Network Monitoring Tools
|
|
- Kathlyn James
- 8 years ago
- Views:
Transcription
1 Network Monitoring Tools (Nagios, MRTG) CSD Fall 2010 Version: 1.3 Identifier: ISP-003 Project owners Björn Pehrson Sven Jonsson Amos Nungu Project coach Hans Eriksson Team members Contact ECTS credits Anand Kannan 15 cr. Biniam Goshu Mekonnen 30 cr. Boris Ristov 24 cr. Christina Sidiropoulou 15 cr. Ekaterina Garbaruk 15 cr. Manxing Du 30 cr. Shabnam Sadat Jalalinia 15 cr. 01/07/2011
2 Version history Version Release date Changes Author(s) /07/2011 How to perform simulations was added to the Nagios configuration part Anand Kannan Shabnam Sadat Jalalinia /30/2010 Document is reviewed Boris Ristov /29/2010 More additions to the Nagios configuration part is done and the MRTG part is added to the document Anand Kannan Shabnam Sadat Jalalinia /22/2010 First version of the document was created Anand Kannan Shabnam Sadat Jalalinia 2 (10)
3 Table of contents 1. Introduction Purpose of document Scope of document Audience of document Nagios About Nagios Nagios configuration Nagios plugins Host and Service checks MRTG (The Multi Router Traffic Grapher) References (10)
4 1. Introduction A network monitoring system is the essential part of any network and is used to detect and report failures of devices or connections. Network bandwidth, host connectivity, DHCP offers, DNS response time and ping are some of the parameters which are reported by the network monitoring tools. In the CareNet network, Nagios is used for network monitoring and MRTG (the Multi Router Traffic Grapher) to check the routers status Purpose of document The purpose of this document is to give information on the network monitoring applications in the CareNet network, Nagios and MRTG Scope of document This document covers information about the Nagios and MRTG monitoring tools in the CareNet network. It provides information on the Nagios configuration, plugins and the host and service checks in the CareNet monitoring system. Information on the way MRTG is used in CareNet is also provided in this document Audience of document This document is aimed at the next CareNet technical team. 2. Nagios 2.1. About Nagios Nagios is a powerful open source network monitoring tool which is used in the CareNet network. It monitors the entire network infrastructure to ensure that systems, applications and network devices are functioning properly. In case of a failure, Nagios alerts the NOC team within 30 seconds of the failure. Some of the functionalities of Nagios which are used in the CareNet network are: 1) Scheduled host downtime for maintenance 2) Scheduled service downtime for maintenance 3) Process information to check the status of each process 4) Program-wide performance information 5) Daily, weekly and monthly availability reports 6) Real-time and archived event logs and notifications. 4 (10)
5 2.2. Nagios configuration The Nagios monitoring tool is installed in /etc/nagios3/ and most of the configuration files are located under this directory. The well-defined configuration files of Nagios are: 1) Main configuration file 2) Resource file(s) 3) Object definition file(s) 4) CGI configuration file(s) The main configuration file manipulates how the Nagios daemons operate. The configuration file is read by Nagios daemons and the CGI s. The main configuration file is named nagios.cfg and is located in the /etc/nagios3/ directory. Note: After any changes in the configurations a simulation of its consistency must be performed and when no errors are reported proceed with restarting nagios. In order to simulate the v option is used: /usr/sbin/nagios3 v /etc/nagios3/nagios.cfg Configuration file variables used in the CareNet network are: 1) Log files They define where Nagios should create its main log files. This must be the first variable to be defined since Nagios will write errors here while performing other checks. log_file=/var/log/nagios3/nagios.log 2) Object configuration files They contain the object definition that Nagios should use for monitoring. These files contain the definition for hosts, host groups, contacts, contact groups, services, commands, etc. For changes to the hosts: For changes to the services: For changes to the host groups: For changes to the service groups: cfg_file=/etc/nagios3/commands.cfg cfg_file=/etc/nagios3/conf.d/hosts.cfg cfg_file=/etc/nagios3/conf.d/services.cfg cfg_file=/etc/nagios/conf.d/hostgroups.cfg cfg_file=/etc/nagios/conf.d/servicegroups.cfg 3) Object cache file This contains the location where the object definitions are cached when the Nagios service is restarted. The CGI s read object definitions from the objects.cache file to prevent inconsistencies that may occur when the config files are modified after the service is started/restarted. object_cache_file=/var/cache/nagios3/objects.cache 5 (10)
6 4) Pre-cached object file This contains the location of the precached object file. If you run Nagios with the -p command line option, it will preprocess the object configuration file and write the cached configuration to this file. Nagios can then be started with the -u option to have it read the object definitions from this file, rather than the standard object configuration file. precached_object_file=/var/lib/nagios3/objects.precache 5) Resource file This contains the USER macro definitions. The CGI s will not attempt to read the contents of resource files, so information that is considered to be sensitive (usernames, passwords, etc.) can be defined as macros in this file and restrictive permissions (600) can be placed on this file. resource_file=/etc/nagios3/resource.cfg 6) Status file This contains the current status of all monitored hosts and services whose contents are preprocessed by the CGI. This file is refreshed every time the Nagios service is restarted. status_file=/var/cache/nagios3/status.dat 7) Notification file This contains the information regarding the notification when something behaves abnormally in the network. Here we define the s and SMS alerts which has a real-time reaction time of 10 seconds. /etc/nagios3/commands.cfg is the location of this file. [1] The above-mentioned files are the main configuration files that a network admin will use regularly. There are many other features which are used in Nagios and these can all be observed in the nagios.cfg file. For more information on the usage of each command refer to the link below: Nagios plugins Nagios has no internal mechanism to check the services and hosts. It is using Nagios plugins; hence this is the most essential part of Nagios. Nagios executes the plugins whenever there is a need to check the hosts and services that are scheduled, and these plugins return the results to Nagios. The scripts can be found in the /usr/lib/nagios/plugins/ directory and the commands to invoke these scripts can be found under the /etc/nagios-plugins/config/ directory. Configuration details related to the Nagios grapher which is an add-on can be found under the /etc/nagiosgrapher/ directory. More information on the plugins available and the add-ons can be found at: 6 (10)
7 All plugins follow the return code scheme described below: Plugin return code Service state Host state 0 OK UP 1 WARNING UP or DOWN/UNREACHABLE 2 CRITICAL DOWN/UNREACHABLE 3 UNKNOWN DOWN/UNREACHABLE Table 1: Nagios plugin return codes 3. Host and Service checks The monitored hosts in the CareNet monitoring system are the main Proxmox servers, ids, the virtual servers (sip, domain, management, portal), the Kista wireless LAN, the routers and the router interfaces. Below is a summary of the hosts monitored in Nagios: domain, hr, hr-eth0, hr-eth2, hr-eth3, hr-eth4, hr-eth5, ids, kis-wlan, kr, kr-eth0, kr-eth2, management, portal, server01, server02, sip, vr, vr-eth1, vr-eth2, vr-eth3, vr-eth5 and vr-eth7 According to the location and type, hosts are grouped in host groups, e.g. the host group Kista includes: domain, ids, kis-wlan, kr, kr-eth0, kr-eth2, management, portal, server01/2 and sip hosts. Host checking checks the reachability of each host and if the ping works fine the state of the host will be shown as up. In order to make any changes to the hosts and host groups in the CareNet monitoring system, /etc/nagios3/conf.d/hosts.cfg and /etc/nagios3/conf.d/hostgroups.cfg should be edited. Each host or host group has the related services to be checked. Some of them are the same for some hosts and some of them are specific to each host. Making changes to services and service groups should be done in the /etc/nagios3/conf.d/services.cfg and /etc/nagios3/conf.d/servicegroups.cfg files. 7 (10)
8 Below is a list of the hosts and their related services: Host server01 domain management sip portal ids kis-wlan kr kr-eth0 kr-eth2 vr vr-eth1 vr-eth2 Service(s) Aptitude HTTP Aptitude DHCP DNS NTP VPN Aptitude HTTP MySQL SNMP Aptitude TCP UDP Aptitude SNMP Bandwidth SNMP Bandwidth Bandwidth 8 (10)
9 vr-eth3 vr-eth5 vr-eth7 hr hr-eth0 hr-eth2 hr-eth3 hr-eth4 hr-eth5 SNMP Bandwidth Table 2: Hosts and related services 4. MRTG (The Multi Router Traffic Grapher) In the CareNet network MRTG is used to monitor the routers using SNMP and draws the corresponding graphs. MRTG is installed under /etc/mrtg/ and its configuration file can be found at /etc/mrtg/mrtg.cfg. MRTG will most likely not work properly when the environment variable LANG is set to UTF-8. Command to start: env LANG=C /usr/bin/mrtg/etc/mrtg/mrtg.conf A real-time presentation of MRTG for the CareNet network can be seen on our website by following the link below: 9 (10)
10 5. References [1] Nagios. (08/28/2010). Main Configuration File Options. [Online]. Viewed 12/29/2010. Available: 10 (10)
Health Portal Suggestions for Continued Work
Health Portal Suggestions for Continued Work CSD Fall 2010 Version: 1.0 Identifier: HP-003 Project owners Björn Pehrson Sven Jonsson Amos Nungu Project coach Hans Eriksson Team members Contact ECTS credits
More informationCARENET-SE. NOC Tools Review. Communication System Design Summer 2010. Project team. Champion Björn Pehrson Coach Hans Eriksson
NOC Tools Review CARENET-SE Communication System Design Summer 2010 Project team IK2207 Alin Pastrama pastrama@kth.se Champion Björn Pehrson Coach Hans Eriksson IK2207 Annika Holmgren annika.holmgren@gmail.com
More informationAvailability Management Nagios overview. TEIN2 training Bangkok September 2005
1 Availability Management Nagios overview Agenda 2 Introduction Objectives Functionalities Requirement. Architecture & Operation Operation Description WEB portal Plugins and extensions Plugins description
More informationHPCC Monitoring and Reporting (Technical Preview) Boca Raton Documentation Team
HPCC Monitoring and Reporting (Technical Preview) Boca Raton Documentation Team HPCC Monitoring and Reporting (Technical Preview) Boca Raton Documentation Team Copyright 2015 HPCC Systems. All rights reserved
More informationTitle: Installation, Configuration and Usage guide: Squid log analyzer, Webalizer and Calamaris. BURUCA Team
Title: Installation, Configuration and Usage guide: Squid log analyzer, Webalizer and Calamaris BURUCA Team BURUCA Team Members: ECTS: Code Email Ernest Rwandalla (Project Manager) 30 IK2209 ernestr@kth.se
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationNagios introduction. Dhruba Raj Bhandari (CCNA) Additions by Phil Regnauld. bhandari.dhruba@scp.com.np
Nagios introduction Dhruba Raj Bhandari (CCNA) Additions by Phil Regnauld bhandari.dhruba@scp.com.np Why Nagios? Open source Relatively scaleable, Manageable, Secure and more Best documentation available
More informationHosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
More informationThe new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,
More informationNetwork Monitoring with Nagios. Matt Gracie, Information Security Administrator Canisius College, Buffalo, NY
Network Monitoring with Nagios Matt Gracie, Information Security Administrator Canisius College, Buffalo, NY Canisius College is one of 28 Jesuit colleges in the nation and the premier private college
More informationBest of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationNagios at Funet. Teemu Kiviniemi, CSC/Funet 6th June 2012 6th TF-NOC meeting Dublin, Ireland
Nagios at Funet Teemu Kiviniemi, CSC/Funet 6th June 2012 6th TF-NOC meeting Dublin, Ireland Introduction Funet uses Nagios extensively for monitoring. network servers services Two Nagios monitoring servers
More informationAfNOG-2013. Monitoring of IP Services. Ayitey Bulley Material generously borrowed from the NSRC NME course
AfNOG-2013 Monitoring of IP Services Ayitey Bulley Material generously borrowed from the NSRC NME course Introduction To monitor or monitoring generally means to be aware of the state of a system. To observe
More informationDetails. Some details on the core concepts:
Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation
More informationCan You Afford Network Downtime?
Can You Afford Network Downtime? Secure network monitoring software you can rely on to proactively MONITOR, ALERT and RECOVER your critical applications and infrastructure equipment. Proven agentless architecture
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment
More informationFree Network Monitoring Software for Small Networks
Free Network Monitoring Software for Small Networks > WHITEPAPER Introduction Networks are becoming critical components of business success - irrespective of whether you are small or BIG. When network
More informationMALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME. COMPARISON REPORT ON NETWORK MONITORING SYSTEMS (Nagios and Zabbix)
MALAYSIAN PUBLIC SECTOR OPEN SOURCE SOFTWARE (OSS) PROGRAMME COMPARISON REPORT ON NETWORK MONITORING SYSTEMS (Nagios and Zabbix) JANUARY 2010 Phase II -Network Monitoring System- Copyright The government
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
More informationChapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationMulti-Router Traffic Grapher (MRTG)
Multi-Router Traffic Grapher (MRTG) MULTI-ROUTER TRAFFIC GRAPHER (MRTG)... 1 Overview... 1 Installing MRTG... 1 Viewing the Results... 10 Notes... 13 Troubleshooting... 13 Document Revision History...
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationNetwork Monitoring. Dhruba Raj Bhandari (CCNA) Manager Systems Soaltee Crowne Plaza Kathmandu NEPAL bhandari.dhruba@scp.com.np
Network Monitoring Dhruba Raj Bhandari (CCNA) Manager Systems Soaltee Crowne Plaza Kathmandu NEPAL bhandari.dhruba@scp.com.np Welcome! Network Management Workshop Network Monitoring Concepts, Tools And
More informationemerge 50P emerge 5000P
emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is
More informationMonitoring Network Availablity Using Nagios
Mohammedadem Abdulkadir Monitoring Network Availablity Using Nagios Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Thesis 5 May 2015 Abstract Author(s)
More informationServer application Client application Quick remote support application. Server application
The system needs to be Online, with a server hosted as a HTTP/WEB interface. The WEB interface will have a login interface, Administrators can download the server & client application to any desktop to
More informationMulti-Homing Gateway. User s Manual
Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33
More informationNetwork Management & Monitoring Overview
Network Management & Monitoring Overview PacNOG 6 November 17, 2009 Nadi, Fiji hervey@nsrc.org Introduction This is a big topic... There are a lot of tools to choose from: - Open Source - Commercial -
More informationStrengths and Limitations of Nagios as a Network Monitoring Solution
Strengths and Limitations of Nagios as a Network Monitoring Solution By Sophon Mongkolluksamee http://inms.in.th 1 Agenda o Network monitoring software o About Nagios o Limitations of Nagios o Improve
More informationA FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
More informationDMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1
pg. 1 DMH remote access Table of Contents 1 Remote access description... 2 1.1 Single module remote access... 3 1.2 Multiple modules remote access... 6 1.3 REMARKS/PITFALLS... 10 2 Dynamic DNS... 9 pg.
More informationVolume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationIntroduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup
Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationInstallation of the On Site Server (OSS)
Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit
More informationFeatures Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
More informationNETWORK SET UP GUIDE FOR
NETWORK SET UP GUIDE FOR USZ11ZS USX21ZS USX31ZAND DVRX16D DVRX32D HDDX13D SUPPORTING ROUTER D-Link Linksys NETGEAR BELKI IP Addresses on the Internet When you connect to the Internet, through dialup connection,
More informationKnowledge is Power. He who gets wisdom loves his own soul; he who cherishes understanding prospers. (Proverbs 19:8)
Knowledge is Power He who gets wisdom loves his own soul; he who cherishes understanding prospers. (Proverbs 19:8) Monitoring Tool -MRTG on CentOS 6.4 Jeong Chul tland12.wordpress.com www.youtube.com/user/tland12
More informationACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
More informationConfiguring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
More informationConfigure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
More informationProtecting the Home Network (Firewall)
Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection
More informationNetwork Monitoring User Guide
Network Monitoring User Guide 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse TM Overview 1 Pulse
More informationNetwork Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationIntegrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
More informationEvaluation Guide. Powerful & Immediate Business Web Security via the Cloud
Evaluation Guide Powerful & Immediate Business Web Security via the Cloud Contents 1 Introduction & Product highlights 2 Set up & Configuration 3 Managing your WebTitan Cloud Service 4 Reporting 5 Support
More informationKerio Control. Administrator s Guide. Kerio Technologies
Kerio Control Administrator s Guide Kerio Technologies 2012 Kerio Technologies s.r.o. All Rights Reserved. This guide provides detailed description on configuration and administration of Kerio Control,
More informationNetwork Management & Monitoring Overview
Network Management & Monitoring Overview Advanced cctld Workshop September, 2008, Holland What is network management? System & Service monitoring Reachability, availability Resource measurement/monitoring
More informationNTT Web Hosting Service [User Manual]
User Version 0.11 August 22, 2014 NTT Web Hosting Service [User Manual] Presented By: OAM Linux A NTT Communications (Thailand) CO., LTD. Table of Contents NTT Web Hosting Service [User Manual] 1 General...
More informationExternal Device Management - Using SNMP - Enabling the Next Wave of Connectivity
External Device Management - Using SNMP - 1 External Devices A location can comprise of many external devices like Access Points, routers etc. in addition to the PSC This aids in expanding the location
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationIntroduction to Network Monitoring and Management
Introduction to Network Monitoring and Management Jonathan Brewer Network Startup Resource Center jon@nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More information3.2.2 Bandwidth Requirements
You also need to prioritize your voice traffic over your data traffic and configure the ShoreTel system s feature. 3.2.2 Requirements The amount of bandwidth for voice calls depends on these details: Number
More informationASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide
ASUS WL-5XX Series Wireless Router Internet Configuration User s Guide Contents Chapter 1 Introduction:...1 Chapter 2 Connecting the wireless router...1 Chapter 3 Getting to know your Internet connection
More informationDOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES
.com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES
More informationEmerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
More informationSuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
More informationSystem Admin Module User Guide. Schmooze Com Inc.
Schmooze Com Inc. Chapters Overview Using the Module DDNS DNS Email Setup FTP Server Intrusion Detection License Network Settings Notification Settings Port Management Power Options Storage Time Zone Updates
More informationOpenITSM - IT Service Management with Open Source Software
OpenITSM - IT Service Management with Open Source Software März 2011 CeBIT Speaker: Julian Hein NETWAYS Founded 1995 26 full time employees Headquarter Nuremberg, Germany Focus on Open Source in Systems
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
More informationCYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
More informationUsing LifeSize Systems with Microsoft Office Communications Server 2007
Using LifeSize Systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
More informationChapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
More informationColubris TechNote. Testing and Troubleshooting Active- Directory. Revision 1.3 Mar. 2008 Author: Dave Leger
Colubris TechNote Testing and Troubleshooting Active- Directory Revision 1.3 Mar. 2008 Author: Dave Leger Colubris Networks 200 West St. Suite 300 Waltham, MA 02451 www.colubris.com Page 1 Contents OBJECTIVE...
More informationSMT v4.0 Users Guide (Linux version)
SMT v4.0 Users Guide (Linux version) Table of Contents 1. Manage Customer Billing 2. Provision Web Services a. Add a virtual host b. Password protect a directory c. Enable virtual host logs d. Change password
More informationWireless G Broadband quick install
Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install
More informationOptional Mainserver Setup Instructions for OS X Support
Optional Mainserver Setup Instructions for OS X Support Essentials Friday, November 2, 2012 Summary Some of the exercises in Apple Pro Training Series: OS X Support Essentials require access to a specially
More information4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W
4G Business Continuity Solution 4G WiFi M2M Router NTC-140W Introduction Whether you run a small corner shop, are the plant manager of a factory or manage IT in a corporate office, you ll need a reliable
More informationEnabling DNS for IPv6 CSD Fall 2011
Enabling DNS for IPv6 CSD Fall 2011 Team members: Bowei Dai daib@kth.se 15 credits Elis Kullberg elisk@kth.se 18 credits Hannes Junnila haju@kth.se 15 credits Nur Mohammad Rashed nmrashed@kth.se 15 credits
More informationConfiguring PPP And SIP
Copyright Copyright 2005. All rights reserved. The content of this manual is subject to change without notice. The information and messages contained herein are proprietary to. No part of this manual may
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationAdvanced Linux System Administration Knowledge GNU/LINUX Requirements
Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History
More information3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
More informationNetwork Monitoring and Management Introduction to Networking Monitoring and Management
Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
More informationHREP Series DVR DDNS Configuration Application Note
HREP Series DVR DDNS Configuration Application Note DDNS enables your HREP Series DVR to be remotely accessed using a Dynamic DNS server, which is commonly used if a broadband connection does not have
More informationHP ProCurve Manager Plus
HP ProCurve Manager Plus Getting Started Guide The all-in-one solution for managing HP ProCurve networks HP ProCurve Manager Plus Getting Started Guide Copyright 2003 Hewlett-Packard Development Company,
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationAn Introduction to Monitoring with Nagios
An to Monitoring with Nagios Laurent Andrey Rémi Badonnel LORIA - INRIA Grand Est ISSNSM 2008, Zurich Laurent Andrey, Rémi Badonnel An to Monitoring with Nagios 1/32 Local checks Remote checks Conclusions
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationConfiguring the Active Directory Plug-in
Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active
More informationQuick Network Setup Guide
1 2 3 4 5 6 7 8 9 0/10+ 1 2 3 4 5 6 7 8 9 0/10+ HDD POWER ALARM HDD POWER ALARM! REC +/ @ MENU SEARCH MODE ALARM PREV NEXT! REC +/ @ MENU SEARCH MODE ALARM PREV NEXT Quick Network Setup Guide Connecting
More informationOpenITSM - IT Service Management with Open Source Software
OpenITSM - IT Service Management with Open Source Software 03.02.2011 CloudExpo London Speaker: Julian Hein NETWAYS Founded 1995 26 full time employees Headquarter Nuremberg, Germany Focus on Open Source
More informationGroundWork Monitor Open Source 5.1.0 Readme
Copyright 2004-2007 GroundWork Open Source, Inc. ("GroundWork"). All rights reserved. Use is subject to GroundWork commercial license terms. For information on licensing and open source elements comprising
More informationMultifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
More informationHow To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
More informationUsing LifeSize systems with Microsoft Office Communications Server 2007. Server Setup
Using LifeSize systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
More informationAccess the GV-IP Camera through a broadband modem
Access the GV-IP Camera through a broadband modem Applied to All GV-IP Cameras Article ID: GV15-12-03-26 Release Date: 03/26/2012 Introduction The document introduces how to connect your GV-IP Camera to
More informationnexvortex Setup Guide
nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationImplementation of escan Live Events with SYSLOG (CACTI)
Implementation of escan Live Events with SYSLOG (CACTI) Enterprise customers, implement NMS (Network Management Servers) to get the status of devices like Routers, Switches, printers etc. So whenever a
More informationA Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationTo ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
More informationOMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0
Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring
More informationIP Power Stone 4000 User Manual
IP Power Stone 4000 User Manual Two Outlet Remote AC Power Controller Multi Link, Inc. 122 Dewey Drive Nicholasville, KY 40356 USA Sales and Tech Support 800.535.4651 FAX 859.885.6619 techsupport@multi
More information