Tandem Systems, Ltd. WinAgents HyperConf. User s Guide

Size: px
Start display at page:

Download "Tandem Systems, Ltd. WinAgents HyperConf. User s Guide"

Transcription

1 Tandem Systems, Ltd. WinAgents HyperConf User s Guide Tandem Systems, Ltd

2 Table of Contents Overview... 4 System Requirements... 4 Quick Start Start! Set default parameters to access devices Add devices to HyperConf catalog Set up backup of device configurations... 5 Start!... 5 HyperConf Components... 5 HyperConf Manager... 5 Network Discovery Wizard... 7 Devices Catalog... 8 Working with Groups Adding, Editing and Removing Devices General Logon Advanced Telnet SSH SNMP HTTP Terminal Emulation Terminal Keyboard/Mouse X/Y/Z Modem Connection Profiles General Telnet SSH SNMP HTTP Operations with Multiple Items Group Overview Working with Favorites Actions Panel

3 Backing-up Device Configuration Files Backing-up Configuration Files by Schedule Manual Configurations Backup Detecting Configuration Changes via SYSLOG Working with Devices Device Overview Terminal Shell Principles and Advantages of HyperConf Terminal Shell Connecting to Device with CLI Terminal Window Configuring Devices in Terminal Shell Retrieving Running and Startup Configurations Online Configuration Editor Adding Commands Editing Commands Negating and Resetting Commands to Default Negating Commands Resetting Commands to Default Saving the Configuration to NVRAM Editing Access Control Lists Editing Multiline Strings in Commands Verbose Mode Edit Device Configuration Off-Line Downloading Configuration Files from Device Editing Device Configurations Bookmarks Uploading Configuration Files to Devices Configuration History Connecting to Device with Web Browser Saving Device Configuration to NVRAM Comparing Devices Configurations Executing Scripts on Device What Is a Script? Automating Devices Creating and Running Command Scripts

4 Creating and Running Script in Microsoft JScript Working through NAT WinAgents HyperConf is Inside the Protected Network WinAgents HyperConf is Outside the Protected Network Operation Log Application Log SYSLOG Program Options WinAgents HyperConf Server Options General Database Connection Change Detection Built-in TFTP Server Built-in SYSLOG Server SSH Server for SCP FTP Server WinAgents HyperConf Manager Options General Terminal Fonts & Colors Additional Functions Decrypting Type 7 Passwords on Devices Manufactured by Cisco Systems Terminal Connection Regular Expression Syntax Installing License Keys

5 Overview According to Gartner, about 80% of all network failures are caused by the internal factors such as incorrect configurations, weak policies or human errors. It is extremely difficult to protect the network from the administrators mistakes because they have many privileges in network management. In this situation system failure is only a matter of time. One of the possibilities to minimize the consequences of failures is to constantly monitor configuration files of network devices, track changes in configurations, and have up-to-date configuration backups. WinAgents HyperConf is a universal solution to manage the configuration files of network devices from different hardware vendors. WinAgents HyperConf performs 24/7 network monitoring, detects changes in it configuration, and maintains configuration backups in up-to-date state. Using the program you can examine the history of changes and, if necessary, return immediately to the stable version of the device configuration. Thus, WinAgents HyperConf greatly improves network availability and minimizes losses caused by various internal and external factors. WinAgents HyperConf contains a set of tools to configure your devices. The program keeps the Catalog of Devices that stores information about the addresses, access methods and authentication parameters for every device. With the built-in tools you can connect to devices via TELNET, SSH and HTTP/HTTPS protocols, retrieve device configuration files to edit and upload modified configurations back. Using built-in scripting features you can change configurations of many devices almost instantaneously. WinAgents HyperConf centralizes configuration management for your network. System Requirements The following minimum system configuration is recommended for WinAgents HyperConf: CPU: Intel P4 (or greater) Memory: 512MB RAM or more Disk space: not less than 30 MB to install the program, recommended 100 MB Platform: Windows 2000/XP/2003/Vista/2008/7 Quick Start It is very easy to start using WinAgents HyperConf. You need to make only three steps to get the program to work Start! 1. Set default parameters to access devices When WinAgents HyperConf starts for the first time, it displays the Initial Configuration Wizard. This wizard allows you to specify credentials that will be further used by default to access the devices. Enter the user name and passwords you use to access the most of your devices. Later you can change them by editing connection profiles in the Connection Profiles window. Refer to Connection Profiles to get additional information. 4

6 2. Add devices to HyperConf catalog To enable the program to work with devices it is necessary to add them into the devices catalog. The easiest way to do this is to use the Discovery Wizard. This wizard performs network scan by means of the SNMP protocol. Discovered devices may be added to the devices catalog. You can also add the devices manually. In the Device menu, click Register New Device to add a new device into the catalog. Refer to Discovery Wizard and Adding, Editing and Removing Devices to get additional information. 3. Set up backup of device configurations On the Device menu, click Configure Backups to set up options for device configurations backup. You can specify devices, for which backup procedure will run automatically, set the schedule and configure additional backup parameters. Refer to Backing-up Device Configuration Files to get additional information. Start! With a single click you can connect to devices, examine the history of device configuration changes, compare and modify configuration files, and do many other things! HyperConf Components WinAgents HyperConf contains the following components: WinAgents HyperConf Server Windows service running in background which implements HyperConf core functions, runs automatic backup operations, etc. WinAgents HyperConf Manager Windows application that provides GUI for WinAgents HyperConf features: allows operations with devices, examining SYSLOG messages and work with backup copies of device configurations. WinAgents TFTP Server Windows service running in background which is used to transfer the configuration files between WinAgents HyperConf Server and network devices. TFTP server is essential for backing-up configurations and editing configurations off-line. WinAgents SYSLOG Service Windows service running in background which receives and processes SYSLOG messages that are generated and sent by devices. HyperConf Manager WinAgents HyperConf Manager provides an integrated environment to manage configurations of network devices. It is the only component of WinAgents HyperConf with which the user works directly, and it has a set of tools and graphical user interface elements to access all the functions implemented in WinAgents HyperConf. It is important to make yourself familiar with the main WinAgents HyperConf Manager window to work with the application effectively. The main application window is in the figure 1. It describes some important features available in WinAgents HyperConf. 5

7 Figure 1. WinAgents HyperConf Manager 1. Catalog of Devices WinAgents HyperConf uses the Catalog of Devices to store access parameters for network nodes it works with. You can use this to manipulate device registrations in HyperConf and manage registered devices configurations either by downloading them directly from the device or by retrieving them from the HyperConf database. 2. Catalog of Devices Toolbar Use this to add, edit or remove device registrations manually or to fill the Catalog of Devices automatically with the help of the Network Discovery Wizard. 3. Actions for device Use this to perform operations or run built-in and custom scripts for the device currently selected in the Catalog of Devices. 4. Favorites Use this to place your favorites, which are links to the most commonly used devices, device configurations, or device features for quick access. 5. Favorites Toolbar It contains commands to manage favorites. Use it to add a link to the device, device configuration or device feature that is already present in the Catalog of Devices. 6. New Configuration Click this to open a new configuration editing window. It allows entering configuration commands sequentially line-by-line, and then the resulting configuration file may be saved to a file or uploaded to one or more devices registered in the Catalog of Devices. 7. Open Configuration Click this to open an existing configuration file. The configuration file can be reviewed, edited and uploaded to one or more devices registered in the Catalog of Devices. 8. New script Click this to open a new script editing window. WinAgents HyperConf can execute a set of commands or small programs written in JScript programming language across network devices and gather results. 9. Open script Click this to open an existing file containing either command script or script written in JScript programming language. The script can be executed across network devices with the results gathered and stored. 6

8 10. Compare Configurations Click this to open a new configurations diff window. It allows opening two configuration files side-by-side and comparing them by determining which lines were added, removed or changed. You can open configuration files for comparison from disk, retrieve them from the HyperConf database or download them from a device. 11. Open CLI Click this to open a new terminal emulation window which can be used to connect to remote hosts via TELNET or SSH protocols or to hosts connected directly to your computer via COM ports. 12. Schedule Backups Click this to open the Backup Configuration window. It allows specifying the schedule for automatic backups, select devices from the Catalog of Devices for which automatic backup is enabled, configure notifications, and set up additional backup options. 13. Logs Click this to open Operation Log, Application Log or SYSLOG windows. WinAgents HyperConf stores execution history for all operations with configurations, such as configuration downloads, configuration uploads, configuration backups, etc. in the Operation Log. It reports various system-level messages and events to the Application Log, which may be useful for troubleshooting. WinAgents HyperConf contains built-in SYSLOG server and received SYSLOG messages from network devices, stores them and displays in the SYSLOG window. 14. Profiles Click this to open the Connection Profiles Manager. WinAgents HyperConf uses connection profiles to unify access to the network devices if they use the same set of credentials. The Connection Profiles Manager allows creating, editing and deleting connection profiles. They later can be assigned to devices in the Device Properties window. 15. Work Area with windows WinAgents HyperConf supports working with multiple open windows of various types displaying configuration files, terminals, logs, etc. All such windows are placed to the work area and for each of them tab with its name is placed to the panel above the work area. Use tabs for quick switching between windows. 16. Operation results Most of the windows in WinAgents HyperConf perform operations with configuration files transferring them to and from devices, or execute a series of commands on devices capturing output. The whole operation progress is stored and displayed in the current operation log, which is present in the bottom of the window which initiated the operation. 17. Operations status Use this to check the current status of running and failed operations with configuration files of network devices. Click links to open the Operation Log window and examine operation results. Network Discovery Wizard You should register your network devices in the Catalog of Devices in HyperConf before the program can work with them and manage their configuration files. WinAgents HyperConf includes a special tool to make this task easier the Network Discovery Wizard. Its purpose is to find and automatically register all network devices that can be controlled via the SNMP protocol and meet the criteria you specify. You can open the Network Discovery Wizard either by clicking Discover Network on the Devices toolbar, or by clicking Discover Network Devices on the Devices menu. The Network Discovery Wizard guides you through the step-by-step process of specifying devices access parameters, scanning your network and adding discovered devices to the Catalog of Devices. The first step is to select which types of network nodes should be found: All network nodes the Network Discovery Wizard will search for all network devices. 7

9 Routers and switches the Network Discovery Wizard will search for routers and switches only. The second step is to specify the range of networks being searched for network nodes. You can choose one of three options: Discover only current network scan the current local area network only. Discover IP networks scan the network within the specified range of IP addresses. If you choose this option, you should provide the Network Discovery Wizard with IP addresses and masks of the network being searched. You can specify several ranges of IP addresses by adding them to the networks list by clicking Add. Click Delete to remove the selected network from the list. Selected distance scan networks within the specified number of hops from the current local area network. The number of hops is the number of routers the packet from the computer where the program is installed goes through before it reaches the device being scanned. The number of hops is used to define the maximum size of the network being searched. The third step is to specify SNMP parameters that will be used for connecting to network devices. While scanning the network, the wizard tries to establish connections to devices it finds using the settings specified at this step. In case the connection is successfully established, the device will be added to the result list. Connection settings include the following parameters: SNMP Port the port number to use for establishing a connection, the default is 161. Timeout the maximum amount time to wait for the response from the network node during connection attempt, specified in seconds, the default value is 2. Community strings the list of community strings used for authentication while connecting via SNMP versions 1 and 2. If multiple community strings are used on your network, you can enter them all line-by-line, placing each community string on its own line. At the next step, the Network Discovery Wizard scans the specified networks for devices. You can cancel the search by clicking Cancel. When the scan is finished, the Network Discovery Wizard offers you to select the devices that should be added to the Catalog of Devices by picking them from the list of discovered devices. Click Finish to close the Network Discovery Wizard and place the selected devices to the Catalog of Devices. It is recommended to review properties of the newly added devices, because some additional settings should be specified to manage their configurations and perform automatic backups. Devices Catalog Devices served by WinAgents HyperConf are contained in the Devices Catalog. You can see the contents of the catalog in the related area of the main window. 8

10 Figure 2. The Catalog of Devices The Catalog of Devices is represented as a tree-like hierarchical structure (Figure 2). Registered devices can be organized in groups. Each device node in the tree can be expanded by clicking the + button. Under the device node HyperConf shows nodes for available configurations and tools for this device. You can open the configuration or tool window by double-clicking the particular node. The set of nodes for each device is determined by the following parameters: Device address and its name. HyperConf uses the specified address to perform all operations with the device, such as transferring configuration files, open terminal sessions, performing configuration backups, etc. The name is displayed in the tree representing the Catalog of Devices. Vendor and device type. To perform various operations with the device, HyperConf must know its manufacturer and model. Depending on this information the program uses different set of scripts to get device configuration and automate other tasks. Protocols, authentication and automatic logon. These settings are used by the program to establish connections to devices and gain access to its command line and configuration files. You can configure these parameters in the Device Properties window. Changes in these parameters results in changes in the set of nodes for configurations and tools that HyperConf shows under the node for the particular device. 9

11 Working with Groups Groups in the Catalog of Devices are used to organize devices in logical categories. It may be convenient to create groups for subnets, structural units of your company, buildings, sites, etc. To add a new group, click Add Device Group on the Device menu. In the Group Properties window the following parameters can be configured: Name the name for the group. HyperConf uses it to display the group in the Catalog of Devices. Type one of Generic, Network, Site, Building, Floor, Room, Rack. HyperConf uses the type of the group to display its icon in the Catalog of Devices. Comment optional comment text. Parent HyperConf allows including groups one into another. In the Group Properties window you can select the position of the group in group hierarchy. It is also possible to select the parent group (Figure 3). Figure 3. Editing Group Properties To edit the group parameters select it in the catalog and click Properties on the Device menu. To delete the selected group, click Remove Selected Item on the Device menu. Adding, Editing and Removing Devices To add a device to the Catalog of Devices, click Register New Device on the Device menu or click the corresponding button in the toolbar. WinAgents HyperConf opens the Device Properties window, which is used to specify various parameters that WinAgents HyperConf needs to communicate with the device, transfer configuration files, show command-line interface, etc. The Device Properties window contains several groups of parameters organized in sheets: 10

12 General Figure 4. Device Properties Window General Vendor and Model WinAgents HyperConf must determine a set of operations supported by the device. Many functions are device-specific and require knowledge about commands, protocols, and ways of handling device configuration files. For example, HyperConf should know how to gain access to the device command-line interface, which command use to copy a file from or to the device, or which MIBs are supported. WinAgents HyperConf defines such kind of information about a device as a device template. Device template must be specified for every device registered in the HyperConf Device Catalog. You specify the template for the device by selecting its Vendor and Model. Address The IP-address or DNS-name of the device management interface. Title A friendly name which is displayed in the HyperConf Device Catalog. This device is outside the NAT Click to select this option if the device is located outside the protected network where WinAgents HyperConf is. The program will use the address of the NAT outside interface as a TFTP server address when needed. Please, refer to Working through NAT for additional information. 11

13 Access to command-line interface Click to select this option to allow command-line access to the device in HyperConf. Choose a terminal protocol to use to establish connection to the device. Automatically logon to device WinAgents HyperConf can automatically implement a logon procedure to a CLI session by sending username and password to the device when they are requested. Click to select this option to run automatic logon while opening a new CLI session. Automatically enter privileged mode While implementing an automatic logon procedure, WinAgents HyperConf can automatically issue the command which switches the session to a privileged mode. Click to select this option to allow switching to the privileged mode. WinAgents HyperConf will automatically send the password for the privileged mode when requested. Automatically show current configuration For your convenience, when you open the Command-Line Interface window for the device, WinAgents HyperConf can automatically retrieve its current configuration and show it in the editor. Click to select this option to allow automatic configuration retrieval. Download/upload configuration Click to select this option to allow access to configuration files on the device in HyperConf. Choose a protocol to use to establish connection to the device. This option must be selected for all devices for which backup is activated. Web access to device Click to select this option to allow Web-based access to the device in HyperConf. Choose a protocol to use to establish connection to the device. Logon 12

14 Figure 5. Device Properties Window Logon Use connection profile WinAgents HyperConf requires credentials information, such as username, password, encryption keys, etc. to connect to devices and perform operations with their configuration files. HyperConf offers 2 ways of specifying such credentials information: 1. Use of connection profiles. A connection profile is a set of credentials (usernames, passwords, keys, etc.), that may be shared across multiple devices. See Connection Profiles to get additional information. 2. Configure credentials individually for each device. All necessary credentials information must be provided in the device properties separately for every device not using a configuration profile. Click to select Use connection profile to assign a connection profile to the device registration and use its credentials information, instead of specifying it manually. Logon method WinAgents HyperConf supports three different procedures of automatic logon: Default logon script Built-in procedure implementing standard logon, when remote host asks for username and password. When connection to the remote host is established, HyperConf waits for username or password prompt from the device and replies with username or password configured for the connection based on the prompt received. This is the least flexible procedure which is suitable for simple logon scenarios that are used on the most network devices. 13

15 Command sequence This procedure allows you to specify a sequence of prompts received from the remote host and replies that should be sent. After connection to the remote host is established HyperConf waits for the prompt, then compares received prompt against the configured sequence, identifies which reply it should send back to the remote host and sends it. Logon procedure completes when HyperConf receives the prompt which is the last in the sequence. You can also specify whether initial Carriage Return should be sent before any prompt is received. Custom script in JScript After connection is established HyperConf executes the specified script written in JScript scripting language. This script performs logon as needed. This is the most flexible way to specify and configure logon procedure. Different logon methods require a different set of parameters. When you select a logon method, HyperConf displays which parameters must be configured. Username The username to use for logon. Password The password to use for logon. Privileged password The password to use for switching to a privileged mode. Send Initial Carriage Return Click to select this option to force WinAgents HyperConf to send carriage return before running the logon sequence, this may be useful for certain types of remote hosts or for connection via Console (COM port) interface. Logon Sequence The set of prompts that can be received from the remote host during logon, with reply strings that will be sent to the remote host when the corresponding prompt is received. You can add, edit and delete prompt-reply pairs and move them up and down in the list. Please note, that order of prompt-reply pairs matters, WinAgents HyperConf implements logon by waiting for prompts and sending replies from the first to the last as specified in the list. Logon Script The full path to the file with script in the JScript programming language, implementing a custom login procedure. Run Script After Logon Click to select this option to force WinAgents HyperConf to run the specified script in JScript programming language after the automatic logon procedure is completed. 14

16 Advanced Figure 6. Device Properties Window Advanced Enable Level The access level of the privileged mode access. Username Prompt The prompt that the device sends when it requests a username, this value is a regular expression and can contain special regular expression operators; Password Prompt The prompt that the device sends when it requests a password, this value is a regular expression and can contain special regular expression operators. Command Prompt The prompt that the device sends when it is in the non-privileged command mode, this value is a regular expression and can contain special regular expression operators. Enable Prompt The prompt that the device sends when it is in the privileged command mode, this value is a regular expression and can contain special regular expression operators. Device Group 15

17 Location of the device in the HyperConf Catalog of Device. Telnet Port Figure 7. Device Properties Window Telnet Protocol The port number for the TELENET protocol to use, 23 by default. Don't negotiate Telnet options If this option is selected, WinAgents HyperConf won t attempt to send or respond to TELNET options requests. This may be useful when establishing connection to a remote host that requires raw textbased connection, e.g. POP3 or SMTP server. SSH 16

18 Figure 8.Device Properties Window SSH Protocol Port The port number for the SSH protocol to use, 22 by default. Version The version of the SSH protocol, you can choose from SSH version 1 (SSHv1), SSH version 2 (SSHv2) and auto detection. In the last case, WinAgents HyperConf tries to decide correct protocol version based on the identification string sent by the device. Authentication methods This option specifies which authentication methods should be used. WinAgents HyperConf supports SSH authentication based on Password, DSA/RSA keys, and Keyboard Interactive authentication. If the DSA/RSA Key option is checked, you should provide a private key file in OpenSSH, IETF, or PuTTY format and Passphrase for the key, if any. The program will try to use the supplied key for authentication. You can also generate public/private keys pair by pressing the Generate key button. Encryption algorithms This option specifies which encryption algorithms should be used. WinAgents HyperConf supports AES, Blowfish, 3DES, and DES algorithms. You can specify which algorithms should be used for the session and configure their priorities by moving up and down in the list by pressing the Up and Down buttons. Compression 17

19 Specifies whether data compression should be used. If the Enable Compression option is selected, WinAgents HyperConf will try to compress all data transmitted over the network. It is also possible to specify the level of compression, the higher the level, the higher is the compression. Higher levels of compression require more processing power and may cause significant performance penalty on the device. SNMP Port Figure 9. Device Properties Window SNMP Protocol The port number for the SNMP protocol to use, 161 by default. Version The version of the SNMP protocol, you can choose from SNMP version 1, SNMP version 2c and SNMP version 3. Read Community The community string to authenticate read operations. Write Community The community string to authenticate write operations. Security Name 18

20 The username for SNMPv3 authentication. Security Level Specify the level of authentication and encryption that should be used for connections. Authentication Select the algorithm for authentication. MD5 or SHA1 may be used. Auth Password The password to use for authentication. Priv Password The password to use for encryption. Engine ID The SNMP Engine ID of the deivce. HTTP 19 Figure 10.Device Properties Window HTTP Protocol HTTP Port The port number for the HTTP protocol to use, 80 by default. HTTPS Port

21 The port number for the HTTPS protocol to use, 443 by default. Username The username to use for a connection. Password The password to use for a connection. Terminal Emulation Terminal Type Figure 11. Device Properties Window Terminal Emulation The type of terminal to emulate, the following terminal types are supported: ANSI, XTerm, VT100. Allow ANSI Colors Click to select this option to turn on color support for terminal emulation. Use System Colors Click to select this option to use system colors configured in Windows for the terminal window instead of built-in colors. Highlight Console Syntax Window Size 20

22 Columns, Rows, and Scrollback size of the terminal window. Resize Behavior Specifies which action is performed when the terminal window is resized. WinAgents HyperConf can Change number of rows and columns automatically depending on the terminal window size, making more rows and columns for larger window and less rows and columns for smaller window; Scale the font changing the font size and preserving number of rows and columns; or Retain number of rows and columns automatically displaying vertical and horizontal scroll bars when window is resized. Encoding Specify the code page to use in the terminal window. Passthru Printing Specify the printer to redirect print output. WinAgents HyperConf supports Passthru printing technology, allowing redirecting print output to a locally connected printer. All printing processing should occur on the remote host, and prepared page may be sent to the local printer using ANSI passthru print codes. Terminal Keyboard/Mouse Functional Keys & Keypad Figure 12.Device Properties Window Terminal Keyboard/Mouse Specify what escape sequences will be sent to the device when a functional key is pressed. The following functional keys emulation schemes are supported: ESC+~, Linux, XTerm, VT400, VT100+, SCO. 21

23 Backspace Sends DEL If this option is selected, the code for DEL key will be sent to the device when Backspace key is pressed. Home & End Keys RXVT Mode If this option is selected, the rxvt-compatible codes will be sent to the device when Home or End is pressed, instead standard codes. Add CR to Incoming LF If this option is selected, carriage return code will be added to incoming line feed characters Local Echo Local echo mode that is used in terminal emulation, can be Auto, Force On, or Force Off. Usually, the device sends back characters when a key is pressed and the corresponding character code is sent to it. In this case local echo should be turned off; otherwise, if the remote host doesn t send back characters to the terminal and nothing is displayed when you type on the keyboard, this option should be turned on. WinAgents HyperConf can also automatically detect the status of local echo and decide whether turn it on or off. Local Line Editing Line editing mode that is used in terminal emulation, can be Auto, Force On, or Force Off. This determines how line editing is working when you pressing keys on the keyboard. When local line editing is off, each press of a key sends the corresponding character code to the remote host. When local line editing is on, character codes are note sent immediately to the remote host, but they are placed in a local editing buffer instead, and all line editing is handled locally. Then when Enter key is pressed the whole buffer is sent to the remote host. Usually, this setting should be configured alongside with Local Echo. Key Mappings The user-defined table of key-mappings. You may Add, Edit, and Remove mappings in the list. Each time when a key is pressed, WinAgents HyperConf checks if a mapping for this key is configured, and if it finds the mapping it sends the corresponding mapped characters to the remote host instead of the original code of the key. Mouse Emulation Specify actions assigned to Right and Middle mouse buttons. Shift Overrides Mouse Behavior If this option is selected, when Shift key is pressed, default actions will be performed when either Right or Middle button is pressed. 22

24 X/Y/Z Modem Figure 13. Device Properties Window Terminal X/Y/Z Modem Upload Folder Specify the full path to a folder, where HyperConf should search for files that are transferred to the remote host. Download Folder Specify the full path to a folder, where HyperConf should store files that are received from the remote host. XModem Upload The command that is sent by WinAgents HyperConf to initiate a file transfer from the local host to the device via X-Modem protocol. XModem Download The command that is sent by WinAgents HyperConf to initiate a file transfer from the remote host to the local host via X-Modem protocol. YModem Upload The command that is sent by WinAgents HyperConf to initiate a file transfer from the local host to the device via Y-Modem protocol. YModem Download 23

25 The command that is sent by WinAgents HyperConf to initiate a file transfer from the remote host to the local host via Y-Modem protocol. ZModem Upload The command that is sent by WinAgents HyperConf to initiate a file transfer from the local host to the device via Z-Modem protocol. ZModem Download The command that is sent by WinAgents HyperConf to initiate a file transfer from the remote host to the local host via Z-Modem protocol. Upload and download commands can contain %s pattern, when a file transfer is initiated this pattern is replaced by the actual list of file names. Connection Profiles Connection profile is a set of authentication and authorization parameters being used to connect to a device. Connection profile includes users' names and passwords to access via TELNET, SSH and HTTP/HTTPS protocols, and also authentication and encrypting parameters for SNMP. To configure connection profiles click Connection Profiles on the Device menu. Figure 14. Managing Connection Profiles The Connection Profiles Manager window displays a list of profiles. You can create one or several profiles to connect to network devices. Use of profile makes it easier to register a device in the Catalog of Devices and set it up. You can select one of the profiles as a default profile. The default profile will be automatically assigned to newly registered devices. To set a profile as default, select it in the list and click Make Default. 24

26 To create a profile click New. You can also copy the existing profile by clicking Copy. To edit the existing profile select it in the list and click Edit. To configure a connection profile the Connection Profile Settings window is used (Figure 15). It contains the following groups of parameters: General Name The name of the profile. Username The username to use for logon. Password The password to use for logon. Privileged password Figure 15. Connection Profile Settings The password to use for switching to a privileged mode. Telnet Port The port number for the TELENET protocol to use, 23 by default. Don't negotiate Telnet options If this option is selected, WinAgents HyperConf won t attempt to send or respond to TELNET options requests. This may be useful when establishing connection to a remote host that requires raw textbased connection, e.g. POP3 or SMTP server. 25

27 SSH Port The port number for the SSH protocol to use, 22 by default. Version The version of the SSH protocol, you can choose from SSH version 1 (SSHv1), SSH version 2 (SSHv2) and auto detection. In the last case, WinAgents HyperConf tries to decide correct protocol version based on the identification string sent by the device. Authentication methods This option specifies which authentication methods should be used. WinAgents HyperConf supports SSH authentication based on Password, DSA/RSA keys, and Keyboard Interactive authentication. If the DSA/RSA Key option is checked, you should provide a private key file in OpenSSH, IETF, or PuTTY format and Passphrase for the key, if any. The program will try to use the supplied key for authentication. You can also generate public/private keys pair by pressing the Generate key button. Encryption algorithms This option specifies which encryption algorithms should be used. WinAgents HyperConf supports AES, Blowfish, 3DES, and DES algorithms. You can specify which algorithms should be used for the session and configure their priorities by moving up and down in the list by clicking Up and Down. Compression Specifies whether data compression should be used. If the Enable Compression option is selected, WinAgents HyperConf will try to compress all data transmitted over the network. It is also possible to specify the level of compression, the higher the level, the higher is the compression. Higher levels of compression require more processing power and may cause significant performance penalty on the device. SNMP Port The port number for the SNMP protocol to use, 161 by default. Version The version of the SNMP protocol, you can choose from SNMP version 1, SNMP version 2c and SNMP version 3. Read Community The community string to authenticate read operations. Write Community The community string to authenticate write operations. Security Name 26

28 The username for SNMPv3 authentication. Security Level Specify the level of authentication and encryption that should be used for connections. Authentication Select the algorithm for authentication. MD5 or SHA1 may be used. Auth Password The password to use for authentication. Priv Password The password to use for encryption. Engine ID The SNMP Engine ID of the device. HTTP HTTP Port The port number for the HTTP protocol to use, 80 by default. HTTPS Port The port number for the HTTPS protocol to use, 443 by default. Username The username to use for a connection. Password The password to use for a connection. Operations with Multiple Items While working with the devices and groups in the Catalog of Devices, it may be required to perform the same operation for more than one item. For instance, you may need to change the connection profile for several devices, change their vendor and model, etc. WinAgents HyperConf simplifies such a task by allowing selection of multiple items in the Catalog of Devices. To select multiple devices and groups do one of the following: To select consecutive devices or groups, click the first item, press and hold down SHIFT, and then click the last item. To select nonconsecutive devices or groups, press and hold down CTRL, and then click each item. Then click a command to perform with the selected items. 27

29 For example, to change connection profile for multiple devices follow these steps: 1. Select the necessary devices in the Catalog of Devices using one of the techniques described above. 2. On the Device menu, click Properties. The program will open Device Properties window. 3. In the Device Properties window select the required connection profile and click OK. The program will change connection profile for each of the selected devices. Group Overview Every group in the Catalog of Devices contains the Overview node. Double-click it to open the Group Overview window. This window contains information about status of backup operations for all devices within the group. The following information is available for each device: Device the device name and its IP-address; Type the device vendor and model. It is possible to filter the list of devices in the Group Overview window. To apply a filter, click the down arrow in the Type column caption. When the filter is applied and active, the filter management pane is shown in the bottom of the device list; Last backup date and time of the last successful backup of the device configuration file; Last attempt date and time when the most recent backup operation was performed for the device; Last attempt status short message describing status of the most recent backup operation for the device; Last configuration change date and time of the most recent device configuration file backed up and stored in the HyperConf database. Double click on a device in the list opens the Device Overview window for it. Working with Favorites It is quite common in a large networks for administrators to work actively only with a few number of devices. In this case, all of the network devices should be registered in the HyperConf Catalog of Devices, so HyperConf will be able to perform backups for them. However, the large number of registered devices makes it hard to locate a necessary one, and regular searches make work less effective. Use of Favorites bookmarks saves time and allows accessing the devices, their features and configuration files in a more effective way. To show the Favorites panel, click Favorites on the View menu. The Favorites panel is above the tree of the Catalog of Devices, and it contains bookmarks to access necessary tools for devices with a single click. To add a bookmark, select a node in the devices tree and click Add in the Favorites panel. HyperConf will display the Add Favorite window, where you can set name, comment and placement for the bookmark. Clicking OK saves the bookmark in the Favorites. You can also drag and drop any node from the devices tree using mouse. Click Organize to edit and remove bookmarks. This command shows the Organize Favorites window, where you can create folders, place there bookmarks, rename bookmarks and folders and delete them. 28

30 To jump to the necessary device, left-click the corresponding bookmark. Actions Panel Actions Panel shows a list of commands for the currently selected device in the Catalog of Devices, and allows you to select and run the particular command simply by clicking it. This speeds-up implementation of common tasks and makes work with HyperConf more effective. The Actions Panel is located under the Catalog of Devices. The contents of the Actions Panel is dynamically changed based on vendor and model of the device selected in the Catalog of Device, to show the commands which applicable for it. If multiple items are selected in the Catalog of Devices, then the Actions panel displays only a subset of commands, which are common for all selected items. Backing-up Device Configuration Files One of the most important functions of WinAgents HyperConf is implementation of automatic backups of network devices configuration files. The program runs the backup procedure according to a schedule or when the built-in SYSLOG server receives a message indicating the configuration change. Besides, you can run the backup process manually. HyperConf maintains the history of configuration changes for each device registered in the Catalog of Devices. When performing the backup for a configuration file for a device, HyperConf checks its database for previously backed-up configurations, analyzes changes in the configuration file, and if detects any, stores the downloaded configuration file in the database and assigns the version number to it. When WinAgents HyperConf compares configuration files, it can ignore some configuration commands, comments and other information. This may be useful when the configuration file contains automatically generated data, such as timestamps, descriptions, etc., which is updated every time the configuration file is downloaded, but this data isn t affect the device configuration itself. You can configure templates for lines that must be ignored for every device vendor and model supported by HyperConf, using the HyperConf Options window. To configure exclusion templates, on the Tools menu, click Program Options. In the HyperConf Options window click Changes Detection, and then click Configure Exclusions. Exclusion templates are regular expressions. Refer to Regular Expression Syntax to get additional information. To browse the configuration files for a device, locate the device in the Catalog of Devices, expand its node, and double-click Configuration History. HyperConf will open the Configuration History window that contains a list of current and saved device configurations. Double-click the configuration in the list to open it in the editor. Backing-up Configuration Files by Schedule To configure automatic backups according to a schedule, on the Device menu, click Configure Backups. The program will open the Backup Configuration window (Figure 16). 29

31 Figure 16. Backup Configuration You can select devices for which automatic backup is enabled, configure schedule and other backup options using this window. The following settings are available: Store backup files per device the number of configuration backups stored by the program for every device. If the number of files exceeds the specified number, HyperConf deletes the oldest configuration backup from the database; Copy configuration to NVRAM after backup select this options to store the device configuration to the device non-volatile memory every time the backup is performed and HyperConf finds changes in the configuration since the last backup; Detect configuration changes using SYSLOG WinAgents HyperConf includes the built-in SYSLOG server and listens for incoming SYSLOG messages. When this option is selected, HyperConf analyzes the incoming messages and detects if they indicate changes in device configurations. If a message about configuration change is received, the program automatically backs it up. Refer to the Detecting Configuration Changes via SYSLOG for more information; Send backup notification by if this option is selected, HyperConf will send notifications via with the results of backup operations. Click Configure to specify options. Manual Configurations Backup You can run the backup process manually by selecting devices in the Catalog of Devices and clicking Backup Device Configuration on the Device menu. HyperConf will open a new Backups window, 30

32 containing progress and log of the backup process. After the process completes, you can examine newly created configuration backups for each device by expanding the node for the device on the Catalog of Devices and double-clicking the Configuration History node. Detecting Configuration Changes via SYSLOG WinAgents HyperConf can monitor devices for changes in their configurations using built-in SYSLOG server. Most devices when their configuration changes send a message to the SYSLOG server. WinAgents HyperConf can identify such messages and immediately start the backup operation for a device. To use this features you need to setup the following: 1. Configure the device to send SYSLOG messages to the computer with WinAgents HyperConf. For Cisco IOS Device: Use the command logging ip_address, where ip_address is the IP-address of the computer with WinAgents HyperConf For Cisco PIXOS Device: Use the command logging host interface ip_address, where interface is the nearest device network interface to the computer with WinAgents HyperConf, and ip_address the IP-address of this computer. For Cisco Catalyst Device: Use the following commands to configure SYSLOG messages sending: set logging server enable set logging server ip_address where ip_address is the address of the computer with WinAgents HyperConf. 2. In the Configure Backup window select Detect configuration changes using SYSLOG. To open the Configure Backup window, click Configure Backups on the Device menu. 3. (Optional). Configure message templates that WinAgents HyperConf uses to detect changes in device configuration files. HyperConf already has pre-configured message templates for the most number of supported devices. However, different versions of device firmware can send different SYSLOG messages, and they may be not recognized by the program. In this case you should add appropriate templates. You can do this in the HyperConf Options window, in the Changes Detection section (Figure 17). 31

33 Figure 17. Changes Detection On the Tools menu, click Program Options. In the HyperConf Options window click Changes Detection, and then click Configure Message Patterns. HyperConf will open the Configure SYSLOG Patterns window (Figure 18). Figure 18. SYSLOG Patterns. The program stores a list of SYSLOG messages templates for every device vendor and model. The templates are specified as regular expressions. Refer to Regular Expression Syntax to get additional information on the syntax used for regular expressions. 32

34 Working with Devices WinAgents HyperConf provides a set of tools to work with network devices and their configuration files. These tools are displayed under the device node in the Catalog of Devices when you expand it. Device Overview The Device Overview window contains the most important information about the status of device configuration files and device operation. The information is represented in three sections: Device, Backups, and SNMP variables. Figure 19. The Device Overview Window In the Device section the device name and address are displayed. Click Properties to open the Device Properties window and setup or update parameters of the device registration in HyperConf. The Backups section contains the following information on backup state: The Last backup field shows the date and time of the last backup stored in the HyperConf database. Click the link to open the backup in the editor. The Last attempt field shows information about the date, time and result of the last backup operation performed for the device. Click the link to open the Operation Log window and examine the operation details. The Last change field shows the date and time of the last changes detected by HyperConf. This field is updated every time the program finds differences between the current device configuration and its last backup. To open the list of the existing configuration backups click Configuration History. Click Backup Now to start the backup operation. The SNMP Variables section shows values of standard SNMP2-MIB (RFC3418) variables retrieved from the device. This feature requires the SNMP server configured, up and running on the devices. It is also necessary to provide SNMP settings for the device registration in the Device Properties window. This section displays the general device information, such as name, location and description, configured on the device, as well as device interface table and CPU and memory load counters. Use dropdown box 33

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

NetBrain Discovery Appliance Manual

NetBrain Discovery Appliance Manual NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.

XFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc. XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

How to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7

How to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7 Contents Introduction--1 Product definition 1 Implementing SNMP 2 Integrating SNMP into the user interface 3 Components of OPC SNMP Gateway 4 How to Obtain an OPC License--5 Creating a System Code 5 Entering

More information

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6)

Net Inspector 2015 GETTING STARTED GUIDE. MG-SOFT Corporation. Document published on October 16, 2015. (Document Version: 10.6) MG-SOFT Corporation Net Inspector 2015 GETTING STARTED GUIDE (Document Version: 10.6) Document published on October 16, 2015 Copyright 1995-2015 MG-SOFT Corporation Introduction In order to improve the

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

These options allow you to define baseline settings for how scanning will occur on your network

These options allow you to define baseline settings for how scanning will occur on your network Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully

More information

F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide

F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide F-Secure Securing the Mobile Distributed Enterprise F-Secure SSH User's and Administrator's Guide F-Secure SSH for Windows, Macintosh, and UNIX Secure Remote Login and System Administration User s & Administrator

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Smart Business Architecture for Midsize Networks Network Management Deployment Guide Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple

More information

Basic Mercury Powered NXT Configuration in Doors.NET TM Application Note. 1.0 Adding an NXT-MSC Controller to the NXT Gateway

Basic Mercury Powered NXT Configuration in Doors.NET TM Application Note. 1.0 Adding an NXT-MSC Controller to the NXT Gateway Doors.NET installation and controller configuration is a three step process. Each of these steps has its own document, with controller configuration broken into separate documents per hardware type. software

More information

Viewing and Troubleshooting Perfmon Logs

Viewing and Troubleshooting Perfmon Logs CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

WS_FTP Professional 12 and WS_FTP Home 12. Getting Started Guide

WS_FTP Professional 12 and WS_FTP Home 12. Getting Started Guide WS_FTP Professional 12 and WS_FTP Home 12 Getting Started Guide Welcome Ipswitch WS_FTP Professional 12 and Home 12 is the leading file transfer client with millions of users worldwide. You can easily

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide

Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Contents Table of Contents Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Setting Up Sharp MX-Color Imagers To Scan To Email

Setting Up Sharp MX-Color Imagers To Scan To Email Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run

More information

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide

Application Performance Monitoring for WhatsUp Gold v16.2 User Guide Application Performance Monitoring for WhatsUp Gold v16.2 User Guide C o n t e n t s CHAPTER 1 Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

NetBrain Security Guidance

NetBrain Security Guidance NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),

More information

How To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade

How To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Password Memory 6 User s Guide

Password Memory 6 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 6 User s Guide 2007-2015 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents Password Memory 6... 1

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

File Transfers. Contents

File Transfers. Contents A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using

More information

PowerLogic ION Enterprise 5.6

PowerLogic ION Enterprise 5.6 PowerLogic ION Enterprise 5.6 Power Management Software User Guide April 2007 Notices This section describes the symbols used in this guide. Danger This alerts you to things that may cause serious injury

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

ECView Pro Network Management System. Installation Guide. www.edge-core.com

ECView Pro Network Management System. Installation Guide. www.edge-core.com ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

IceWarp Outlook Connector 4 User Guide

IceWarp Outlook Connector 4 User Guide IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

Network Management Card Security Implementation

Network Management Card Security Implementation [ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Creating a Website with Publisher 2013

Creating a Website with Publisher 2013 Creating a Website with Publisher 2013 University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Installing the SSH Client v3.2.2 For Microsoft Windows

Installing the SSH Client v3.2.2 For Microsoft Windows WIN1011 June 2003 Installing the SSH Client v3.2.2 For Microsoft Windows OVERVIEW... 1 SYSTEM REQUIREMENTS... 2 INSTALLING THE SSH PACKAGE... 2 STARTING THE PROGRAMS... 5 USING THE SHELL CLIENT... 8 USING

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Tera Term Telnet. Introduction

Tera Term Telnet. Introduction Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

CentreWare for Microsoft Operations Manager. User Guide

CentreWare for Microsoft Operations Manager. User Guide CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

Table of Contents. Online backup Manager User s Guide

Table of Contents. Online backup Manager User s Guide Table of Contents Backup / Restore VMware Virtual Machines... Error! Bookmark not defined. Backup virtual machines running on VMware ESXi / ESX Server with VDDK / non VDDK... 2 Requirements and recommendations...

More information

Sysax Multi Server User manual

Sysax Multi Server User manual Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

2XApplication Server XG v10.6

2XApplication Server XG v10.6 2XApplication Server XG v10.6 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

V310 Support Note Version 1.0 November, 2011

V310 Support Note Version 1.0 November, 2011 1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6

More information

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies: Using Discovery 1/3 Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information