These options allow you to define baseline settings for how scanning will occur on your network
|
|
|
- Hortense Sharp
- 10 years ago
- Views:
Transcription
1 Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully configurable, and can be run against a date and time schedule of your choice. There is no agent software required to be installed on the local devices. Most network enabled devices support a Network Management system of some kind. The three most relevant technologies are SNMP (Simple Network Management Protocol), WMI (Windows Management Instrumentation) and SSH (Secure Shell). And we will look at these in more detail later in this document. Asset Manager also supports a number of other systems, and we will also look at these briefly. Devices attached to your network will have IP addresses and should, by definition, have entries within your local DNS structure. Network Discovery scan particular network address ranges, and part of that process will look up device names via your local DNS. It is therefore important that your DNS is in good order, and does not contain many stale records, otherwise the system might pick up phantom devices that have been retired from service. Many networks also tend to segregate categories of devices into IP address bands. For instance, all the servers reside in the range , whilst the stations reside within the address space. Segregating in this way is good practice, as it aids network management tasks. Network Discovery Options These options allow you to define baseline settings for how scanning will occur on your network Schedule Scan allows you to specify whether the system, by default, is set up to carry out scheduled or manual scans. Scan Speed allows you to specify how much how much server resources are available for the scanning system to use. The default level is set to medium, and tests have shown that this setting
2 uses approximately 20% of the server s resources whilst a scan is taking place. The other values are Slow and Fast, and obviously use less or more system resources. Wake-On-Lan (WOL) tells the system to send a magic packet to the devices being scanned. WOLenabled workstations can be remotely switched on prior to the system being scanned. This enables you to perform workstation scans overnight so as not to put any additional burden on the network during operational hours. Whilst stations can be switched on, the discovery system cannot switch them off when it has finished. To shut stations down after a scan you can use CSE Network Toolkit s Station Start-up/Shutdown system, if installed. We would normally recommend that Wake on Lan is switched off so as to prevent the unexpected effect of starting up stations needlessly. Scan Exclusions allow you set a range of IP addresses globally that the system will not scan. The system allows for default and custom scans. Custom scans will be looked at later. Using the default scan controls, you can specify when you want your default scans to run. Network Scans This is where you setup and configure your network scans. It is probably worth spending a few moments describing why you would want to set up several separate scan tasks, rather than just scan your system s entire address range. If Asset Manager was simply a system for recording devices attached to your network, then one single scan would probably achieve your objective. But Asset Manager is more than just a system to record your ICT assets: it is also a powerful network monitoring system as well. For instance, it can monitor the status of your printer s ink or toner reserves, and send notifications to technicians before they actually run out, allowing you to manage your printer supplies proactively rather than reactively. However, to achieve this, you would probably want to scan the printers several times a day in order to keep on top of the situation. With your switches, again you might want to monitor the port status and keep an eye on any links that might go down, such as links between buildings. This might mean needing to scan these hourly. With servers, you might want to increase the scan schedule so that the system can monitor the free disk space on your user home directory volume, and issue alerts if things start to go wrong. Workstations, on the other hand, might only need to be scanned once daily, or possibly less. This is partly because you will probably have several hundred such devices, but also because they are managed devices, and you may decide that they do not require constant monitoring.
3 Network Accounts Slightly out of sequence, we now need to look at Network Accounts before we cover setting up scans. Later in this document we look in some detail at the main three methods that Asset Manager uses to gain access to device configuration data; specifically SNMP, WMI and SSH. Out of the three systems, WMI and SSH are secure systems and will require authentication before Asset Manager can read the device configuration data, which in layman s terms mean a need to log into the device using a username and password. Therefore, before it can scan such a device, Asset Manager will need to be able to specify a username and password. The Network Accounts feature allows you specify the appropriate usernames and passwords to Asset Manager The system has the capability to support multiple network accounts. For instance, you might have multiple domains and require different user authentication details for each of them, as shown below. You need to give each network account a unique name by which to identify it. Then you need to select the account type; this will primarily be Windows / SSH or SNMP. There are other options, but we will discuss these a little later.
4 The username and password need to be specified. The login name should include the full domain name for the devices you are connecting to. Leaving the domain name off will use the system s local account, which might not provide access to the WMI data. Setting up an SSH scan for your Apple computers might look something like this. Finally, because standard SNMP does not require a username or password, the setup is much simpler. It is worth pointing out that whilst the community name public is almost universally accepted as the default value, some vendors do specify their own community names, and you would need to create specific network accounts before scanning these devices. Network Scans Add Scan This is the heart of the asset auto-discovery system, and where you can specify your individual scanning tasks.
5 The Is Enabled switch allows you prevent scans from being run either manually or via the schedule. This allows you to switch off scans that are not used very often without having to delete them. Device/Range allows you to specify the IP address scope of your scan. You can use the following notations: Single address ,12,14,16,18 Multiple single addresses Complete subnet full range scan ,1,2,58, Multiple single subnets full range scan ,59,60.1,2,3 Multiple single subnets multiple single addresses Multiple subnets with full range scan Windows use the dropdown list to select the network account to authenticate with Windowsbased clients within the specified scan range. SSH use the dropdown list to select the SSH account needed to authenticate with SSH based clients within the specified scan range. SNMP use the dropdown box to select the SNMP community string required when scanning the specified range. ESX/vSphere select the account credentials required when scanning the specified address range. HTTP select the account credentials required when scanning the specified address range. Telnet select the account credentials required when scanning the specified address range. Enable select the account credentials required when scanning the specified address range. VPro select the account credentials required when scanning the specified address range. Scan Schedule specifies whether to use the default scan schedule configured as part of the network discovery options, or to specify a custom schedule.
6 Order allows you to select a number manually (1 999) which controls the individual scan order. Edit Scan Allows you to open and edit existing scans. Delete Scan Removes and deletes the selected scan from the table. Scan Now Allows you to run a scan immediately, either singularly by highlighting the scan you want to run, or run all scans in the table by order. View Scan This is a diagnostic aid to help discover and resolve problems encountered during the running of network scans.
7 Each scan is presented as a collapsible entry. To expand, click on the small + symbol to the left. The result ID is the scan sequence, whilst the network discovery ID field contains the scan order number. The scan data is very comprehensive, and tracks all processes. It is the primary source of debugging information when determining the cause of scan failure. But it can also be used to check that the scans are running according to the schedule you have specified for them. The amount of data collected can add up over time, so it is good practice to use the Delete Scan Log facility, and mark and delete old logs every week or so.
8 Appendix A Advanced Discovery Facilities In this appendix we look in more detail, at the network management protocols used by Asset Manager and how you can use them to configure your scans to provide even more information and management data from your assets. These advanced facilities are a unique capability of Asset Manager that are not found in other products. Network Management Protocols Active devices that attach to your network can generally be scanned and interrogated for data by Asset Manager without any user interaction. This is a particularly useful feature as it allows Asset Manager to auto-discover connected devices and add them into the asset register automatically. Most network enabled devices support a Network Management system of some kind. The three most relevant technologies are SNMP (Simple Network Management Protocol), WMI (Windows Management Instrumentation) and SSH (Secure Shell). However Asset Manager supports a number of other systems, and we will look at these briefly later in this document. SNMP Simple Network Management Protocol (SNMP) is an Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Essentially, SNMP exposes management data on the managed systems as variables. These variables are organized in hierarchies. These hierarchies are contained within the device s Management Information Base (MIB) and the individual elements are accessed using an Object Identifier (OID) codes. The OID codes will look something like this: Using the SNMP protocol, Asset Manager can query enabled devices, and acquire configuration and management information directly from them by querying the appropriate OID and extracting the variable data contained within it. Devices tend to have extensive MIB structures, with possibly thousands of OIDs, which can be quite daunting to explore. Thankfully, Asset Manager has an extensive library of common device MIB definitions built into it, and in most cases can extract data without requiring you to have any knowledge of how SNMP works, how the MIB is structured, or what the OID codes are. However, in specialist cases where monitoring specific characteristics of a device is required, you may need to create your own SNMP query to achieve this. Asset Manager gives you the capability to do this by defining an asset field and specifying the required OID to capture the data you need. If you require further information on how to use SNMP, we would advise that you search the Internet and use one of the excellent SNMP guides that are freely available. Also there are a number of MIB browsing tools freely available to download. These allow you to scan actual device MIBs, explore the structure, and look at the individual OID data.
9 SNMP Security Most devices provide SNMP as a global service, which requires no authentication to query the device. The SNMP Community string is a type of account that is used to access the remote system. This tends to be Public by default. However, be aware that some vendors do use proprietary community strings (for example Buffalo and their TeraStation Pro product range, which use TeraStation as its community string). It is worth pointing out that there are three different SNMP implementations available: SNMPv1, SNMPv2c, and SNMPv3. Of these, SNMPv3 does require authentication and you must specify a username and password). Asset Manager supports all three standards. SNMP Example For instance, let s say we want to query our HP ProCurve switches and find out what the device s fan speed is. Using the internet to search HP ProCurve Fan OID we can discovered that the OID representing this value is We now simply create a new asset field, and enter the OID value into the SNMP OID network scan mappings box. The newly created asset field then needs to be added to the Switch asset category. The next time that the device is scanned, the asset record will then contain a field containing the device s fan speed.
10 WMI Windows Management Instrumentation (WMI) is the Microsoft implementation of web-based Enterprise Management (WBEM), which is an industry initiative to develop a standard technology for accessing management information in an enterprise environment. WMI is designed to help system administrators manage large, complex enterprise systems, applications, and networks. It provides system administrators with a single, consistent object-oriented interface to monitor and control system components locally or remotely. WMI queries are sent to a computer which processes the query and responds with the data requested, so in some way the process is similar to SNMP. Asset Manager has been pre-configured with a large number of common WMI queries, reducing the chance of you having to add your own. However, if you need to extend the range of WMI queries, you can. For full information about WMI, please see the Microsoft MSDN website for details (just search for WMI). WMI uses a sub-set of SQL known as WQL as the query language. Asset Manager supports the full WQL syntax, which can be found at: There are a number of useful tools that you can download from the Microsoft website that helps you explore the WIM CIM (Common Information Model) data. These include the WMI Code Creator and WMI Tools. A complete reference to all available WIM CIM objects can be accessed using the following web site: (a direct link is provided to this site is included within Asset Manager). WMI Example For instance, let s say that we want to include details about the type of mouse that is attached to our workstations. Using the website we see that details about the mouse are contained within the CIM object class Win32_PointingDevice.
11 The table shows all of the properties associated with this class of object. Looking at these objects we can select the most appropriate to our needs: in this case we will use the Manufacturer object. The query we have to run is therefore defined as; Select Description From Win32_PointingDevice In order to get Asset Manager to run this query whilst scanning the network, we first have to define the query itself. To do this navigate to Asset Manager Settings/Network Discovery/Scan Configurations/WMI and add a new item. The name is the object class, and the query selects the property that we want to read. The next step is to map this element to an asset field. To do this navigate to Preferences\Asset Manager Settings\Asset Fields and add a new asset field. In the WMI Class, Property Name field we enter the name we associated with the WMI query we entered earlier.
12 In order to associate this field with our workstation assets, we now need to add this asset field to the Workstation asset category. To do this, navigate to Preferences/Asset Manager Settings/Asset Categories. Find the Workstations category and add the newly created Mouse Type asset field to the selected asset fields list. The next time the system scans your workstation assets, it will run the query and display the mouse type when you next examine a Workstation asset.
13 WMI Security You need to be an authenticated user in order to query the WMI CIM data. Basically, this means that you need to specify a username and password with sufficient access level in order to run queries on the target device. We usually use the domain administrator s account for this, as the domain administrators group is automatically added to the WMI security when a workstation is added to the domain. Alternative WMI Method An alternative method of grabbing the required data from a workstation is to alter your query so that rather than just return one property value, it returns multiple values within the one query. Select Caption, Description, DeviceInterface, NumberOfButtons From Win32_PointingDevice This is a valid query and will return values associated with each property specified. Meanwhile: Select * From Win32_PointingDevice will return all of the properties associated with the pointing device class. SSH (Secure Shell) Secure Shell (SSH) is a network protocol for secure data communication between two networked computers. It is primarily used to provide remote access to UNIX/Linux based operating systems. Interestingly, this includes Apple operating systems. Once the SSH link is established, commands can be run which can interrogate the remote system with the aim of gathering information about the system. SSH will require a username and password to log into the remote device. Whilst some SSH commands can be generic (from the UNIX/Linux operating systems), sometimes they are very specific to the device you are trying to query. In such cases, you will need access to the local operating system s documentation. Generally, you should be able to obtain this by searching the Internet. There is a useful Windows base tool called Putty that allows you to remotely access a device s Secure Shell console and issue commands manually. This gives you the ability to experiment with the
14 device s command line and work out the best combination of commands to extract the information you require. Again, this can be downloaded by searching the Internet. As with SNMP and WMI, Asset Manager has been configured with a standard set of SSH commands. However, you can of course implement your own as required. All the SSH commands can be found under Preferences/Asset Manager Settings/Network Discovery / Scan Configuration/SSH. To add a new command, simply click the Add button. Give the SSH item a name, and then enter the command to retrieve the data required. In this instance, df h is a command that retrieves the free volume space from a XenServer host.
15 You then need to link this SSH item with an asset field. Then you need to link the field with an asset category. In this case we have a category for our XenServers. Next time you look at your XenServer assets, you will be able to see the results of your query within the asset s data field.
16 Scan Configurations Earlier in this document, we showed how you can customise the method that the scanning system uses to request information from devices whilst the scan is in progress. We also showed how to incorporate these into your assets dataset by creating a custom asset field, and then linking it to an asset category. Scan Configurations contains all of the WMI, WMI REG, and SSH custom queries used by the system. As we have shown, you can easily extend the scope of these queries by adding your own manually. It is worth pointing out that the scan configurations are used by Asset Manager behind the scenes to gather information such as printer and workstation configuration. The WMI Reg commands are responsible for determining what software is installed on a Windows computer. Since many of these commands are used by the system itself, you cannot delete them from the list.
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Network Monitoring with SNMP
Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple
Network Monitoring with SNMP
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
SNMP Adapter Installation and Configuration Guide
SNMP Adapter Installation and Configuration Guide vcenter Operations Manager 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
How to manage non-hp x86 Windows servers with HP SIM
How to manage non-hp x86 Windows servers with HP SIM Introduction... 3 HP SIM inventory for non-hp x86 Windows servers... 3 Discovery and Identification... 3 Events... 4 System properties and reports...
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D
Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.
Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.
About Foglight NMS Foglight NMS is a comprehensive device, application, and traffic monitoring and troubleshooting solution. It is capable of securely monitoring single and multi-site networks of all sizes,
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Tandem Systems, Ltd. WinAgents HyperConf. User s Guide
Tandem Systems, Ltd. WinAgents HyperConf User s Guide Tandem Systems, Ltd. 02.04.2010 Table of Contents Overview... 4 System Requirements... 4 Quick Start... 4 1-2-3-Start!... 4 1. Set default parameters
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
SyAM Software Management Utilities. Creating Templates
SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.
Using Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
ECView Pro Network Management System. Installation Guide. www.edge-core.com
ECView Pro Network Management System Installation Guide www.edge-core.com INSTALLATION GUIDE ECVIEW PRO NETWORK MANAGEMENT SYSTEM SNMP-Based Network Management Software for Windows SW6102 E102010-CS-R01
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
WEB HELP DESK GETTING STARTED GUIDE
WEB HELP DESK GETTING STARTED GUIDE TABLE OF CONTENTS Install Web Help Desk (Windows)..... 3 Set Up Technician & Client Accounts 6 Configuring Ticket. 9 Configuring IT Asset..... 13 Useful Links 15 Use
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Getting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
HP ProCurve Manager Plus
HP ProCurve Manager Plus Getting Started Guide The all-in-one solution for managing HP ProCurve networks HP ProCurve Manager Plus Getting Started Guide Copyright 2003 Hewlett-Packard Development Company,
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
HP Insight Remote Support
HP Insight Remote Support Monitored Devices Configuration Guide Software Version: 7.4 Document Release Date: August 2015 Software Release Date: August 2015 Legal Notices Warranty The only warranties for
Chapter 3 Management. Remote Management
Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described
PrintSuperVision 4.0. Enterprise and Professional Editions. Installation, Configuration and Users Guide
PrintSuperVision 4.0 Enterprise and Professional Editions Installation, Configuration and Users Guide V. 1.0 1 January 2014 Contents Introduction... 6 What s New in Version 4.0... 7 Installing the Software...
CentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
Chapter 4 Management. Viewing the Activity Log
Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
Configuring WMI Performance Monitors
Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected
How to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7
Contents Introduction--1 Product definition 1 Implementing SNMP 2 Integrating SNMP into the user interface 3 Components of OPC SNMP Gateway 4 How to Obtain an OPC License--5 Creating a System Code 5 Entering
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Configuring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Topics. Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs
SNMP Workshop Topics Generals SNMP Software SNMP SkyWAN Work on redundant unit (Aruba) FAD Work on redundant unit (Aruba) Graphs CSS // COMSOFT Satellite Services GmbH / page 2 // Topic Generals SNMP CSS
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Technical Notes P/N 302-000-337 Rev 01
SNMP Trap Monitoring Solution EMC SourceOne Version 7.0 and later Technical Notes P/N 302-000-337 Rev 01 September 27, 2013 These technical notes contain supplemental information about EMC SourceOne, version
Printer Management Software
Printer Management Software This topic includes: "Using CentreWare Software" on page 3-9 "Using Printer Management Features" on page 3-11 Using CentreWare Software CentreWare Internet Service (IS) CentreWare
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
SevOne NMS Download Installation and Implementation Guide
SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES
DATASHEET SOLARWINDS ENGINEER S TOOLSET FAST FIXES TO NETWORK ISSUES SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.
PerleVIEW Device Management System User s Guide
PerleVIEW Device Management System User s Guide Version 1.2 Part #5500320-12 May 2013 PerleVIEW V1.2 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Apple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
RMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
SNMP Protocol for Easy Network Management
ACTi Knowledge Base Category: Educational Note Sub-category: Application Model: ACM Series TCM Series ACD-2100 TCD-2100 TCD-2500 Firmware: Software: N/A Author: Wells.Wei Published: 2010/10/22 Reviewed:
NetBrain Security Guidance
NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),
DISCOVERING DEVICES CONTENTS. using HP Web Jetadmin
DISCOVERING DEVICES using HP Web Jetadmin CONTENTS Overview... 3 New in HP Web Jetadmin discovery... 3 Part 1 How discovery works... 3 Discovery settings... 4 Network device discovery vs. PC-connected
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
SuperLumin Nemesis. Administration Guide. February 2011
SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility
PrintFleet Printer DCA
Version 4.2.1 User Guide As of October 14, 2013. 2013 PrintFleet Inc. All rights reserved. Copyright 2013 PrintFleet Inc. All rights reserved. PrintFleet Printer DCA User Guide. The content of this user
OnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
System Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
How To Get Started With Whatsup Gold
WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...
Upgrade Guide BES12. Version 12.1
Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
intertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
This guide provides instructions on how to configure SNMP feature on Yealink IP phones and test SNMP feature using a free SNMP test tool.
This guide provides instructions on how to configure SNMP feature on Yealink IP phones and test SNMP feature using a free SNMP test tool. The configurations described in this guide take the Yealink SIP-T28P
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
TrueSight Operations Management Monitoring Studio
USER DOCUMENTATION APPLICATIONS MONITORING TrueSight Operations Management Monitoring Studio Version 9.0.00 June 2015 Contacting BMC Software You can access the BMC Software Web site at http://www.bmc.com.
Altor Virtual Network Security Analyzer v1.0 Installation Guide
Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor
Application Performance Monitoring for WhatsUp Gold v16.1 User Guide
Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Contents Table of Contents Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes Best Practices for Using PRTG Traffic Grapher to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
XMS Quick Start Guide
812-0055-002D XMS Quick Start Guide Overview of Quick Start Steps This guide will quickly get you up and running with the Xirrus Management System (XMS). It includes instructions for setting up the XMS
A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router
1. Installation and configuration guidelines for the router replacement This guideline served as a reference for schools which plan to replace the existing WebSAMS router by the recommended router, and
NetBrain Discovery Appliance Manual
NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
