Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management



Similar documents
DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

DS SERIES SOLUTIONS ALL AT ONCE

The role of Access and Control in DCIM

Secure, Remote Access for IT Infrastructure Management

Remote Data Center Control

APC Enterprise KVM Switches

Server Room Solutions: How small to midsize IT businesses can make their IT budgets appear larger than they are

LANDesk Server Manager. Single Console Multi-Vendor Management Solution

A More Secure and Cost-Effective Replacement for Modems

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Opengear Technical Note

Common Access Card Application

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment

AMX MULTI-USER, MULTI-PLATFORM SWITCHING FOR REAL-TIME DATA CENTER AND TEST LAB ENVIRONMENTS

VERITAS Backup Exec 9.0 for Windows Servers

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

Unified Infrastructure Monitoring, Access and Control

Data Center Infrastructure Management Managing the Physical Infrastructure for Greater Efficiency

System Area Manager. Remote Management

It s time to confront IT complexity and deal with it. With Avocent s Control and Manageability Solution

How To Manage The Sas Metadata Server With Ibm Director Multiplatform

Smart Card Deployment in the Data Center: Best Practices for Integrating Smart Card Authentication in a Secure KVM Environment

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Out-of-Band Networking

Lab Developing ACLs to Implement Firewall Rule Sets

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Server Management with Lenovo ThinkServer System Manager

Avaya G700 Media Gateway Security - Issue 1.0

PRODUCTS & TECHNOLOGY

Network Management 100 Success Secrets

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

NETWORK ADMINISTRATOR

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Data Center Infrastructure Management Managing the Physical Infrastructure for Greater Efficiency

Vicom Storage Virtualization Engine. Simple, scalable, cost-effective storage virtualization for the enterprise

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Mobile Admin Architecture

The Distributed Enterprise: Access and Management of Remote Office IT Infrastructure

Telecom CPE Management Overview

How do I secure and manage an out-of-band connection to network devices?

Intel Data Center Manager. Data center IT agility and control

Securely manage data center and network equipment from anywhere in the world.

CompTIA Network+ (Exam N10-005)

Selecting the Right NAS File Server

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

WAN Failover Scenarios Using Digi Wireless WAN Routers

IT Networking and Security

HP ProLiant Lights-Out 100c Remote Management Cards Overview

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Unicenter Remote Control r11

HP Netserver/Server Server Management Reference Guide

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Power Management. Raritan Description.

ION Networks. White Paper

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

Avaya TM G700 Media Gateway Security. White Paper

Management of VMware ESXi. on HP ProLiant Servers

Secure Networks for Process Control

Dell idrac7 with Lifecycle Controller

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

QuickSpecs. Models. HP ProLiant Lights-Out 100c Remote Management Cards Overview

Cisco SFS 7000P InfiniBand Server Switch

Secure Remote Enterprise Network Management

Intel AMT Provides Out-of-Band Remote Manageability for Digital Security Surveillance

Cisco UCS C-Series Rack-Mount Servers The Computing Platform for Virtualised Data Centres. Business Overview

EMC Integrated Infrastructure for VMware

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Highly available embedded server for secure teleservices Kontron KISS servers in use as a high-end firewall & VPN gateway for industrial teleservices

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Peter Tsai Product Manager / Product Marketing Dept. Feb 17th, 2009

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

L2F Case Study Overview

The ABCs of KVMs: How Remote KVM Switches Put You in Control of Your Data Center

How To Use A Vmware View For A Patient Care System

Zone Labs Integrity Smarter Enterprise Security

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Secure Access Complete Visibility

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ REVIEW DATE. Report Amended October 2011

1000-Channel IP System Architecture for DSS

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

OPTIMIZING SERVER VIRTUALIZATION

Monitor the Cisco Unified Computing System

Opengear Application Note

Gigabyte Content Management System Console User s Guide. Version: 0.1

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

How To Create An Intelligent Infrastructure Solution

System i and System p. Customer service, support, and troubleshooting

Transcription:

WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve service levels and productivity. Although not new or unique, these imperatives have taken on renewed urgency in today's Internet-driven economy. IT is no longer the inwardly focused domain of technology specialists, but rather faces outward, where customers, partners, prospects and remote employees directly interact with an organization's business applications via the Web. Today, if an application is not available online, customers can quickly move to a competitor with a simple mouse click. In short, an organization's IT infrastructure has become the face of business, taking on a vital role in defining customer experiences that directly impact the corporate brand. As a result, IT performance has evolved to become vital for business survival. WHAT S INSIDE Traditional approaches to monitoring, maintaining and restoring IT assets are reviewed; out-of-band management is presented as a more efficient way to cut costs and improve service levels and productivity. Faced with this reality, many large businesses have invested in redundant systems to ensure 24/7 service availability for their customers, partners, etc. Redundant systems, however, are both costly to deploy and maintain. Out-of-band management offers businesses a costeffective, secure and efficient solution to ensure the high level of IT infrastructure performance needed to meet the demand for continual service availability, and a way to meet the perennial business imperatives to cut costs and improve productivity. IT Overview Typical IT infrastructures in many of today's large enterprises consist of one or multiple data centers and may also include remote sites or branch offices. In some cases, large enterprises deploy redundant data centers to ensure business continuity and provide consistent IT service availability in the event of a potential disaster. From an architectural perspective, data centers share a similar makeup that includes servers, storage and applications, and a network infrastructure of hubs, routers, firewalls and switches. Large enterprises may also include remote or branch office infrastructures linked to the corporate production network through a virtual private network (VPN) using Internet connections or through a wide area network (WAN) connection. Larger remote installations, such as a warehouse or large department store, may have a small version of the data center complete with racks of servers, storage and network infrastructure. Smaller remote offices may be limited to a router, firewall and hub with network connections for desktop PCs. Whether an enterprise is large and dispersed across multiple sites, or limited to a single data center, IT managers face the same challenge to deliver the highest possible level of performance and availability at minimal cost.

2 AVOCENT WHITE PAPER Typically, large organizations depend on complex systems management applications (such as HP OpenView, IBM Tivoli, CA Unicenter, BMC PATROL ) to monitor network performance and manage application performance and availability. Small and medium-sized enterprises may use less expensive network management applications to manage the network. These management tools depend on the production IT network to monitor performance and productivity, and perform effectively when network connections remain available. Local Versus Remote IT Management The following description illustrates the difference between local and remote IT management. If an IT asset loses its network connection, systems management applications alert the administrator that the asset is no longer available; but because these applications depend on the network infrastructure to manage assets, they cannot provide specific details about the problem, only that the asset is no longer connected. As a result, the traditional approach for restoring assets to the network requires the physical presence of a technician at the asset, regardless of whether the asset is located in the data center or at a remote site. Specifically, a technician must go to the problem device with either a crash cart or a laptop, physically plug into that asset to diagnose the problem and finally restore the IT asset to the network. This process is both expensive and time-consuming, and defines the term local IT management. Remote or out-of-band management allows the administrator to access and control IT assets through either network, serial or modem connections via the network infrastructure or a path separate from the network infrastructure. The administrator is not required to be physically present. To further clarify, remote management is possible from thousands of miles away or from 20 feet away, whether at the data center or a remote site. Remote management is therefore achieved through any connection other than a local, physical connection. Remote IT management can be realized through the use of out-of-band management tools, which provide secure, alternate paths to remotely access, monitor and manage IT assets throughout the network infrastructure. If an IT asset goes down, out-of-band management tools can remotely restore it to the network infrastructure, where it can be managed back to productivity in the shortest time possible. Outof-band management tools minimize the need for local management and site visits, dramatically reducing the time and operational costs needed to bring IT assets back online. The relationship between the network infrastructure and out-of-band management tools is typically configured similar to the topology shown in Figure 1. Figure 1.

AVOCENT WHITE PAPER 3 An example of how out-of-band management tools may function is presented in the following scenario (see Figure 2). A device or server in the data center goes down; the network infrastructure remains operational. Using out-of-band management tools and the network infrastructure, the administrator accesses the IT asset, diagnoses the issue and, if necessary, power cycles (turns the power off and on) the device. In minutes, the asset is restored to the network where it can be managed back to productivity using a systems management application. The benefits in this case include lower labor costs, increased productivity and reduced risk. Figure 2. A further example of how out-of-band management tools are critical to remote management of IT assets is illustrated in Figure 3. A network switch connecting a rack of servers goes down, losing its connection to the network. In this case, the out-of-band management connection to the switch remains available through the network infrastructure. The administrator is alerted by the systems management application that a switch is no longer connected to the network. Using an out-of-band management tool to remotely access the switch, the administrator diagnoses the problem and restores the switch and all its connected assets back to the network infrastructure. Figure 3.

4 AVOCENT WHITE PAPER The following is another scenario illustrating the benefits of out-of-band management tools (Figure 4). A router that provides network and Internet access for an entire site goes down. This router provides the network infrastructure connection to all connected IT assets linked to the network and all the out-of-band management tools. Because the out-of-band management tools cannot be accessed through the network infrastructure, the administrator uses a dial-up connection for access. The administrator is then able to use out-of-band management tools to connect to the router through a serial port to quickly diagnose the problem. The administrator corrects the error and restores the router and all its assets to the network. Again, what might have taken hours and a site visit to correct took minutes. Dial-Up Path Figure 4. The benefits are clear. Operational costs are reduced and IT asset availability is increased. If redundant systems are not in place, service levels are also increased. In short, the fundamental IT imperatives to cut costs and increase service levels and productivity are achieved. Below are descriptions of various out-of-band management tools. 1. Out-of-band management software provides consolidated access, change management and configuration management for disparate out-of-band management tools like serial console servers, KVM switches, power management appliances and service processor managers. It also provides the capability to manage diverse IT assets connected to these out-of-band tools from a single consolidated view. The management software also provides the scalability needed to meet the demands of the largest enterprises. 2. Serial console servers provide remote access to the serial management ports included on some servers and other network IT assets (routers, switches, cables, firewalls, etc.) rather than depending on the network connection. 3. KVM switches or KVM over IP switches access servers through keyboard, video and mouse ports to provide access as if the administrator were physically present. 4. Intelligent power distribution units (IPDUs) provide the ability to power on and off remote equipment for operational control or recovery from software/hardware failures. 5. Service processor managers provide consolidated, centralized access to the service processors embedded on the computer's motherboard. These operate separately from the main CPU, enabling administrators to access, monitor and manage the hardware components of servers. Service processor managers also allow administrators to reboot servers whether or not the main processor or the operating system is operational. Intelligent Platform Management Interface (IPMI), HP Integrated Lights Out (ilo) and Sun Advanced Lights Out Management (ALOM) are examples of established service processor technologies.

AVOCENT WHITE PAPER 5 Management Return on Investment One Customer's Perspective Over a 2-year period, a European telecommunications company used out-of-band management tools to deploy more than 2,000 additional IT assets within their existing IT infrastructure. These deployments took place without adding additional support staff. In this case, out-ofband management tools enabled the company to reduce operational costs and risk while increasing both IT asset and personnel productivity as illustrated by the statistics below. 92% decrease in overtime labor costs 50% decrease in deployment time 33% increase in IT assets per year with no additional staff needed The company's overall operational costs were reduced as their overtime labor costs were decreased by 92 percent. The time needed to deploy assets dropped by 50 percent, which enabled the company to win in competitive bidding situations as competitors could not match their deployment speed. Personnel productivity increases enabled the company to expand IT assets by 33 percent per year to more than 100 sites, without the need to hire additional staff. Within 16 months, the out-of-band management tools paid for themselves in decreased operational costs and risk and increased IT asset and staff productivity. Clearly using out-of-band management tools was a cost-effective, efficient and smart business decision. The Evolution of Management Technologies For decades, command line interface (CLI) has been used for remote IT management. The user types pre-defined commands and the IT asset responds in kind with actionable data in text form. All remote IT access to computing and network assets used this interface as well. s first used smart modems via a dial-up connection to access assets with password protection to provide a measure of security. When serial connections evolved, terminal servers emerged that would provide access to servers and other assets using Telnet, a text-based CLI protocol that provided a means for remote access and control. As security concerns emerged, vendors developed secure console servers that used Secure Shell (SSH) to encrypt communications between the IT or network administrator's desktop and the remotely accessed IT asset. In the mid-1990s, Windows-based servers that used a graphical user interface (GUI) instead of CLI began emerging in corporate data centers. In response to this, vendors began offering keyboard, video, mouse (KVM) switches that allowed users to use the keyboard, monitor and mouse at their workstation to access and control multiple servers. More recently, KVM over IP switches have emerged that enable users to remotely access and use KVM switches in remote locations through IP networks. Consequently, KVM over IP switches have become important tools for management of Windows-based servers. Beginning with mainframe and later UNIX-based servers, hardware vendors began placing a service processor on the server motherboard for the sole purpose of monitoring and providing access to the hardware functions, including the BIOS, unit temperature, power control, etc., even in the event of an operating system crash. While the first service processor technologies and related protocols were proprietary, such as Sun's ALOM and HP/Compaq's ilo, more recently Intel, HP, Dell, IBM and other hardware vendors collaborated to develop an open standard service processor called IPMI that is now included on many rack-mounted and blade servers built on Intel's X86 architecture. IT administrators then used a service processor manager to access, monitor and control servers. In late 2004, the first vendor-independent IPMI manager emerged. The challenge facing most organizations is the fact that they use multiple out-of-band management technologies to access and manage a wide variety of new and legacy IT assets. Each new technology adds yet another layer of complexity for IT administrators. IT executives lack the luxury of managing one technology, rather they must manage everything in their enterprise including all new and legacy IT assets and remote access technologies. The most effective way to manage all these technologies is with a comprehensive out-of-band management system that provides centralized, consolidated access to all of the out-of-band management tools and the IT assets connected to them.

6 AVOCENT WHITE PAPER Security Clearly out-of-band management tools provide powerful access to IT assets. This access must be limited to trusted, qualified IT personnel. Any out-of-band management tool must include security features to authenticate IT administrators and to ensure all communications remain encrypted and private. While some out-of-band management systems may provide a separate security infrastructure, this adds yet another layer of complexity, and ultimately an additional point of vulnerability for IT managers who need tools to simplify management issues, not make them more difficult. Ideally, out-of-band management tools should support industry-standard authentication, directory and encryption protocols to enable integration with existing security infrastructures. CONCLUSION Local management and site visits are people, time and money intensive. Remote or out-of-band management provides a better way a time-saving, secure and cost-effective method to ensure that IT assets remain productive and connected to the network. To achieve the IT imperatives to cut costs and improve service levels and productivity, the next-generation IT infrastructure must include out-of-band management as a fundamental component in its architecture. However, for out-of-band management to be effective, its components must function as an integrated system, which can be accessed through a single, consolidated view, rather than as just another layer of separately managed boxes. Out-of-band management tools must provide the ability to be integrated into an organization's existing security infrastructure by supporting all industry-standard security protocols and specifications. Designed and deployed correctly, out-of-band management provides the remote IT management capabilities that directly affect an organization's bottom line and provides rapid return on investment. ABOUT AVOCENT Avocent (NASDAQ: AVCT) delivers IT operations and infrastructure management solutions for enterprises worldwide, helping customers to reduce costs and simplify complex IT environments via integrated, centralized in-band and out-of-band hardware and software. Through LANDesk, Avocent also is a leading provider of systems, security, and process management solutions. Additional information is available at: www.avocent.com. LAN TEK P. O. Box 549, Yucca Valley, CA 92286 TEL 800.660.2286 FAX 760.364.4997 lantek@eathlink.net www.lan-tek.net Avocent, the Avocent logo and The Power of Being There are registered trademarks of Avocent Corporation. All other marks are the property of their respective owners. Copyright 2006 Avocent Corporation. All rights reserved. 1206-OOBM-WP