figure 1.3: Configuring the Cache Memory Usage test...4 Figure 1.4: Configuring the Cache Load test...5 Figure 1.5: Configuring the Trap Status test...6 Figure 2.1: Adding a Hitachi USP SAN server...10 Figure 2.2: List of Unconfigured tests to be configured for the Hitachi USP SAN server...11 Figure 2.3: Configuring the Battery Status test...11 Figure 2.4: Configuring the Nsc Traps test...12

5 Configuring and Monitoring the Hitachi AMS SAN Chapter 1 Configuring and Monitoring the Hitachi AMS SAN 1.1 Cofiguring the eg Agent to Monitor the Hitachi AMS SAN For collecting these performance statistics, the eg agent uses both the following information sources: The Performance Monitor software that is installed with the storage device; The SNMP MIB of the device; The Performance Monitor is a controller-based software application that acquires information on the performance of RAID groups, logical units, and other elements of the disk subsystem while tracking the utilization rates of resources such as hard disk drives and processors. To periodically run the Performance Monitor application and to extract the metrics of interest from the storage device, a client utility named the Storage Navigator Modular (AMS) must be available on the eg agent host. The tests that need to access the Performance Monitor should then be configured with the path to the Storage Navigator. This way, whenever that test is run, the eg agent executing the test automatically invokes the storage navigator client via CLI, which then connects to the storage device, accesses the Performance Monitor on the device, and extracts the desired metrics. A few other tests executed by the eg agent collect the statistics of interest using SNMP-based access to the MIB statistics of the storage device. For these tests to work, you first need to SNMP-enable the storage device. While you need to configure a remote agent for accessing the Performance Monitor software and collecting metrics, an external agent is necessary for performing the SNMP-based monitoring. Note: If need be, you can configure a single agent to function both as a remote agent and as an external agent for monitoring the Hitachi AMS. 1

6 Configuring and Monitoring the Hitachi AMS SAN To ensure that the eg agent is able to use both the Performance Monitor and the SNMP MIB (of the device) effectively for collecting metrics from the Hitachi AMS, the following prerequisites should be fulfilled: The SNMP service should be enabled on the device; The eg SNMP trap receiver service should be installed on the external agent host; SNMP traps should be enabled on the device and configured to send traps to the external agent host; The Hitachi Performance Monitor software should be available; The Storage Navigator Modular (AMS) Version 7.0 or later should be available on the remote agent host; The Storage Navigator Modular (AMS) Version 7.0 or later should be able to connect to the storage unit being monitored, without requiring any user permissions. The eg agent can monitor only those storage units that are registered with the Storage Navigator Modular (AMS) Version 7.0 or later; if a target unit is neither discovered nor registered with the SNClient, do the following: i. Login to the host on which the Storage Navigator Modular operates. ii. Go to the command prompt and switch to the directory: C:\Program Files\Storage Navigator Modular CLI iii. From this directory, run the following command to discover unregistered storage units: auunitaddauto -ip iv. All discovered storage units will then be listed as follows: Searching Detected Count : 1 The subsystem of the following was discovered. No. Name Controller0 Controller1 Type Construction Serial No 1 DF700M_ DF700M Dual v. The command will now prompt you confirm whether you want to register the discovered subsystem with the Storage Navigator Modular. Type y here to register one/more of the discovered storage units. Are you sure you want to register the discovered subsystem? (y/n [y]) : y vi. Next, specify the No. of the discovered subsystem to register it. 2

7 Configuring and Monitoring the Hitachi AMS SAN Please specify the number of the subsystem to register: 1 vii. If registration is successful, the following message will appear: DF700M_ has been registered. The subsystems have been registered successfully viii. Micro program 0710/A or later is required; 1.2 Administering the eg Manager to Work with the Hitachi AMS SAN 1. Log into the eg administrative interface. 2. eg Enterprise cannot automatically discover Hitachi AMS SAN server. You need to manually add the server using the add/modify components page (see Figure 1.1) that appears when the Infrastructure -> Components -> Add/Modify menu sequence is followed. Remember that components manually added are managed automatically. Figure 1.1: Adding a Hitachi AMS SAN server 3. Specify the Host IP and the Nick name of the Hitachi AMS SAN server. Also select Other as the OS and SNMP as the MODE. Then, click the ADD button to register the changes. Note: Though the Mode is set to SNMP while adding a new component, the eg agent will be able to collect metrics from the target environment through the SNCLlENTLOCATION path that will be specified by you during parameter configuration for the tests pertaining to the Hitachi AMS SAN server. 3

8 Configuring and Monitoring the Hitachi AMS SAN When you attempt to sign out, a list of unconfigured tests appears as shown in 4. Figure 1.2. Figure 1.2: List of Unconfigured tests to be configured for the Hitachi AMS SAN server 5. Click on the Cache Memory Usage test to configure it. This test reports how well the objects in the cache have been utilized. Figure 1.3: Configuring the Cache Memory Usage test 6. To configure the test, specify the following in Figure 1.3. TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured PORT - The port at which the HOST listens. UNITNAME - Specify the name of the storage unit to be monitored. To determine the unit name registered with the Storage Navigator Client for the AMS SAN device, run the following commands, one after another, from the C:\Program Files\Storage Navigator Modular CLI directory on the Storage Navigator Client: startnsmen auunitref The output of the command includes the Name of the storage unit. DF700M_ is a sample unit name. 4

9 Configuring and Monitoring the Hitachi AMS SAN MCTYPE Indicate the machine type. The value can be AMS or WMS. By default, this parameter is set to AMS. SNCLIENTLOCATION Specify the full path to the install directory of the storage navigator. TIMEOUT Indicate the duration (in minutes) for which this test should wait for a response from the storage device. By default, this is set to 3 minutes. USER Specify the name of the user who is authorized to access the target server. PASSWORD Specify the password corresponding to the specified USER. CONFIRM PASSWORD Confirm the password by retyping it here 7. Next, try to signout of the administrative interface again. When the LIST OF UNCONFIGURED tests comes, choose to configure the Cache Load test. Doing so will invoke Figure 1.4. Figure 1.4: Configuring the Cache Load test 8. This test reports the rate at which data is written to the cache memory. To configure this test, specify the following: TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured SNMPPORT Here specify the port number through which the server exposes its SNMP MIB. The default value is 161. SNMPVERSION By default, the eg agent supports SNMP version 1. Accordingly, the default selection in the SNMPVERSION list is v1. However, if a different SNMP framework is in use in your environment, say SNMP v2 or v3, then select the corresponding option from this list. SNMPCOMMUNITY Here, specify the SNMP community name that the test uses to communicate with the mail server. The default is public. This parameter is specific to SNMP v1 and v2 only. Therefore, if the SNMPVERSION chosen is v3, then this parameter will not appear. USERNAME This parameter appears only when v3 is selected as the SNMPVERSION. SNMP version 3 (SNMPv3) is an extensible SNMP Framework which supplements the SNMPv2 Framework, by additionally supporting message security, access control, and remote SNMP configuration capabilities. To extract performance statistics from the MIB 5

10 Configuring and Monitoring the Hitachi AMS SAN using the highly secure SNMP v3 protocol, the eg agent has to be configured with the required access privileges in other words, the eg agent should connect to the MIB using the credentials of a user with access permissions to be MIB. Therefore, specify the name of such a user against the USERNAME parameter. AUTHPASS Specify the password that corresponds to the above-mentioned USERNAME. This parameter once again appears only if the SNMPVERSION selected is v3. CONFIRM PASSWORD Confirm the AUTHPASS by retyping it here. AUTHTYPE This parameter too appears only if v3 is selected as the SNMPVERSION. From the AUTHTYPE list box, choose the authentication algorithm using which SNMP v3 converts the specified USERNAME and PASSWORD into a 32-bit format to ensure security of SNMP transactions. You can choose between the following options: o o MD5 Message Digest Algorithm SHA Secure Hash Algorithm ENCRYPTFLAG This flag appears only when v3 is selected as the SNMPVERSION. By default, the eg agent does not encrypt SNMP requests. Accordingly, the ENCRYPTFLAG is set to NO by default. To ensure that SNMP requests sent by the eg agent are encrypted, select the YES option. ENCRYPTTYPE If the ENCRYPTFLAG is set to YES, then you will have to mention the encryption type by selecting an option from the ENCRYPTTYPE list. SNMP v3 supports the following encryption types: o o DES Data Encryption Standard AES Advanced Encryption Standard ENCRYPTPASSWORD Specify the encryption password here. CONFIRM PASSWORD Confirm the encryption password by retyping it here. TIMEOUT - Here, specify the duration (in seconds) within which the SNMP query executed by this test should time out in the TIMEOUT text box. The default is 10 seconds. 9. Then, click the Update button in Figure 1.4 and try signing out again. This time you will be prompted to configure the Traps Status test. Doing so will invoke Figure 1.5. Figure 1.5: Configuring the Trap Status test 6

11 Configuring and Monitoring the Hitachi AMS SAN 10. This test captures the SNMP trap messages sent out by the hardware components (such as battery, cache memory, drive, enclosure controller, fan, host controller, other enclosures, and power supply units) on the storage device, and thus enables administrators to promptly detect potential hardware failures. To configure this test, do the following: TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured PORT Specify the port number at which the specified host listens. By default, this is NULL. SOURCEADDRESS - Specify a comma-separated list of IP addresses or address patterns of the hosts from which traps are considered in this test. For example, , *. A leading '*' signifies any number of leading characters, while a trailing '*' signifies any number of trailing characters. OIDVALUE - Provide a comma-separated list of OID and value pairs returned by the traps. The values are to be expressed in the form, DisplayName:OID-OIDValue. For example, assume that the following OIDs are to be considered by this test: and The values of these OIDs are as given hereunder: OID Value Host_system NETWORK In this case the OIDVALUE parameter can be configured as Trap1: Host_system,Trap2: Network, where Trap1 and Trap2 are the display names that appear as descriptors of this test in the monitor interface. An * can be used in the OID/value patterns to denote any number of leading or trailing characters (as the case may be). For example, to monitor all the OIDs that return values which begin with the letter 'F', set this parameter to Failed:*-F*. Typically, if a valid value is specified for an OID in the OID-value pair configured, then the test considers the configured OID for monitoring only when the actual value of the OID matches with its configured value. For instance, in the example above, if the value of OID is found to be HOST and not Host_system, then the test ignores OID while monitoring. In some cases however, an OID might not be associated with a separate value instead, the OID itself might represent a value. While configuring such OIDs for monitoring, your OIDVALUE specification should be: DisplayName:OID-any. For instance, to ensure that the test monitors the OID , which in itself, say represents a failure condition, then your specification would be: Trap5: any. 7

12 Configuring and Monitoring the Hitachi AMS SAN SHOWOID Specifying true against SHOWOID will ensure that the detailed diagnosis of this test shows the OID strings along with their corresponding values. If you enter false, then the values alone will appear in the detailed diagnosis page, and not the OIDs. 11. Finally, click the Update button and exit the eg administrative interface. 1.3 Monitoring the Hitachi AMS SAN Server To monitor the Hitachi AMS SAN server, do the following: 1. Login as a monitor / supermonitor user. 2. Click on the components option in the menu bar, and select the Servers option from the components menu. 3. From the component list page, click on the Hitachi AMS SAN component for which you wish to view measurements. 8

13 Configuring and Monitoring the Hitachi UPS SAN Chapter 2 Configuring and Monitoring the Hitachi USP SAN 2.1 Configuring the eg Agent to Monitor the Hitachi USP SAN Each layer of the Hitachi USP SAN model is mapped to a variety of tests which report useful performance statistics related to the storage device. These tests use both the following approaches to collecting metrics from the Hitachi USP device: By accessing the Performance Monitor application available with the storage device; Using SNMP-based access to the SNMP MIB of the device; The Performance Monitor is a controller-based software application that acquires information on the performance of RAID groups, logical units, and other elements of the disk subsystem while tracking the utilization rates of resources such as hard disk drives and processors. To periodically run the Performance Monitor application and to extract the metrics of interest from the storage device, a Java export utility must be available on the eg agent host. The tests that need to access the Performance Monitor for metrics should then be configured with the path to the Java export utility. This way, whenever that test is run, the eg agent executing the test automatically invokes the Java export utility via CLI, which then connects to the storage device, accesses the Performance Monitor on the device, and extracts the desired metrics. A few other tests executed by the eg agent collects the statistics of interest using SNMP-based access to the MIB statistics of the storage device. For these tests to work, you first need to SNMP-enable the storage device. While you need to configure a remote agent for accessing the Performance Monitor software and collecting metrics, an external agent is necessary for performing the SNMP-based monitoring. Note: If need be, you can configure a single agent to function both as a remote agent and as an external agent for monitoring the Hitachi USP. 9

14 Configuring and Monitoring the Hitachi UPS SAN To ensure that the eg agent is able to use both the Performance Monitor and the SNMP MIB (of the device) effectively for collecting metrics from the Hitachi USP, the following prerequisites should be fulfilled: The SNMP service should be enabled on the device; The eg SNMP trap receiver service should be installed on the external agent host; The storage device should be configured to send SNMP traps to the external agent host; The Hitachi Performance Monitor software should be available; The Java export utility should be available on the remote agent host; The eg agent should be configured with the credentials of a special user account, which is specifically created for use with the export utility; this account should fulfill the following conditions: i. Should not possess the write permission; ii. Can be of any user type; however, to ensure that the eg agent collects statistics pertaining to all storage partitions, it is recommended that this user is of type storage administrator; 2.2 Administering the eg Manager to monitor the Hitachi USP SAN Server 1. Log into the eg administrative interface. 2. eg Enterprise cannot automatically discover a Hitachi USP SAN. You need to manually add the server using the ADD/MODIFY COMPONENTS page (see Figure 2.1) that appears when the Infrastructure -> Components -> Add/Modify menu sequence is followed. Remember that components manually added are managed automatically. Figure 2.1: Adding a Hitachi USP SAN server 3. After specifying the Host IP, Nick name of the Hitachi USP SAN server, select Other as the OS and SNMP as the MODE. Then, click the ADD botton to register the changes. 10

15 Configuring and Monitoring the Hitachi UPS SAN Note: Though the Mode is set to SNMP while adding a new component, the eg agent will be able to collect metrics from the target environment through the specified CLI path. 4. When you attempt to sign out, a list of unconfigured tests appears as shown in Figure 2.2. Figure 2.2: List of Unconfigured tests to be configured for the Hitachi USP SAN server 5. Click on the Battery Status test to configure it. Figure 2.3: Configuring the Battery Status test 6. To configure the test, specify the following in Figure 2.3. TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured SNMPPORT Here specify the port number through which the server exposes its SNMP MIB. The default value is 161. SNMPVERSION By default, the eg agent supports SNMP version 1. Accordingly, the default selection in the SNMPVERSION list is v1. However, if a different SNMP framework is in use in your environment, say SNMP v2 or v3, then select the corresponding option from this list. SNMPCOMMUNITY Here, specify the SNMP community name that the test uses to communicate with the mail server. The default is public. This parameter is specific to SNMP v1 and v2 only. Therefore, if the SNMPVERSION chosen is v3, then this parameter will not appear. USERNAME This parameter appears only when v3 is selected as the SNMPVERSION. SNMP version 3 (SNMPv3) is an extensible SNMP Framework which supplements the SNMPv2 Framework, by additionally supporting message security, access control, and remote SNMP configuration capabilities. To extract performance statistics from the MIB using the highly secure SNMP v3 protocol, the eg agent has to be configured with the 11

16 Configuring and Monitoring the Hitachi UPS SAN required access privileges in other words, the eg agent should connect to the MIB using the credentials of a user with access permissions to be MIB. Therefore, specify the name of such a user against the USERNAME parameter. AUTHPASS Specify the password that corresponds to the above-mentioned USERNAME. This parameter once again appears only if the SNMPVERSION selected is v3. CONFIRM PASSWORD Confirm the AUTHPASS by retyping it here. AUTHTYPE This parameter too appears only if v3 is selected as the SNMPVERSION. From the AUTHTYPE list box, choose the authentication algorithm using which SNMP v3 converts the specified USERNAME and PASSWORD into a 32-bit format to ensure security of SNMP transactions. You can choose between the following options: o o MD5 Message Digest Algorithm SHA Secure Hash Algorithm ENCRYPTFLAG This flag appears only when v3 is selected as the SNMPVERSION. By default, the eg agent does not encrypt SNMP requests. Accordingly, the ENCRYPTFLAG is set to NO by default. To ensure that SNMP requests sent by the eg agent are encrypted, select the YES option. ENCRYPTTYPE If the ENCRYPTFLAG is set to YES, then you will have to mention the encryption type by selecting an option from the ENCRYPTTYPE list. SNMP v3 supports the following encryption types: o o DES Data Encryption Standard AES Advanced Encryption Standard ENCRYPTPASSWORD Specify the encryption password here. CONFIRM PASSWORD Confirm the encryption password by retyping it here. TIMEOUT - Here, specify the duration (in seconds) within which the SNMP query executed by this test should time out in the TIMEOUT text box. The default is 10 seconds. 7. Next, when you try to signout of the administrative interface, you will be prompted to configure the Nsc traps test. Figure 2.4: Configuring the Nsc Traps test 8. To configure the test, specify the following in Figure 2.4: 12

17 Configuring and Monitoring the Hitachi UPS SAN TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured PORT Specify the port number at which the specified host listens. By default, this is NULL. SOURCEADDRESS - Specify a comma-separated list of IP addresses or address patterns of the hosts from which traps are considered in this test. For example, , *. A leading '*' signifies any number of leading characters, while a trailing '*' signifies any number of trailing characters. OIDVALUE - Provide a comma-separated list of OID and value pairs returned by the traps. The values are to be expressed in the form, DisplayName:OID-OIDValue. For example, assume that the following OIDs are to be considered by this test: and The values of these OIDs are as given hereunder: OID Value Host_system NETWORK In this case the OIDVALUE parameter can be configured as Trap1: Host_system,Trap2: Network, where Trap1 and Trap2 are the display names that appear as descriptors of this test in the monitor interface. An * can be used in the OID/value patterns to denote any number of leading or trailing characters (as the case may be). For example, to monitor all the OIDs that return values which begin with the letter 'F', set this parameter to Failed:*-F*. Typically, if a valid value is specified for an OID in the OID-value pair configured, then the test considers the configured OID for monitoring only when the actual value of the OID matches with its configured value. For instance, in the example above, if the value of OID is found to be HOST and not Host_system, then the test ignores OID while monitoring. In some cases however, an OID might not be associated with a separate value instead, the OID itself might represent a value. While configuring such OIDs for monitoring, your OIDVALUE specification should be: DisplayName:OID-any. For instance, to ensure that the test monitors the OID , which in itself, say represents a failure condition, then your specification would be: Trap5: any. SHOWOID Specifying true against SHOWOID will ensure that the detailed diagnosis of this test shows the OID strings along with their corresponding values. If you enter false, then the values alone will appear in the detailed diagnosis page, and not the OIDs. 13

18 Configuring and Monitoring the Hitachi UPS SAN 9. Finally, signout of the administrative interface. 2.3 Monitoring the Hitachi USP SAN To monitor the Hitachi USP SAN, do the following: 1. Login as a monitor / supermonitor user. 2. Click on the components option in the menu bar, and select the Servers option from the components menu. 3. From the component list page, click on the Hitachi USP SAN server for which you wish to view measurements. 14

19 Conclusion Chapter 3 Conclusion This document has described in detail the steps for configuring and monitoring the Hitachi SAN Servers. For details of how to administer and use the eg Enterprise suite of products, refer to the user manuals. We will be adding new measurement capabilities into the future versions of the eg Enterprise suite. If you can identify new capabilities that you would like us to incorporate in the eg Enterprise suite of products, please contact We look forward to your support and cooperation. Any feedback regarding this manual or any other aspects of the eg Enterprise suite can be forwarded to 15

Monitoring the Hitachi Storage Devices

Monitoring the Hitachi Storage Devices Monitoring the Hitachi Storage Devices eg Enterprise Version 6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Configuring and Monitoring Bluecoat AntiVirus

Configuring and Monitoring Bluecoat AntiVirus Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6

Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6 Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.

More information

Configuring and Monitoring the APC UPS

Configuring and Monitoring the APC UPS Configuring and Monitoring the APC UPS eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Configuring and Monitoring Citrix Branch Repeater

Configuring and Monitoring Citrix Branch Repeater Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of

More information

Configuring and Monitoring SiteMinder Policy Servers

Configuring and Monitoring SiteMinder Policy Servers Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

Monitoring QNAP NAS system

Monitoring QNAP NAS system Monitoring QNAP NAS system eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6

eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained

More information

Monitoring the HP Blade Servers

Monitoring the HP Blade Servers Monitoring the HP Blade Servers eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6

Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6 Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

Configuring and Monitoring Citrix Environments

Configuring and Monitoring Citrix Environments Configuring and Monitoring Citrix Environments eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Monitoring Sonic Firewall

Monitoring Sonic Firewall Monitoring Sonic Firewall eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Monitoring Bluecoat AV. eg Enterprise v6.0

Monitoring Bluecoat AV. eg Enterprise v6.0 Monitoring Bluecoat AV eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Configuring and Monitoring HP EVA StorageWorks Array

Configuring and Monitoring HP EVA StorageWorks Array Configuring and Monitoring HP EVA StorageWorks Array eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

Configuring and Monitoring FTP Servers

Configuring and Monitoring FTP Servers Configuring and Monitoring FTP Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Configuring and Monitoring Virtual Server 2005

Configuring and Monitoring Virtual Server 2005 Configuring and Monitoring Virtual Server 2005 eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Configuring and Monitoring SharePoint Servers

Configuring and Monitoring SharePoint Servers Configuring and Monitoring SharePoint Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Monitoring Coyote Point Equalizers

Monitoring Coyote Point Equalizers Monitoring Coyote Point Equalizers eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

Monitoring Network Elements

Monitoring Network Elements Monitoring Network Elements eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

Handling SNMP Traps Using eg Enterprise

Handling SNMP Traps Using eg Enterprise Handling SNMP Traps Using eg Enterprise Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Configuring and Monitoring the Client Desktop Component

Configuring and Monitoring the Client Desktop Component Configuring and Monitoring the Client Desktop Component eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

Monitoring the BlackBerry Enterprise Server

Monitoring the BlackBerry Enterprise Server Monitoring the BlackBerry Enterprise Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Configuring and Monitoring Database Servers

Configuring and Monitoring Database Servers Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

Configuring and Monitoring the Xen Desktop Broker. eg Enterprise v5.6

Configuring and Monitoring the Xen Desktop Broker. eg Enterprise v5.6 Configuring and Monitoring the Xen Desktop Broker eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of

More information

Configuring and Monitoring Event Logs

Configuring and Monitoring Event Logs Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Monitoring App V eg Enterprise v6

Monitoring App V eg Enterprise v6 Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or

More information

Monitoring Event Logs

Monitoring Event Logs Monitoring Event Logs eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Monitoring Nginx Server

Monitoring Nginx Server Monitoring Nginx Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Monitoring the Citrix Provisioning Server. eg Enterprise v6.0

Monitoring the Citrix Provisioning Server. eg Enterprise v6.0 Monitoring the Citrix Provisioning Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Monitoring the Oracle VM Server

Monitoring the Oracle VM Server Monitoring the Oracle VM Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

etrust Audit Using the Recorder for Check Point FireWall-1 1.5 etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational

More information

Monitoring Open VPN Access Server

Monitoring Open VPN Access Server Monitoring Open VPN Access Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Dell Fabric Manager Installation Guide 1.0.0

Dell Fabric Manager Installation Guide 1.0.0 Dell Fabric Manager Installation Guide 1.0.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either

More information

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6 Cnfiguring and Mnitring AS400 Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced

More information

An Introduction to SNMP

An Introduction to SNMP Contents About this Guide 3 What is SNMP? 4 SNMP Actions 4 How is SNMP Structured? 4 How Does N-central use SNMP? 6 N-central and the GET command 6 N-central and Syslog Messages 6 N-central SDK 7 Setting

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Monitoring IBM HMC Server. eg Enterprise v6

Monitoring IBM HMC Server. eg Enterprise v6 Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

Configuring and Monitoring Mail Servers

Configuring and Monitoring Mail Servers Configuring and Monitoring Mail Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

NetBrain Security Guidance

NetBrain Security Guidance NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services

More information

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Table of contents Abstract... 3 1. Verax SNMP Simulator installation... 4 2. Extracting SNMP record files from a physical

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

VERITAS NetBackup 6.0 Encryption

VERITAS NetBackup 6.0 Encryption VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Monitoring Veeam Backup Server. eg Enterprise v6

Monitoring Veeam Backup Server. eg Enterprise v6 Monitoring Veeam Backup Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

eg Integration With Trouble Ticketing Systems

eg Integration With Trouble Ticketing Systems eg Integration With Trouble Ticketing Systems eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Identikey Server Getting Started Guide 3.1

Identikey Server Getting Started Guide 3.1 Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Monitoring Symantec Backup Server. eg Enterprise v6

Monitoring Symantec Backup Server. eg Enterprise v6 Monitoring Symantec Backup Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Technical Notes P/N 302-000-337 Rev 01

Technical Notes P/N 302-000-337 Rev 01 SNMP Trap Monitoring Solution EMC SourceOne Version 7.0 and later Technical Notes P/N 302-000-337 Rev 01 September 27, 2013 These technical notes contain supplemental information about EMC SourceOne, version

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

EVault Endpoint Protection 7.0 Single Sign-On Configuration

EVault Endpoint Protection 7.0 Single Sign-On Configuration Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

TIBCO Hawk SNMP Adapter Installation

TIBCO Hawk SNMP Adapter Installation TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Adeptia Suite LDAP Integration Guide

Adeptia Suite LDAP Integration Guide Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

PRODUCT GUIDE N u c l e u s D a t a R e c o v e r y. C o m P r i v a t e L i m i t e d

PRODUCT GUIDE N u c l e u s D a t a R e c o v e r y. C o m P r i v a t e L i m i t e d PRODUCT GUIDE N u c l e u s D a t a R e c o v e r y. C o m P r i v a t e L i m i t e d Table of Contents 1. About Kernel for Novell GroupWise to Exchange... 5 1.1 Using this Manual... 5 1.2 Who should

More information

Polar Help Desk Installation Guide

Polar Help Desk Installation Guide Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Monitoring Siebel Enterprise

Monitoring Siebel Enterprise Monitoring Siebel Enterprise eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

TIBCO Spotfire Metrics Prerequisites and Installation

TIBCO Spotfire Metrics Prerequisites and Installation TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF

More information

Data Collection Agent for Active Directory

Data Collection Agent for Active Directory Data Collection Agent for Active Directory Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent Active Directory, from an

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Monitoring EMC CLARiiON

Monitoring EMC CLARiiON Monitoring EMC CLARiiON eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Monitoring MSDynamix CRM 2011

Monitoring MSDynamix CRM 2011 Monitoring MSDynamix CRM 2011 eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.2

Sophos Enterprise Console server to server migration guide. Product version: 5.2 Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the

More information

Configuring and Integrating Oracle

Configuring and Integrating Oracle Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information