Check_MK virt1 - User Manual. Valid since version 1.2.3

Size: px
Start display at page:

Download "Check_MK virt1 - User Manual. Valid since version 1.2.3"

Transcription

1 Check_MK virt1 - User Manual Valid since version 1.2.3

2

3 Contents 1 Quick start guide 1 2 Setting up with VirtualBox 2 3 Setting up with VMware ESX 6 4 Basic configuration Network and access configuration via console Network configuration Access to the web interface Protecting access to the console Basic settings on the web interface Administrating monitoring instances 19 6 Administrating Check_MK versions 21 7 Firmware installation 22 8 Device settings Changing the language Changing the network configuration Configuring host and domain names Configuring name resolution Configuring time synchronisation Forwarding syslog entries Changing the default web page Configuring outgoing s Changing access to Check_MK agents Remote access via SSH Activating instance login via SSH Activating console via SSH Activating root access via SSH

4 CONTENTS CONTENTS 10 Protecting web access via SSL Installing a certificate Creating a new certificate and having it signed Creating a new certificate and signing it yourself Uploading existing certificate Configuring access types Displaying current configuration/certificates Device control Restarting / Shutting down Restoring factory configuration Failover cluster Prerequisites Migration of existing installations Configuration of the cluster Network configuration Host names Connecting the cluster The state of the cluster Special cases in the cluster Access to resources Device settings IP addresses or host names of the nodes Administrating Check_MK versions and monitoring instances Administrative tasks Firmware updates in the cluster Disbanding clusters Exchanging a device Diagnostics and troubleshooting Logging SMS notifications Starting up the modem Diagnostics Diagnostics Logs

5 CONTENTS CONTENTS 15 Service & support Manual Internet Firmware Hardware support Software support Appendices 54.1 CE declaration of conformity Licences VMware Tools VirtualBox Guest Additions Legal notice Index 56

6 Check_MK virt1 - User Manual 1 / Quick start guide Download the required Check_MK virt1 archive from our website 1. Import the archive (file extension.ova) into your hypervisor. Launch the imported virtual machine and open the local console. During the launching procedure, a dialogue box asking you to initialise the data medium will appear on the screen. Confirm this box. After a few minutes the launching procedure will resume. On completion of the launching procedure, the console status screen will be displayed. So that the appliance can be used for monitoring, there are some settings that need to be made. Press the key <F1> and, using the configuration dialogue box, configure the following settings as a minimum: Network configuration Access to the web interface Once you have configured these settings, you can access the web interface from a computer connected to the network by entering the URL into the web browser. Log into the web interface using the password you just configured. In order to make things such as name resolution and sending s possible, you must make further settings in the web interface. You can read more about this in the chapter on basic configuration on the web interface. You do not need this to get started however. Select the item instance administration on the menu now shown and click on Create new instance on the following page. Now create a new monitoring instance using the current dialogue box. This instance will start automatically. You can now call up the URL in your browser. Log in using the access data you selected when creating the instance. 1

7 Check_MK virt1 - User Manual 2 / Setting up with VirtualBox The software VirtualBox is a widely used virtualisation solution for desktop PCs. It is well-suited for tests and experiments. This chapter describes how to import the virtual appliance Check_MK virt1 with the current version of VirtualBox. This guide assumes that you have already installed and launched VirtualBox on your computer. First, download Check_MK virt1 from our website 1 onto your computer. Check_MK virt1 will be offered for download as an OVA file (Open Virtual Appliance). You can open this file directly in your VirtualBox. To do this, first select the File menu on the VirtualBox interface and then the menu item Import appliance. The dialogue box for importing appliances will then open. Now click on the folder symbol. 1

8 Check_MK virt1 - User Manual 3 / 56 Select the downloaded OVA file of the Check_MK appliance from your hard drive and confirm the dialogue box by clicking on Open. Back in the previous dialogue box, confirm your selection again by clicking on Next >.

9 Check_MK virt1 - User Manual 4 / 56 The dialogue box that follows will display detailed information on the appliance. In this box you can view and also change the default settings, e.g. amount of memory or number of CPUs. The appliance is preconfigured with a memory of 4096 MB and 2 CPU cores. If you wish to change these values, click on the current value and change it. It is recommended to place the tick by Reinitialize the MAC address of all network cards so that there are no conflicts when Check_MK virt1 appliances are used more than once.

10 Check_MK virt1 - User Manual 5 / 56 Once all settings have been made, start the importing process by clicking on Import. A dialogue box will open showing the progress of importing. Once importing is complete, you will find a new item Check_MK virt1 in the left-hand list of the main VirtualBox window. Select this item and press Start in the action bar at the top in order to launch Check_MK virt1. Once you have done this, a window showing the Check_MK virt1 screen output will open. You have now completed the VirtualBox specific steps and can continue with the Chapter 4 of your appliance.

11 Check_MK virt1 - User Manual 6 / Setting up with VMware ESX The software VMware ESX or ESXi is a virtualisation solution that is widely used in professional environments. This chapter describes how to import the virtual appliance Check_MK virt1 onto a VMware ESXi server version 5.0. This guide assumes that you have already installed and launched VMware ESXi on a server in your network and have also installed and launched the VMware vsphere Client on your computer. First, download Check_MK virt1 from our website 1 onto your computer. Check_MK virt1 will be offered for download as an OVA file (Open Virtual Appliance). You can import this file onto your ESXi server using the VMware vsphere Client. To do this, first select the File menu on the the vsphere Client interface and then the menu item Deploy OVF template. The dialogue box for importing appliances will then open. Now click on the button Browse and select the OVA file you downloaded onto your hard drive before. 1

12 Check_MK virt1 - User Manual 7 / 56 Confirm your selection by clicking on Next >. You will now be displayed a dialogue box with details on the selected appliance. In this case, Check_MK virt1 will be imported in version

13 Check_MK virt1 - User Manual 8 / 56 Continue by clicking on Next >. In the following dialogue box you can change the default name of the appliance. The appliance will appear with this name on your vsphere interface after importing.

14 Check_MK virt1 - User Manual 9 / 56 Once you have entered the name you want, confirm by clicking on Next >. Finally, you will be displayed a confirmation dialogue box showing all the details that were just entered. You can put a tick below the text box if you wish to launch Check_MK virt1 directly after importing. If all details are correct, confirm the import with Finish.

15 Check_MK virt1 - User Manual 10 / 56 The deployment of Check_MK virt1 will now take place. Depending on the network connection between your computer and the ESX server, this may take a few minutes. Once importing is complete, you can select Check_MK virt1 on the vsphere interface and go to the console, where a dialogue box asking which language you would like to use will appear during the launching process.

16 Check_MK virt1 - User Manual 11 / 56 Note Check_MK virt1 is supplied with a virtual network interface of the type Intel PRO/1000 MT Server (82545EM), as this is compatible with the most common virtualisation solutions. On an ESX server it is recommended, for the sake of improving performance, to change the network interface card type to VMXNET 3. You have now completed the VMware ESX specific steps and can continue with the Chapter 4 of your appliance.

17 Check_MK virt1 - User Manual 12 / Basic configuration When starting up for the first time, a message will appear asking you what language to choose. This language will be saved for the entire device. You will then be displayed a message asking you to initialise the data medium. Confirm this dialogue box and wait for device startup to be resumed and for the status screen to then be displayed.

18 Check_MK virt1 - User Manual 13 / 56 Once the device has been started up, you will see the status screen on the local console. This screen will show you general status information and the most important configuration options of your device.

19 Check_MK virt1 - User Manual 14 / Network and access configuration via console From the status screen, you can get to the configuration menu by pressing the key <F1>. For starting up the device, you now need to set the network configuration and specify the device password Network configuration Use this dialogue box to set up the network configuration of the device. The IP-address, netmask and the optional default gateway will be queried. In most cases, the device will need to also access network devices outside of its own network segment. The default gateway must also be configured for this purpose. Once these values have been entered, the configuration will be activated, meaning the device will be immediately reachable via the network and at the entered IP address. One way of testing this is to send a ping from another device in the network Access to the web interface A large part of the device s configuration is carried out via the web interface. Access to this web interface is protected by a password, the device password, which you need to specify first. The factory settings do not include a device password, meaning you cannot yet access the web interface. Press the key <F1> on the status screen and select device password in order to set the password. Then select the option web interface from the configuration menu to activate the web interface.

20 Check_MK virt1 - User Manual 15 / 56 Once you have completed these steps you will see the configured IP address in the box device information and web interface: on in the access box on the status screen of the console, as shown in the screenshot above. If you have already correctly connected the device with your network, you will now see that the network connection is active (Network: ACTIVE in the Status box) Protecting access to the console After the basic configuration, access to the local console is not protected. This means that anyone who has direct access to the console (e.g. through access to the server room, or in the case of Check_MK virt1, through access to the management interface of the virtualisation solution), is able to change the basic configuration of the device. In order to protect such access, you have the option to activate a login that must be used in conjunction with the device password before settings can be made or the current status viewed. If you have already activated the web interface, you will have already set a device password and do not need to assign a new one. If you have not done so, open the configuration menu on the console by pressing the key <F1> and select device password to set the password. Then select console login from the configuration menu in order to activate this option.

21 Check_MK virt1 - User Manual 16 / 56 Once you have completed these steps, you will see console login: on in the access box on the status screen of the console, as shown in the screenshot above. 4.2 Basic settings on the web interface Having enabled access to the web interface through the configuration you performed previously, you can now open the web interface over a web browser on a computer that is connected with the device via the network. For this purpose, enter the URL for the device (in this case / /) into the address bar of the browser. You will now see the login screen of the web interface.

22 Check_MK virt1 - User Manual 17 / 56 After you have logged in with the password previously specified for the web interface, the main menu will open. From here, you can get to all features of the web interface. On this menu, select the item device settings. In this dialogue box you can see and change the most important device settings.

23 Check_MK virt1 - User Manual 18 / 56 By clicking on the titles of the settings, you will be taken to the dialogue box for adjusting the respective setting. If you have DNS servers available in your environment, you should now configure one or more of these first so that the resolution of host names can be used. If you have one or more NTP servers for time synchronisation available in your environment, enter these as IP addresses or hostnames under the item NTP server. If s are to be sent from your device, such as notifications in the event of problems being detected, you must configure the option Outgoing s. To do this, enter the SMTP relay server responsible for this device and any access data required. All s generated on the device will be sent to this server. Under this setting, you can also configure all s generated by the operating system of the device (e.g. in the case of critical errors) to be sent to a particular address. The basic configuration of the device is now complete and you can continue setting up the first monitoring instance.

24 Check_MK virt1 - User Manual 19 / Administrating monitoring instances Open the main menu of the web interface and click on the menu item instance administration. In this dialogue box, you have access to all monitoring instances of this device. You can configure, update and delete monitoring instances as well as create new ones. The first time you open the dialogue box it will be empty. To create your first monitoring instance, click on the button Create instance. In the dialogue box that then appears, you can specify the initial configuration of the monitoring instance. Start by entering an instance ID, which serves to identify the monitoring instance. The instance ID may only contain letters, numbers, - and _, must start with a letter or _ and may be a maximum of 16 characters in length. Now select the Check_MK version with which to create the monitoring instance. You can leave all other settings as they are for the time being. You can change these settings later on using the instance editing dialogue. As soon as you confirm the dialogue box with Create instance, the new monitoring instance will be created. This may take a few seconds. Once the instance has been created or started, you will be taken to the list of all monitoring instances.

25 Check_MK virt1 - User Manual 20 / 56 In this list, you will see the instance just created with the ID sysmon. You can also see the status of the instance, where active means the instance has been fully started. You can start or stop the instance with the button to the right of the status. On the left you will see different icons, with which you can a) edit the settings of the instance, b) update the instance and c) delete the instance. After the instance has been created and started, you can either click on the instance ID or enter the URL for the monitoring instance (in this case sysmon/) into the address bar of your browser. You will now see the login screen of the monitoring instance, where you can log in using the access data you entered when creating the instance. Once you have logged in you can set up Check_MK in the usual manner. The snap-in Check_MK Appliance is available in all monitoring instances and for all administrators. You will find it in the sidebar. This snap-in will take you from your monitoring instances directly to the web interface of the device.

26 Check_MK virt1 - User Manual 21 / Administrating Check_MK versions It is possible to install several Check_MK versions on the device at the same time. This allows several instances to be run in different versions and individual instances to be changed to newer or older versions independently of one another. Meaning you can install a new version for example, and try it out in a test instance initially in order to then update your productive instance if testing is successful. To administrate the Check_MK versions, select the item Check_MK versions in the main menu of the web interface. The dialogue box that then appears will list all Check_MK versions installed. If a version is not being used by any instance and is not the last installed version, you have the option to delete it from the appliance. Using this dialogue box, you can also upload new Check_MK versions onto the device in order to use them in new instances or to update existing instances. To do this, download the desired Check_MK version from our website 1 onto your computer (search for Check_MK appliance in the Distribution column). Then select the file from your hard drive using the file selection dialogue and confirm your selection by clicking on Upload & install. The Check_MK version will now be uploaded onto the device. Depending on the network connection between your computer and the ESX server, this may take a few minutes. Once uploading is complete, you will see the new version in the table of installed versions. 1

27 Check_MK virt1 - User Manual 22 / Firmware installation You can update the software of your device to a newer version or downgrade to an earlier version. Both are carried out via the so-called firmware update in the web interface. First, download the desired firmware package from our website 1 onto your computer. Then open the web interface of the device and select the item Firmware update in the main menu. In the box that appears, select the firmware package you downloaded before from the hard drive. Confirm the dialogue box by clicking on Upload & install. The package will now be loaded onto your device. Depending on the network connection, this may take a few minutes. Once the package has been recognised as valid firmware, you will be shown a dialogue box asking you to confirm the firmware update. Depending on the version differences between the current version and the one to be installed, various messages will appear telling you what to do with your data during the update. Change in the first digit: You must back up the data of your device manually and restore it after the update. An update cannot be performed without data migration. Update to higher number for the second digit: The update can be carried out without data migration. You are advised to back up your data beforehand anyway. Downgrade to lower number for the second digit: You must back up the data of your device manually and restore it after the update. An update cannot be performed without data migration. Change in the third digit: The update can be carried out without data migration. You are advised to back up your data beforehand anyway. When you confirm this dialogue box, the device will be restarted immediately. When the device is restarting, the firmware last uploaded will be installed. This will cause restarting to take much longer than usual. It will normally take less than 10 minutes however. A further restart will be carried out after the installation has taken place. This will complete the firmware update. 1

28 Check_MK virt1 - User Manual 23 / Device settings In this dialogue box you can change the default configuration of the device. All settings will become effective immediately after saving. 8.1 Changing the language During the basic configuration, you specified the language of your device. You can change this at any time, either via the console configuration or via the device settings in the web interface. 8.2 Changing the network configuration During the basic configuration, you specified the network configuration of your device. You can change this at any time, either via the console configuration or via the device settings in the web interface. If you made an error when specifying the network configuration, the device may no longer be accessible via the network. In this case you can only correct the settings on the console. 8.3 Configuring host and domain names Host and domain names serve to identify a computer in the network. When sending s for example, these names are used to form the sender address. In addition, the configured host name is added as a source host to all log entries that are sent to a syslog server. This makes it easier to assign the entries. 8.4 Configuring name resolution In most environments, DNS servers are used to translate IP addresses into host names and vice versa. Host names or FQDNs (Fully Qualified Domain Names) are frequently used for monitoring instead of IP addresses. In order to use the name resolution on your device, you must configure the IP addresses of at least one DNS server in your environment. It is recommended to enter at least two DNS servers. Only when you have configured this option can you use host and domain names (in the configuration of NTP or mail servers for example).

29 Check_MK virt1 - User Manual 24 / Configuring time synchronisation The system time of the device is used for many purposes, such as for recording measurement data or writing log files. A stable system time is therefore very important. This is best ensured by using a time synchronisation service (NTP). To activate the synchronisation, enter the host address of at least one time server under NTP server. 8.6 Forwarding syslog entries Log messages are generated on the device by the operating system and some permanently running processes. They are initially written into a local log via syslog. You can also send these entries to a central or higher-level syslog server where they can be evaluated, filtered or archived. Select the item Syslog to configure the forwarding. In the dialogue box that appears next, you can configure which protocol you wish to use for forwarding. Syslog via UDP is more widely used, but not as reliable as via TCP. So if your syslog server supports both protocols, it is recommended to use TCP. You also need to configure the host address of the syslog server that is to receive the log messages. 8.7 Changing the default web page If you access the host address of the device directly via the web browser without entering a path, you will be taken to the web interface of the device in the default setting. However, it is also possible for you to be forwarded directly to a monitoring instance of your choice. You can configure this using the setting HTTP access without URL. Via this setting, select the monitoring instance to open instead of the web interface. 8.8 Configuring outgoing s So that you can send s from the device (in the case of events during monitoring for example), the forwarding of s to one of your mail servers must be configured. In order for the sending of s to work, you must have at least configured the host address of your mail server as an SMTP relay server. This server will receive the s from your device and forward them. However, configuring the SMTP relay server is only sufficient as long as your mail server accepts s via anonymous SMTP. If your mail server requires authentication, then you need to activate the appropriate login method under the item Authentication and indicate the access data of an account that can log onto the mail server. If you do not even receive any s after the configuration, it is worth taking a look at the system log of the device. All attempts to send s are logged here. The device itself can send system s if there are critical problems (e.g. a job cannot be executed or a hardware problem has been detected). In order to receive these s, you must configure an address to which these s are to be sent.

30 Check_MK virt1 - User Manual 25 / Changing access to Check_MK agents A Check_MK agent is installed on the device and can only be queried by the device itself in the basic setting. You can use it to create an instance on the device and directly add the device to the monitoring. It is also possible to make the Check_MK agent accessible from another device, meaning the device can also be monitored by another Check_MK system (e.g. in a distributed environment of a central server). For this purpose, you can configure a list of IP addresses that are allowed to contact the Check_MK agent.

31 Check_MK virt1 - User Manual 26 / Remote access via SSH You can activate different types of access via the remote maintenance protocol SSH. As a general rule, a) access to the console and b) direct login to the instances are supported. Access to the root system user is possible but not recommended or supported since it is very easy to damage the configuration or the software through doing so. 9.1 Activating instance login via SSH You can activate access to the command line of the individual monitoring instances, enabling you to view and control the entire environment of the instance. This access is controlled via the instance administration. In the settings dialogue of each individual instance, you can activate and deactivate access as well as set a password to protect access. 9.2 Activating console via SSH It is possible to activate access to the console of the device via the network, enabling you to view and adjust the basic configuration of the device even without direct access to the device. You can enable access via the configuration dialogue of the console. To do this, select the menu item Activate console via SSH.

32 Check_MK virt1 - User Manual 27 / 56 When you activate this option, you will be asked to enter a password. You must enter this password if you are connecting as a setup user via SSH. Access will be automatically enabled directly after confirming this dialogue. You can now connect to the device as a setup user using an SSH Client (e.g. PuTTY). You can check whether access is currently enabled by looking at the Access box of the console s status screen. 9.3 Activating root access via SSH It is possible to activate access to the device as a root system user. Once the device has initialised however, this access will be deactivated. Once activated, you can log onto the device as a root user via SSH. Caution Commands you execute on the device as root can cause lasting alteration or damage, not only to your data, but also to the delivered system. The manufacturer shall accept no liability for alterations you make in this way. Only activate and use the root user if you are sure what you are doing and only for diagnostic purposes.

33 Check_MK virt1 - User Manual 28 / 56 You can enable access via the configuration dialogue of the console. To do this, select the menu item root access via SSH. When you activate this option, you will be asked to enter a password. You must enter this password if you are connecting as a root user via SSH. Access will be automatically enabled directly after confirming

34 Check_MK virt1 - User Manual 29 / 56 this dialogue. You can now connect to the device as a root user using an SSH Client (e.g. PuTTY). You can check whether access is currently enabled by looking at the Access box of the console s status screen.

35 Check_MK virt1 - User Manual 30 / Protecting web access via SSL Access to your device s web interface is factory-set to take place via HTTP in plain text. You can protect this access via HTTPS (SSL), encrypting the data transferred between your browser and the device. You can open the configuration by pressing the button Web access type in the device settings Installing a certificate In order to encrypt data traffic, the device needs a certificate and a private key first. There are several ways available for you to install these. Create a new certificate and have it signed by a certification authority by sending a certificate signing request (CSR) Upload an existing private key and certificate Create a new certificate and sign it yourself You can choose one of the options above that fits your requirements and possibilities. Certificates signed by certification authorities generally have the advantage that clients can automatically verify the authenticity of the host (device) at the time of access. This is normally the case with official certification authorities. If a user accesses the web interface via HTTPS and the certificate is either self-signed or signed by a certification authority not trusted by the user, this will cause a warning to appear in the user s web browser first Creating a new certificate and having it signed To create a new certificate, select the option New certificate. In the dialogue box that follows, you now enter device and operator information, which is then stored on the certificate and can be used by both the certification authority and clients later on to verify the certificate.

36 Check_MK virt1 - User Manual 31 / 56 Once you have confirmed the dialogue box with Save, you can download the certificate signing request (CSR) file from the web access page. You must provide this file to your certification authority. You will then receive a signed certificate from your certification authority and, where necessary, a certificate chain (often consisting of intermediate and/or root certificates). You will usually receive these in the form of.pem- oder.crt files or directly in PEM-encoded text form. You can now transfer the signed certificate to the device via the Upload certificate dialogue. If you have received a certificate chain, you can upload it via this dialogue too. Once you have confirmed the dialogue with Upload, you can continue configuring the types of access Creating a new certificate and signing it yourself To create a new certificate, select the option New certificate. In the dialogue box that follows, you now enter device and operator information, which is then stored on the certificate and can be used clients later on to verify the certificate.

37 Check_MK virt1 - User Manual 32 / 56 In the last section Signing, you now select Create self-signed certificate. After that you can specify the maximum validity period of the certificate. Once this validity period has expired, you must generate a new certificate. This should be done in good time before expiration so that there are no problems accessing your device. Once you have confirmed the dialogue with Save, you can continue configuring the types of access Uploading existing certificate If you have an existing certificate along with a private key, and wish to use this to protect HTTPS traffic, you can transfer these files to your device via the Upload certificate dialogue. Once you have confirmed the dialogue with Upload, you can continue configuring the types of access Configuring access types Once you have installed a certificate, you can now configure the access types according to your requirements. If you wish to protect access to your device via HTTPS, you are recommended to select the option Forced HTTPS. The device will only respond via HTTPS, but will redirect all incoming HTTP requests to HTTPS. This means that users who inadvertently access the web interface via HTTP, either directly or via bookmarks, will automatically be redirected to HTTPS. If it is very important for not a single request to go over the net in plain language, you can select the option HTTPS only. This setting will cause users accessing via HTTP to receive an error message. You can also have a simultaneous configuration of HTTP and HTTPS. However, this setting is only recommended in exceptional cases, for migration purposes or for testing. If you ever want to deactivate HTTPS, you can do this by selecting the option HTTP only.

38 Check_MK virt1 - User Manual 33 / Displaying current configuration/certificates On the access type configuration page, you can see the types of access currently active as well as information regarding the current certificate.

39 Check_MK virt1 - User Manual 34 / Device control Procedures such as starting, restarting or shutting down the device all come under device control. You can give these commands in different ways Restarting / Shutting down You can restart or shut down the device over both the web interface and the console. In the web interface you will find the menu items Restart device and Shut down device under the point Control device in the main menu. The device will execute the action immediately after the command has been selected. In the console, you can get to the device control menu by pressing <F2>.

40 Check_MK virt1 - User Manual 35 / Restoring factory configuration You can reset your device to factory settings. This means that any changes you have made to the device (e.g. your device settings, monitoring configuration or recorded statistics and logs) will be deleted. When resetting the settings, the firmware version currently installed will be kept; the firmware installed when the device was delivered will not be restored. You can perform this action on the console. To do this, press the key <F2> on the status screen and select Restore factory configuration in dialogue box that follows. Confirm the next dialogue box by clicking on Yes. Your data will now be deleted from the device and the device then restarted immediately. The device will now start with a fresh configuration.

41 Check_MK virt1 - User Manual 36 / Failover cluster You can combine two Check_MK appliances to form a failover cluster. In doing so, all configurations and data will be synchronised between the two devices. The devices connected as a cluster are also referred to as nodes. One of the nodes in the cluster assumes the active role, executing the tasks of the cluster. There is a constant exchange of information between both nodes regarding their state. As soon as the inactive node detects that the active node can no longer complete its tasks (due to failure for example), the inactive node assumes the tasks and becomes the active node. The failover cluster is there to increase the availability of your monitoring installation by protecting a device or individual components against hardware failures. The clustering is not a replacement for data backup. The cluster ensures a shorter downtime in the following situations: If the RAID in a Check_MK rack1 or the SD card in a Check_MK rail1 is no longer accessible, the inactive node takes control of the resources. If the device that has been active until now can no longer be accessed (has failed), the inactive node takes control of the resources. If the active device can no longer access the external network and, unlike the inactive node, has a connection to this network, the inactive node takes control of the resources. If you carry out a firmware update, you can update the nodes individually. While one node is being updated, the other node will continue performing the monitoring Prerequisites In order to build a cluster, you first need two compatible Check_MK appliances. The following models can be clustered with one another: 2x Check_MK rack1 2x Check_MK rail1 2x Check_MK virt1 1x Check_MK rack1 and 1x Check_MK virt1 In addition, the two devices must use a compatible firmware, and at least version The devices must be wired with at least two mutually independent network connections. It is recommended to use as direct a connection as possible between the devices and to make a further connection over your LAN.

42 Check_MK virt1 - User Manual 37 / Migration of existing installations Devices that were delivered and initialised with the firmware version or higher can be clustered without migration. Devices initialised with earlier firmware must first be updated to version or higher. The factory settings of the device need to then be restored, preparing the device for clustering. Please note that, in order to prevent data loss, you must back up your data from the device and then restore it Configuration of the cluster This guide assumes that you have already pre-configured both devices to the extent where the web interface can be opened with a web browser. Before actually setting up the cluster, you must first prepare both devices. This mainly involves adapting the network configuration to fulfil clustering requirements (see prerequisites). The configuration of a cluster with two Check_MK rack1 is shown in the following. A cluster is built which looks as shown in the diagram below. The interface designations LAN1, LAN2 etc. used in the diagram correspond to the designations of the physical interfaces on the device. In the operating system, LAN1 corresponds to the device eth0, LAN2 to the device eth1 etc. This configuration complies with the recommendations for the clustering of two Check_MK rack1. You can of course use IP addresses in your environment that suit it. Make sure however that the internal cluster network (bond1 in the diagram) uses a different IP network to the external network (bond0 in the diagram) Network configuration Open the web interface of the first node, select Device settings and Network settings at the top. You will now be on the network settings configuration page. There are two modes available to you here. The Basic mode, which you can only use to configure your device s LAN1, is activated by default.

43 Check_MK virt1 - User Manual 38 / 56 The Advanced mode is required for clustering. In order to activate this mode, click on the button Advanced mode at the top and confirm the security prompt. All network interfaces available in the device will be shown to you on the following page. Only the interface eth0 (corresponding to LAN1 ) will currently have a configuration, which was applied by the Basic mode. Now create the first bonding interface bond0 by clicking on Create bonding. For this purpose, enter into the dialogue that follows all data as shown in the diagram below and confirm the dialogue with Save.

44 Check_MK virt1 - User Manual 39 / 56 Now create the second bonding interface bond1 with the appropriate configuration.

45 Check_MK virt1 - User Manual 40 / 56 After you have created the two bonding interfaces, you will be able to review all settings made in the network configuration dialogue.

46 Check_MK virt1 - User Manual 41 / 56 Once you have successfully completed all configuration steps, make the settings effective by clicking on Activate changes. The new network settings will then be loaded. After few seconds, the network configuration will look like this: Now, with the appropriate settings, repeat the configuration of network settings on your second device also Host names Devices to be connected in a cluster must have different host names. You can specify these now in the device settings. In our example, we configure node1 as a host name on the first device and node2 on the second device Connecting the cluster Having completed preparations, you can now continue setting up the cluster. To do this, open the Clustering module in the main menu of the first device (here node1) in the web interface and click on Manually set up cluster. Now enter the appropriate configuration in the cluster creation dialogue and confirm the dialogue with Save. If you require more information about this dialogue, click on the icon beside the MK logo in the top right-hand corner. Context help will then appear in the dialogue explaining the individual options.

47 Check_MK virt1 - User Manual 42 / 56 On the following page, you can connect the two devices to form a cluster. To do this, you need to enter the password of the web interface of the second device. This password is used once to establish the connection between the two devices. Then confirm the security prompt if you are sure that you want to overwrite the data of the target device with the IP address displayed. Once this connection is successful, cluster setup is commenced. You can have the current status displayed on the cluster page.

48 Check_MK virt1 - User Manual 43 / 56 As soon as the cluster has been successfully built, the synchronisation of monitoring data will start from the first to the second node. While this synchronisation is still taking place, all resources, including any monitoring instances you may have, will be started on the first node. From now on you can, using the cluster IP address (here ), access the resources of the cluster (e.g. your monitoring instances), regardless of the node by which the resources are currently being held The state of the cluster When the first synchronisation is complete, your cluster will be fully operational. You can view the state at any time on the cluster page.

49 Check_MK virt1 - User Manual 44 / 56 Using the status screen on the console, you can also view the current state of the cluster in the Cluster box in summarised form. The role of the respective node is shown after the current status with (M) for the master host and (S) for the slave host Special cases in the cluster Access to resources All requests to the monitoring instances (e.g. web interface access) as well as incoming messages (e.g. SNMP traps or syslog messages to the event console or requests to Livestatus) should normally always be sent via the cluster IP address. Only in exceptional cases (e.g. diagnostics or updates of a particular node) should you need to access the individual nodes directly.

50 Check_MK virt1 - User Manual 45 / Device settings The settings (e.g. time synchronisation or name resolution settings) that have been made independently on the individual devices until now, are synchronised between the two nodes in the cluster. However, you can only execute these settings on the node that is active at the time. The settings are locked on the inactive node. There are some device-specific settings, (e.g. those of the management interface of the Check_MK rack1) which you can adapt to the individual devices at any time IP addresses or host names of the nodes To be able to edit the IP configuration of the individual nodes, you must first disband the connection between the nodes. To do this, click on Disband cluster on the cluster page. You can then adapt the desired settings via the web interface of the individual nodes. Once you have made the adjustments, you must now select Reconnect cluster on the cluster page. If the nodes can be successfully reconnected, the cluster will resume operation after a few minutes. You can see the status on the cluster page Administrating Check_MK versions and monitoring instances The monitoring instances and Check_MK versions are also synchronised between the two nodes. You can only modify these in the web interface of the active node. If, to do this, you also access the cluster IP address directly, you will always be referred to the device with which you can configure these things Administrative tasks Firmware updates in the cluster The firmware version of a device is not synchronised in cluster operation. The update is thus carried out for each node. You have the advantage however that one node can continue performing the monitoring while the other node is updated. When updating to a compatible firmware version, you should always proceed as follows: First open the Clustering module in the web interface of the node to be updated. Now click on the heart symbol in the column of this node and confirm the security prompt that follows. This will put the node into maintenance state. Nodes that are in maintenance state release all resources currently active on the node, upon which the other node takes control of them. While a node is in maintenance state, the cluster is not failsafe. So if the active node is now switched off, the inactive node in maintenance state will not take control of the resources. If you now additionally put the second node into maintenance state, all resources will be shut down. These will only be reactivated when a node is taken out of maintenance state. You must always remove the maintenance state again manually. If the cluster page shows the following, you will see that the node is in maintenance state.

51 Check_MK virt1 - User Manual 46 / 56 You can now perform the firmware update on this node, as on standalone devices also. After you have successfully performed the firmware update, open the cluster page once more and remove the maintenance state of the updated device. The device will then automatically merge into cluster operation, upon which the cluster becomes fully functional again. It is recommended to run the same firmware version on both nodes. You should therefore repeat the same procedure for the other node next.

52 Check_MK virt1 - User Manual 47 / Disbanding clusters It is possible to disband the nodes from a cluster and continue running them separately. When doing so you can continue using the synchronised configuration on both devices, or reset one of the devices to factory settings and reconfigure it for example. You can remove one or both nodes from the cluster during operation. If you wish to use both nodes, you must ensure that the data synchronisation is in good working order beforehand. You can verify this on the cluster page. In order to disband a cluster, click on Disband cluster on the cluster page of the web interface. Read the text of the confirm prompt that follows. In the different situations, this text contains information as to the state the respective device is in after the disconnection. The disconnection of the devices must be carried out on both nodes separately, so that both devices can be run separately in future. If you only wish to use one of the devices in future, disconnect the cluster on the device you intend to continue using and then restore the factory settings on the other device. Once you have disconnected a node from the cluster, the monitoring instances will not be started automatically. If you wish to start the monitoring instances, you need to do so next via the web interface Exchanging a device If the hard drives of the old device are in good order, you can take these from the old device and insert them into the new device, wiring the new device in exactly the same way as the old device was wired and then switching it on. After starting, the new device will merge into the cluster in the same way as the old device. If you want to completely replace an old device with a new one, you should proceed in the same way as when disbanding the cluster completely (see previous chapter). To do this, select one of the previous devices, disconnect this device from the cluster and create a new cluster with this device and the new device Diagnostics and troubleshooting Logging Cluster administration is a largely automatic function, whereby automatic processes on the nodes decide which device which resources are to be started and stopped on. This behaviour is logged in the form of

53 Check_MK virt1 - User Manual 48 / 56 detailed log entries. You can access these entries from the cluster page by pressing the button Cluster log. Please note that these entries, just like the other system messages, are lost when restarting the device. If you would like to keep the messages for longer, you can download the current log file over your browser or set up a permanent forwarding of log messages to a syslog server.

54 Check_MK virt1 - User Manual 49 / SMS notifications It is possible to attach a GSM modem to the device in order to have SMS notifications sent over it by Check_MK (in the event of critical problems for example). The GSM modem CEP CT63 GSM USB/serial and the UMTS /GSM modem CEP CEP HT63 e are currently supported. You can either order these together with your appliance or purchase them from us later as accessories Starting up the modem In order to put the modem into operation, you must insert a functioning SIM card, attach the modem to a free USB connector on your appliance using the enclosed USB cable and connect the modem to the mains using the enclosed power adapter. As soon as this has been done, the device will automatically detect the modem and set it up. Open the web interface of the device and select the module SMS administration. The current state of the modem as well as the connection with the mobile phone network will be displayed on this page. If you need to enter a PIN to use your SIM card, you can specify this PIN under SMS settings.

55 Check_MK virt1 - User Manual 50 / Diagnostics If sent messages do not reach you, you can view all sent or non-sent messages and messages awaiting sending on the page SMS administration. The entries in these lists will be kept for a maximum of 30 days and then automatically deleted. It is possible, via the menu item Send test SMS, to send a test SMS to a number of your choice. You will find further information on possible SMS sending errors in the SMS log.

56 Check_MK virt1 - User Manual 51 / Diagnostics 14.1 Logs Despite careful tests, it cannot be altogether ruled out that unexpected errors may occur, which are difficult to diagnose without looking at the operating system. One option is to have the log entries that are generated on the system sent via syslog to a syslog server. However, the log entries of the individual monitoring instances are not processed via syslog, meaning they are not forwarded and can only be viewed on the device. In order to make diagnostics on the device easier, there is a view that displays the device s various log files. You can go to this view by clicking on the menu item Log files in the main menu of the web interface. You can select the logs of the device here and view their current content. Note The system log is reinitialised each time the device is started up. If you would like to keep the log entries, you must send them to a syslog server. You can also view the system log on the local console. The last entries of the system log are displayed on the second terminal. You can get to this terminal via the key combination CTRL + ALT + F2. All

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET

GX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET If you re not using VMware vsphere Client 4.0, your screens may vary. GX-V VIRTUAL GMS SERVER VMware vsphere / vsphere Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Comply with the GX-V Host

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Virtual Appliance Installation Guide

Virtual Appliance Installation Guide > In This Chapter Document: : Installing the OpenManage Network Manager Virtual Appliance 2 Virtual Appliance Quick Start 2 Start the Virtual Machine 6 Start the Application 7 The Application is Ready

More information

User Manual. User Manual for Version 4.4.0.8

User Manual. User Manual for Version 4.4.0.8 User Manual User Manual for Version 4.4.0.8 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole

More information

13.1 Backup virtual machines running on VMware ESXi / ESX Server

13.1 Backup virtual machines running on VMware ESXi / ESX Server 13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

ALOHA Load-Balancer. Virtual Appliance quickstart guide. Document version: v1.0. Aloha version concerned: v5.0.x

ALOHA Load-Balancer. Virtual Appliance quickstart guide. Document version: v1.0. Aloha version concerned: v5.0.x ALOHA Load-Balancer Virtual Appliance quickstart guide Document version: v1.0 Aloha version concerned: v5.0.x Last update date: 15th June 2012 Summary 1 Hypervisor Intergration 3 1.1 Citrix Xenserver 6.0

More information

Product Version 1.0 Document Version 1.0-B

Product Version 1.0 Document Version 1.0-B VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the

More information

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to

More information

OnCommand Unified Manager 6.2

OnCommand Unified Manager 6.2 OnCommand Unified Manager 6.2 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Configuring the BIG-IP system for FirePass controllers

Configuring the BIG-IP system for FirePass controllers Deployment Guide Configuring the BIG-IP System with FirePass Controllers for Load Balancing and SSL Offload Configuring the BIG-IP system for FirePass controllers Welcome to the Configuring the BIG-IP

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3

More information

IronKey Enterprise Server 6.1 Quick Start Guide

IronKey Enterprise Server 6.1 Quick Start Guide IronKey Enterprise Server 6.1 Quick Start Guide Last Updated September 2015 System Requirements Requirement Description Database Microsoft SQL Server 2005, Microsoft SQL Server 2008, or Microsoft SQL Server

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

VMware vcenter Log Insight Administration Guide

VMware vcenter Log Insight Administration Guide VMware vcenter Log Insight Administration Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.9 Contents Release Purpose...1 Platform Compatibility...1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance...2 Important Differences between

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.12 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 2 Important Differences

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

VCCC Appliance VMware Server Installation Guide

VCCC Appliance VMware Server Installation Guide VCCC Appliance VMware Server Installation Guide Content Preface... 4 System Requirements... 4 Installation Procedure... 4 CCC Virtual Machine Installation... 5 CCC Virtual Machine Management... 12 Resource

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

User Guide for Windows 10

User Guide for Windows 10 User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading

More information

OnCommand Unified Manager 6.3

OnCommand Unified Manager 6.3 OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

3.5 LAN HDD Enclosure User s Manual

3.5 LAN HDD Enclosure User s Manual 3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc. Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this

More information

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

OnCommand Performance Manager 2.0

OnCommand Performance Manager 2.0 OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

vsphere App HA Installation and Configuration Guide

vsphere App HA Installation and Configuration Guide vsphere App HA Installation and Configuration Guide VMware vsphere App HA 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Configuration Manual English version

Configuration Manual English version Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

- 1 - SmartStor Cloud Web Admin Manual

- 1 - SmartStor Cloud Web Admin Manual - 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

Setup Cisco Call Manager on VMware

Setup Cisco Call Manager on VMware created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while

More information

Storage Sync for Netgear Version 10.0. Installation Guide for Netgear ReadyNAS 6.0 Intel Base NAS

Storage Sync for Netgear Version 10.0. Installation Guide for Netgear ReadyNAS 6.0 Intel Base NAS Storage Sync for Netgear Version 10.0 Installation Guide for Netgear ReadyNAS 6.0 Intel Base NAS Revised January, 2014 Table of Contents Introduction... 3 Supported NETGEAR 6 Devices... 3 Using this Document...

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Securepoint Network Access Controller (NAC)

Securepoint Network Access Controller (NAC) Securepoint Network Access Controller (NAC) Administration Guide Business Class Secure Mobility Version 1 2 Securepoint NAC Administration Guide 1 Table of contents 1 Table of contents... 2 2 Table of

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information