Oracle Corente Services. Corente Services Administration Manual for Release 9.2

Size: px
Start display at page:

Download "Oracle Corente Services. Corente Services Administration Manual for Release 9.2"

Transcription

1 Oracle Corente Services Corente Services Administration Manual for Release 9.2 E February 215

2

3 Table of Contents Preface... vii 1 Domain Administration with App Net Manager App Net Manager Requirements Login to App Net Manager Interface Connections to the Corente SCP Saving Your Changes The Map Menus Tool Bar Domain Directory Location Menus Edit Location Delete Location Schedule Upgrade Regenerate Key Regenerate Configuration Manage Your Corente Account and Domain SNMP Overview of SNMP Configuration SNMP Views SNMP Users Location Form - SNMP Tab Location Form - Alerts Tab Create an Extranet Before You Begin Add an Extranet Connecting Locations in an Extranet Modify an Export Delete an Export Reports Sending Reports via Graphs Logs Custom Alarms and Events Active Alarms Cleared Alarms Events Viewing Alarms on the Map Deleting a Tunnel Deleting a Tunnel with the Location Form Deleting a Tunnel with Drag and Drop Corente Virtual Services Gateway Administration with Gateway Viewer Before You Access the Gateway Viewer User Groups Clients and Servers Peer Configuration Proxy Servers Multiple Subnets iii

4 Oracle Corente Services 2.2 Logging Into Gateway Viewer Main Screen for Administrators Monitoring User Interface Administrator Interface Application Status on Network Detailed Information on Application Statistics History on Application Detailed Information on Server Statistics History on Server Active Connections to Application Statistics History on Application (Client Statistics) Active Connections to Server Statistics History on Server (Client Statistics) Detailed Status on Application/Service Detailed Status on Server Status History on Server Update Comment Top Talkers Set Options Local Network Remote Networks Browsing Computers on Each Remote Network Network Administration NAT Information Monitor Computers Add Computers Remove Computers Mobile User Report Gateway Admin Upgrade Notification Status Corente Gateway Information Connection Status Show Detail Test Control Partner List Refresh Remote Login Backup and Restore Download Corente Gateway Download Log Files Download SNMP Extension Agent Corente Gateway MIB files Version SSL Administration A Accessing App Net Manager or Gateway Viewer from Behind a Proxy Server B SNMP B.1 Polling with the Corente MIB B.1.1 Location Gateway Information B.1.2 Corente Tunnels B.1.3 Monitored Applications B.1.4 Monitored Services B.2 Polling with Other MIBs iv

5 Oracle Corente Services B.2.1 System Information... B.2.2 System Uptime... B.2.3 CPU States... B.2.4 Memory and Swap Space... B.2.5 Processes... B.2.6 Network Interfaces... B.2.7 IP Addresses... B.2.8 Routes... B.2.9 IP Information... B.2.1 TCP Connections... B.2.11 TCP Information... B.2.12 UDP Listening Ports... B.2.13 UDP Information... B.2.14 ICMP Information... B.3 Traps... B.3.1 Alarm Traps... B.3.2 Event Traps... B.3.3 Traps to Expect... B.3.4 Important Traps to Monitor... B.4 Trap Severity Details... B.4.1 Configuration Traps... B.4.2 Failover Traps... B.4.3 Corente SCP Traps... B.4.4 Partner Traps... B.4.5 Security Traps... B.4.6 Software Error Traps... B.4.7 General Traps... B.4.8 Application Monitoring Traps... C Legal Notices... C.1 Oracle Legal Notices... C.2 DocBook XSL License... Index... v

6 vi

7 Preface This manual provides detailed information concerning administration of your Corente network using two web-based Corente applications: App Net Manager and Gateway Viewer. The purpose of this manual is to provide all the necessary information for the features that will be used to help keep your Corente application network up and running, and those that will be used to propagate adds, changes, and deletions of elements and policies. Systems Supported This guide supports Corente Release 9.2. Related Documentation Oracle provides several additional manuals that will aid you in using Corente Services. The following manuals are available from the Corente Services Documentation web page, I. Corente Services Planning II A. Corente Virtual Services Gateway Hardware Preparation and Deployment II B. Corente Services Policy Definition and Provisioning IV. Corente Services Troubleshooting Guide V. Corente Virtual Services Gateway Virtual Edition VI. Corente Services Client VII. Corente Services SSL Client VIII. Corente Services Mobile User The main documentation index for all Oracle products can be found at: documentation. Access to Oracle Support Oracle customers have access to electronic support through My Oracle Support. For information, visit or visit ctx=acc&id=trs if you are hearing impaired. Feedback Provide feedback about this documentation at: Conventions Hyperlinks can be used to navigate through the guide or the procedures related to an overall activity, or to jump to a cross-referenced topic or Internet URL. vii

8 Document Revision The following text conventions are used in this document: Convention Meaning boldface Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary. italic Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values. monospace Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter. Document Revision Document generated on: (revision: 234) viii

9 Chapter 1 Domain Administration with App Net Manager Table of Contents 1.1 App Net Manager Requirements Login to App Net Manager Interface Connections to the Corente SCP Saving Your Changes The Map Menus Tool Bar Domain Directory Location Menus Edit Location Delete Location Schedule Upgrade Regenerate Key Regenerate Configuration Manage Your Corente Account and Domain SNMP Overview of SNMP Configuration SNMP Views SNMP Users Location Form - SNMP Tab Location Form - Alerts Tab Create an Extranet Before You Begin Add an Extranet Connecting Locations in an Extranet Modify an Export Delete an Export Reports Sending Reports via Graphs Logs Custom Alarms and Events Active Alarms Cleared Alarms Events Viewing Alarms on the Map Deleting a Tunnel Deleting a Tunnel with the Location Form Deleting a Tunnel with Drag and Drop This chapter discusses the use of the Corente App Net Manager for administration of your Corente domain. 1

10 Overview of Corente Network Administration Overview of Corente Network Administration In this manual, you will learn about the interface of App Net Manager. In addition, you will learn how to: Edit an existing Location's personality Delete a Location Disable a tunnel Regenerate a Location's key (digital certificate) Regenerate a Location's personality file Change a Location's scheduled upgrade date and time Configure SNMP to monitor your Corente network Create an Extranet with another company Create and edit a trouble ticket to Customer Care View reports and logs concerning the performance of your Corente network View alarms and events that are generated in your domain 1.1 App Net Manager App Net Manager is a secure application that you use to create, configure, modify, delete, and monitor the components of your Corente network.to access this application, access the Corente Administration Homepage at 2

11 Requirements Figure 1.1 Corente Administration Homepage This webpage provides access to all of the tools you might need to manage your Corente application network. To create a Location gateway personality file: If you do not yet have an active Location in your Corente network, click the hyperlink for App Net Manager Lite. App Net Manager Lite will not allow you to enable more than the basic Location gateway options; however, you can add additional functionality to your Location gateway once it has been activated. For more information about creating Location gateways and using App Net Manager Lite, refer to the I. Corente Services Planning manual. If you already have an active Location, click the hyperlink for App Net Manager. After the first Location has been activated in your Corente network, all administrative activities must take place across a secure tunnel using App Net Manager Requirements To access App Net Manager, you must use a computer with: 256MB memory Oracle Java Web Start application (available for free download at java/javase/javawebstart/index.html). 3

12 Login to App Net Manager The latest version of the Java Runtime Environment (JRE), to ensure that the latest security enhancements are installed. Note that version 1.6. of the JRE may not be compatible with older versions of Linux. If your OS does not support 1.6. or does not appear to be compatible, you must manually download an earlier version (1.5._1 or 1.5._11) Additionally, this computer must be on the same LAN as an active Corente Virtual Services Gateway that has a secure connection to the Corente Services Control Point (SCP). Important When the security of your browser is set at High, an administrator will not be able to access the Login page, and it will not be obvious why the application is inaccessible. The highest browser security setting supported by App Net Manager is Medium. You can change the security setting of your browser by accessing the Tools menu, selecting Internet Options, and clicking on the Security tab. If you cannot access App Net Manager and you are using a proxy server on your LAN, refer to Appendix A, Accessing App Net Manager or Gateway Viewer from Behind a Proxy Server for modifications you must make to your web browser Login to App Net Manager Complete the following procedure to login to App Net Manager. 1. Access the Corente Administration Homepage ( and select the hyperlink labeled App Net Manager. If prompted, open the file with the Java Web Startapplication. 2. The application will load and initialize, until you are prompted with the Domain Authentication window. Figure 1.2 App Net Manager Login 3. Complete this window by your administrator User ID and Password, as well as the name of your Corente Domain. 4. If you would like App Net Manager to store the User ID and Domain name that you entered so that you can login from this computer more quickly in the future, select the Remember my User ID and Domain option. 5. Click Login. 6. The App Net Manager application will be displayed for your Corente application network. You are now logged in Interface The Corente App Net Manager is a secure application you can use to create, configure, modify, delete, and monitor the components of your application network.the main interface is set up like Microsoft Windows 4

13 Connections to the Corente SCP Explorer. It is divided into two main sections: the domain directory that is displayed on the left side of the screen, and the graphical/list interface that is displayed on the right side of the screen, which changes according to what you select in the domain directory (but always displays the map, accessible via the tab at its top). A menu bar and a tool bar are displayed above these two items. Figure 1.3 App Net Manager Interface In general, the interface does not refresh automatically. Location and tunnel status are updated automatically on the map, but other features of App Net Manager require a manual refresh. This can be achieved by selecting the feature or specific item you want to update and selecting the Refresh button in the tool bar. Note that when you want to refresh certain items on the interface, you must instead select the category or subcategory of that item to Refresh it. For more information about the tool bar, refer to Section 1.1.8, Tool Bar. Occasionally, data must be loaded onto the interface before you can view it. To view any data marked "Not Loaded", simply select the item and wait for the data to load Connections to the Corente SCP Occasionally, your Corente Virtual Services Gateway may lose contact with the Corente Services Control Point (SCP). This will not affect the status or the security of your Location connections. A disabled Corente SCP connection will only affect your ability to access the App Net Manager application, which will be unavailable until the Corente SCP connection is re-established. The Location gateway will automatically attempt to re-establish its connection to the Corente SCP at regular intervals until it is back up. If you cannot access App Net Manager, try again in a few minutes before following any troubleshooting procedures. 5

14 Saving Your Changes Saving Your Changes Whenever you add, delete, or modify your domain with the App Net Manager, your changes are loaded locally, but they are not necessarily committed at the Corente Services Control Point (SCP) and distributed to the affected Location(s). To make your changes permanent, you must select Save from the File menu (for more information on the App Net Manager menus, refer to Section 1.1.7, Menus ) or the Save button on the tool bar (for more information on the App Net Manager tool bar, refer to Section 1.1.8, Tool Bar ) to commit your changes and propagate them to the affected domains, Locations, or remote users (if applicable). You must save your changes before you exit App Net Manager or your changes will be lost. When you select Save, a Save All Changes window is displayed. Figure 1.4 Save All Changes This window allows you to: Review: Select this button to review the changes that have been made by your administrator account since login (or the last time you saved). Start: Select this button to begin saving all your changes. Finished: Select this button when App Net Manager has completed saving all your changes. Cancel: Select this button to close the window without saving your changes. Whenever you have made changes and have not saved them yet, the corresponding category on the domain directory will have a red star on the icon ( ) to remind you about the unsaved changes The Map When you log into App Net Manager, you are presented with a map that allows you to view your Corente network at a glance. This map presents a geographical representation of your Corente network overlaying a map, allowing you to monitor Location and tunnel status of each Location gateway. An example of the map is shown below. 6

15 The Map Figure 1.5 The Map View Map Symbols The map displays your Corente domain with a set of icons and lines in various colors that represent the state of your Locations and tunnels. Each Location in your Corente network is represented by its Location name and an icon. To access a legend that describes the icons used to represent your Locations and the colors used to describe the state of Locations or tunnels, as well as other icons used throughout App Net Manager, open the View menu at the top of App Net Manager and then select Legend. Figure 1.6 Map Legend 7

16 The Map The table below presents the meaning of each Location icon. Table 1.1 Guide to Location Icons Icon Meaning Explanation Intranet Location This icon designates a Location within your own Corente network Extranet Location This icon designates a Location that has been imported into your Corente network from another company s Corente network using the Extranet option. (For more information, refer to Alarm Suppression.) Location available for download This icon designates a Location gateway that has just been added to your Corente network, but its personality file has not yet been downloaded to a floppy disk for installation. This section contains the following options: Duration: Select how long the alarm suppression should last when activated. Frequency: Select when the alarm suppression should be activated: daily or on a given day of the week, starting at the time of your choice. Alarm Categories: Select to which categories of alarms the suppression applies. When a box for a given category is checked, and the alarm suppression is active, no alarms are sent for that category Application Monitoring, Server Monitoring and/or Tunnel Alarms. See Section 1.9, Create an Extranet. Corente Client This icon designates a Corente Client. The table below presents the meaning of each Location icon color. Table 1.2 Guide to Icon Colors Icon Color Meaning Explanation Firewalled An icon with a circular red border means that the Location gateway appears to be operating behind a firewall that restricts access to TCP port 551. It is not possible to create a tunnel between two such restricted Location gateways. Active This color indicates that the Location has a secure connection with the Corente SCP. It is currently active on the Corente network. Inactive This color indicates that the Location is currently inactive on the Corente network. The Location 8

17 The Map Icon Color Meaning Explanation gateway has contacted the Corente SCP at least once since it was first activated, but does not currently have a connection with the Corente SCP. The Location gateway has been powered off or is being rebooted safely. Downloaded This color indicates that the personality file for this Location gateway has been downloaded to a floppy disk, but the Location gateway has not been activated. This could mean that the Location gateway has not yet been installed or started up, or it could mean that the Location gateway was unable to contact the Corente SCP. Disconnected This color indicates that the Location gateway has suddenly become disconnected from the Corente SCP, without being powered off safely. This could indicate an interruption in Internet service at that location or a problem with the Location gateway hardware. Denied This color indicates that Corente has determined this Location to be invalid. The Location gateway will be unable to connect to the Corente SCP and your network. If your Location gateway is denied, contact Customer Operations for more information. Upgrade Scheduled When a purple triangle appears on a Location icon, an upgrade has been scheduled for the Location gateway by Customer Service. Alarm When a yellow triangle appears on a Location icon, the Location gateway is generating an Active Alarm. The table below presents the meanings of each line color. Table 1.3 Guide to Line Colors Line Color Meaning Explanation Green Active The tunnel between the Locations is secure and active. Yellow Pending The tunnel between the Locations is inactive. Yellow indicates that the tunnel is currently in the process of being brought up or being brought down. Red Alert A problem has occurred with the tunnel. An alarm notification identifying the problem has been sent to the address that you specified at registration. Black Configuration Alert The Location partners are able to communicate with each other however, the User Groups that each partner is exporting to the other contain conflicting address spaces. You must use one of the NAT options on the Location form to remap one of the User Groups to a new address space or manually reconfigure one of the conflicting subnets. 9

18 The Map Map View Commands Several commands are available in App Net Manager to customize your map or make administration tasks easier Isolating a Location Icon Clicking the name of a Location in the domain directory (for more information about the domain directory, refer to Section 1.1.9, Domain Directory ) will isolate that Location on the right side of the interface and show only the tunnel connections between that Location and its partners, in a hub-and-spoke format. This interface provides several options to make it easier to view a Location and its partners. When you rightclick the background, a menu appears with the following options: View: When you highlight View, you can toggle on/off a variety of different statuses to determine what will be displayed on the interface. To select all toggles at once, choose All. The toggles show the following: Unadministered Partners: Toggle display of possible partners in the domain that have not been partnered with this Location. Access Partners: Toggle display of two special partners (LAN to Location Access and LAN to Internet Access). These "partners" allow computers on the LAN to access the Location server for access to Gateway Viewer and provide a firewall between the LAN and the Internet, respectively. Intranet Partners: Toggle display of partners within the domain. Extranet Partners: Toggle display of partners from other domains (meaning extranet partners). Client Group Partners: Toggle display of client groups who have been partnered with the Location. Partial Partners: Toggle display of possible partners who have been enabled as partners on only one side of the partnership. Location partnerships are reciprocal and must be defined on both sides of the partnership to establish a connection. Active Tunnels: Toggle display of partners who currently have an active tunnel to the Location. Down Tunnels: Toggle display of partners whose tunnel to the Location is currently down. Alert Tunnels: Toggle display of partners whose tunnel to the Location is currently in an alert state. Configuration Alert Tunnels: Toggle display of partners whose tunnel to the Location is currently in a configuration alert state. Choose Color: Select this option to open a dialog box that allows you to choose a new background color for this interface. The color that you choose will apply whenever you view a Location and its partners for this domain. Set Default Color: Save the current background color as your default background color Load and Refresh Alarms Alarms are not loaded or refreshed automatically in App Net Manager. To view alarms on your map when you log into App Net Manager: 1. Right-click anywhere on the map but a Location icon. 1

19 The Map 2. Highlight Alarms. 3. Select Load Alarms. Alarms data will be loaded onto your map so that you can see what Locations are generating alerts. Locations that are generating alerts will display a yellow alarm image on their icons ( ). If you have already loaded alarms, are monitoring the status of an alarm in the domain, and would like to view the most up-to-date alarm data on the interface: 1. Right-click anywhere on the map but a Location icon. 2. Highlight Alarms. 3. Select Refresh Alarms. The most up-to-date alarms data will be displayed on your map and in the domain directory. For more information about alarms in App Net Manager, refer to Section 1.11, Alarms and Events View All or Problems Only If you would like to isolate problems within your domain and view on your map only those tunnels in the Down, Alert, or Configuration Alert states and Locations that are currently in the Denied ( ) or Alert ( ) states: 1. Right-click anywhere on the map but a Location icon. 2. Highlight View. 3. Select Problems Only. (By default, the map will show All.) This setting allows you to easily monitor issues within your domain. When Problems Only is selected, any Location or tunnel within your domain that is currently experiencing a problem will be displayed on the map. To return to displaying all Locations and tunnels: 1. Right-click anywhere on the map but a Location icon. 2. Highlight View. 3. Select All View Tunnels in Active, Down, Alert or Configuration Alert Status If you would like to your domain map to display only those tunnel connections that are currently maintaining certain status(es): 1. Right-click anywhere on the map but a Location icon. 2. Highlight View. 3. Select or deselect any of the following statuses (by default, all of these will be selected): 11

20 The Map Active Tunnels Down Tunnels Alert Tunnels Configuration Alert Tunnels These settings allow you to isolate certain tunnel conditions within your domain in order to view them on your map more easily Changing Maps The background map can be toggled between a map of: the continental United States (default) Asia/Australia Europe/Asia Europe Japan the world custom image Choose the map that best represents the geographic location of your domain. Your choice will be saved for future administration sessions. To switch between these maps: 1. Right-click anywhere on the map but a Location icon. 2. Highlight View, then highlight Set Background. 3. Select any map from the list that is displayed. If none of the default maps suit your particular domain, you can provide your own custom background image in App Net Manager. To display a custom image to your domain's App Net Manager interface, open the Domain Preferences window and then select the General tab. You can point to a new image and change certain display colors in the Custom Map Image section of the General tab (see Section 1.7, Manage Your Corente Account and Domain. To display the custom image as your domain map background, right-click the domain map. On the menu that appears, select View, then select Set Background, and then select Custom. The coordinates of each Location icon on the map will be maintained based on the default map size of 795 x 555 pixels, but scaled appropriately based on the custom image aspect ratio. This means that switching between default maps and the custom map should not affect icon placement. If no URL is specified on this tab or the image's URL cannot be loaded, then a message describing the problem will appear in the upper left corner of a blank map background. Note Changing the map image affects the map for all administrators of the domain. Remember that only one set of coordinates is stored for each Location. When you switch to a new map, the position of each icon on the interface will remain the 12

21 Menus same. You will have to move the icons manually to reflect their geographic location on the new map image (see Section , Manually Arranging Icons ) Manually Arranging Icons You can manually position the Location icons on your map to better reflect the physical locations of your Locations. You may move any icon except those that designate an imported Location. Icons for imported Locations will always appear along the left-hand side of the map. 1. Hold down the Ctrl key. 2. Click a Location icon. 3. When the compass face appears around the icon, drag it to a new location and release the mouse button. Note Only one set of coordinates is stored for each Location. If you move an icon and then switch maps (see Section , Changing Maps ), the icons will retain their position from the previous map. To maintain a similar position, you will have to move the icons again Automatically Arranging Icons You can use several options to arrange your Location icons on the map according to the method that you prefer. To access these options: 1. Right-click anywhere on the map but a Location icon. 2. Highlight View, then highlight Arrange Locations. 3. Select any of the following options (by default, the Manual option will be selected): Manual: This is the default setting. When selected, you can move any icon to any position on the map. To manually position an icon, refer to Section , Manually Arranging Icons. When a Location is created with a valid zip code and you are using the U.S. map as the map, the icon will be placed initially at the zip code site. Otherwise, icons will be tiled on the right side of the map. Extranet Location icons will be tiled on the left side of the map and cannot be moved. By Zip: This option is only available when using the U.S. map. The icons will be arranged according to the zip codes on the Location form for each Location. When created, Locations that do not have a valid zip code will be tiled on the right side of the map. Extranet Location icons will be tiled on the left side of the map. You cannot manually reposition an icon when this option is selected. If you are using this mode and change your background from the U.S. map to another map, then the mode will switch to Manual arrangement. Auto: This option will tile the icons along the top of the map, in case-sensitive alphabetical order. Intranet Location icons will appear before Extranet Location icons. As with the By Zip option, users cannot reposition icons when this option is selected Menus The menus at the top of the interface provide access to controls for App Net Manager File Menu 13

22 Menus Save: Whenever you add, delete, or modify your domain with App Net Manager, your changes are loaded locally, but they are not necessarily committed at the Corente Services Control Point (SCP). To make your changes permanent, you must select Save. For more information about the Save feature, refer to Section 1.1.5, Saving Your Changes. Add New Item: This option changes according to the category of item you have highlighted in the domain directory. It allows you to add a new item for that category. Wizards: The Wizards feature provides step-by-step instructions and explanations that allow you to easily add one of the following to your domain: Location: Use this wizard to add a new Location to your domain. Download Location: Use this wizard to download the personality file for a new Location. Partner Locations: Use this wizard to connect two Locations as partners. Tube: Use this wizard to further define an existing connection between Location partners. Tubes allow you to identify a User Group or application on one side and a User Group or application on the other that are allowed to communicate, and firewall rules that will be placed between them. For more information about the wizards, refer to the Corente Services Policy Definition and Provisioning manual. Exit: Select this option to logout and exit App Net Manager Edit Menu Edit: If you would like to modify the personality of a certain item in your domain (e.g., a Location, Corente Client, administrator account, etc.), highlight that item and select this option. The Edit option will be available only if the item that you have selected can be edited. Certain items within the domain (e.g., certain Firewall Policies) are included by default and cannot be modified. Refresh/Clear Changes: In general, App Net Manager does not refresh automatically. To view the most up-to-date status or data about certain items in your domain, select the item and then select this option. This option is also useful when multiple administrators are modifying the domain at once. In addition, if you have made any changes in App Net Manager without saving them, this option will discard your uncommitted changes. Note that when you want to refresh certain items on the interface, you must instead select the category or subcategory of that item to Refresh it. Copy: The Copy and Paste options mimic the drag and drop functions in App Net Manager. If you select an object in the domain directory and then select Copy, this mimics the drag function. You can then select another object and select Paste, which mimics the drop function. For more information about drag and drop, refer to Section , Drag and Drop. Paste: The Copy and Paste options mimic the drag and drop functions in App Net Manager. If you select an object in the domain directory and then select Copy, this mimics the drag function. You can then select another object and select Paste, which mimics the drop function. Duplicate: Administering a domain can be a tedious process if you are adding multiple items with similar personalities. The Duplicate option allows you to add a new item by selecting an existing item and duplicating its personality. You must choose a name for the new item, and may need to modify certain personality variables to make the item unique. App Net Manager will let you know what modifications you must make. Delete: If you would like to delete a certain item from your domain (e.g., a Location, Corente Client, administrator account, etc.), highlight that item and select this option. The item will be permanently 14

23 Menus removed from your domain once you save your changes to the domain. The Delete option will be available only if the item that you have selected can be deleted. Certain items within the domain (e.g., certain Firewall Policies) are included by default and cannot be removed. Delete Cookies: Certain preferences are saved by the App Net Manager interface per administrator login account, such as dialog box sizes, position of the window, and display of the tool bar. If you would like to clear these preferences for your account and return to the default settings, select this option. Find: If you would like to locate specific items within your domain, select this option. The Find interface will be displayed. Figure 1.7 Find Window Use the Find interface as follows: Search for: Select one or more of the following options, depending on what you are trying to locate: Customer Domains (if you are viewing multiple domains at once), Locations, and/or Clients (Corente Clients only). You must be logged into a domain to search it. Locations and Clients must have been previously loaded in order to be searched. Criteria: Select Match whole word only if you would like items to appear only when a whole word in their names match what you have entered. Select Match case if you would like items to appear only when the case of their names' letters match what you have entered. After selecting the appropriate options, begin entering the name of the item you would like to locate in the Find what field. As you enter text, located items will be listed in the Matching Items section. Selecting an item and clicking Select will find and select that item for you in the domain directory. Highlighting an item and clicking Edit will open the personality form for that item (Locations and Clients only). Click Close to close the window when you are finished Login Menu Logout [administrator name]: Select this option to log out of App Net Manager without exiting the program. Change Password: Select this option to change the password for this administrator account View Menu 15

24 Tool Bar Legend: Select this option to display a legend that displays the definitions of all icons and colors that are used in App Net Manager. For more information about the legend, refer to Section , Map Symbols. Tool Bar: Toggles display of the tool bar at the top of the interface. For more information about the tool bar, refer to Section 1.1.8, Tool Bar. Graphical Views: If applicable, toggle between Graphical View and List View for the right side of the interface Help Menu Help: Displays the Corente App Net Manager help file. About App Net Manager: Displays the About window that describes this version of the application. Figure 1.8 About App Net Manager External Ticketing: Launches the ticketing system in a new browser window Tool Bar The tool bar provides easy access to many options for App Net Manager that are also available from the menus at the top of the interface. File menu options: Edit menu options: Wizards: For more information about the menus and these options, refer to Section 1.1.7, Menus. To toggle display of buttons on the tool bar, right-click anywhere on the tool bar. The menu will display the following options: File Tool Bar: Toggle display of the File menu options on the tool bar. Edit Tool Bar: Toggle display of the Edit menu options on the tool bar. 16

25 Domain Directory Wizard Tool Bar: Toggle display of the Wizards on the tool bar. Hide Button Text: Toggle display of button names. Hide Tool Bar: Toggle display of the entire tool bar. You can show the tool bar again by selecting Tool Bar in the View menu. By default, App Net Manager displays File and Edit options Domain Directory The domain directory of App Net Manager lists each domain that you opened from your administrator account at login. Figure 1.9 Domain Directory When you open a domain name in the directory, the following options and categories are displayed: Contact Information: The Contact Information feature is used to provide Corente with contact and billing information for your organization. By default, when you edit Contact Information, the information you entered during registration will appear on this window, but you can modify it if you would like. For more information about this window, refer to the Corente Services Planning manual. Administrators: The Administrators feature is used to add new administrators for your domain. For more information, refer to the Corente Services Planning manual. Global Intranet Settings: When you open this category, the following subcategories are displayed: Firewall: Open this subcategory to display the Firewall Services and Firewall Policies subcategories. Use these features to create, edit, and manage firewalls for User Groups of your Locations. For more information about these features, refer to the Corente Services Policy Definition and Provisioning manual. Quality of Service: Use this feature as in previous releases to create, edit, and manage Quality of Service (QoS) entries for use with your Locations. For more information, refer to the Corente Services Policy Definition and Provisioning manual. SNMP: Open this subcategory to display the SNMP Users and SNMP Views subcategories. Use these features to manage SNMP monitoring of your domain. For more information about configuring SNMP for use with Corente, refer to Section 1.8, SNMP. User Remote Access: Open this subcategory to display the following subcategories: 17

26 Domain Directory Client Administration: Open this subcategory to display the following subcategories: Clients and Client Groups. Use these features as in previous releases to create, edit, and manage Corente Client accounts and group them together to partner them with Locations. For more information, refer to the Corente Services Client manual. SSL Administration: Open this subcategory to display the following subcategories: SSL Services, SSL Clients, and SSL Authorized Groups.Use these features to create, edit, and manage Corente mobile user accounts and group mobile users together to partner them with Locations. For more information, refer to the Corente Services SSL Client manual. Mobile User Administration: Open this subcategory to display the following subcategories: Mobile Users and Mobile User Groups. Use these features as in previous releases to create, edit, and manage SSL Services, Corente SSL Client accounts, and group SSL Clients together to partner them with Locations. For more information, refer to the Corente Services Mobile User manual. Locations: Opening this category will display all of the Locations in your domain and those imported into your domain from another domain (through an extranet). Use this feature to create, edit, and delete Locations in your domain. For more information, refer to the Corente Services Policy Definition and Provisioning manual. Opening a Location in the domain directory will display a set of subcategories that allow you to view and change the personality of that Location. In general, these subcategories correspond to screens on the Location's Location form. Administered Clients Administered Mobile Users Applications External Authentication Failover Locations Installed Specials Monitored Servers Network Interfaces Partners Routes SNMP SSL Remote Access User Groups Right-clicking a specific Location will display a menu of options, like the Gateway Menu in previous releases. Extranet Imports/Exports: Use this feature to create, edit, and delete extranet partnerships with other domains. For more information, refer to Section 1.9, Create an Extranet. 18

27 Location Menus Reports: Open this category to display the following subcategories: Custom, Graphs, and Logs. Depending on the level of permissions that your administration account has been granted, the Reports category may not appear in the domain directory. For more information, refer to Section 1.1, Reports. Alarms and Events: Alarms and events allow you to monitor the health of your application network. Depending on the level of permissions that your administration account has been granted, the Alarms and Events category may not appear in the domain directory. For more information, refer to Section 1.11, Alarms and Events Drag and Drop The drag-and-drop functionality of App Net Manager allows you to edit personalities, duplicate existing items, and create new connections with a click of the mouse. Simply click on an item in the domain directory with your mouse, drag that item over another item, and release when you see the plus symbol (+). App Net Manager will confirm your action in a dialog box and launch a wizard or configuration screen, if applicable. Note There are sometimes restrictions as to whether an object will accept a drop of another object. For example, the objects must be from the same domain or the object accepting the drop must have been previously loaded on the interface. The objects also must have the correct permissions (i.e., if the Policy Use of a Firewall Policy prevents a Location from using that policy, you cannot drag and drop that Firewall Policy onto one of the Location's User Groups.) While more specific drag and drop situations are described in applicable sections of this help file, in general, drag and drop can be used to: Create connections (for example, dragging and dropping one Location onto another Location to launch the Partner Locations Wizard) Add an item to a group of items (for example, dragging and dropping a Corente Client onto a client group to add it to that group) Add rules or properties of one item to another similar item (for example, dragging and dropping address ranges from one User Group onto another User Group) Duplicate an existing item onto its category name to duplicate that item (for example, dragging and dropping a Location onto the Locations category to duplicate that Location) The Copy and Paste options in the Edit menu and on the tool bar provide the same functionality as drag and drop. If you select an object and then select Copy, this mimics the drag function. You can then select another object and select Paste, which mimics the drop function. These options allow you to drag and drop when objects are too far away from each other in the domain directory Location Menus There are several options available by right-clicking a Location icon (either on the map or in the Locations category of the domain directory). The availability of each of these options depends upon the current status of the Location server. These options include: Edit: This option allows you to view or modify the Location form of a Location after it has been added to your view. This form contains personality settings unique to the Location that you chose when you created the Location. For more information, refer to Section 1.2, Edit Location. 19

28 Edit Location Copy: The Copy and Paste options mimic the drag and drop functions on the interface. If you select an object in the domain directory and then select Copy, this mimics the drag function. You can then select another object and select Paste, which mimics the drop function. Duplicate: Administering a domain can be a tedious process if you are adding multiple Locations with similar personalities. The Duplicate option allows you to add a new Location by selecting an existing Location and duplicating its personality file. You must choose a name for the new Location, and may need to modify certain personality variables to make the Location unique. App Net Manager will let you know what modifications you must make. Delete: This option will remove a Location from your domain. For more information, refer to Section 1.3, Delete Location. Schedule Upgrade: When a small purple triangle appears on a Location's icon on the map or in the domain directory ( ), Customer Care has scheduled an upgrade for that Location at some point in the future. To view or modify the date and time when this upgrade will occur, select this option. This will display the Schedule Upgrade window for the Location. For more information, refer to Section 1.4, Schedule Upgrade. Refresh / Clear Changes: Select this option to display the most up-to-date data about this Location in App Net Manager. This option is useful, for example, when multiple administrators are modifying the domain at once, or you want to view the up-to-the-minute status of alarms in your domain. In addition, if you have made any changes in App Net Manager without saving them, this option will discard the uncommitted changes. Download Location: This option is only available when you have created a new Location, but have not yet downloaded the personality file. A Location that appears on your view as this icon ( ) must be downloaded to be activated on your domain. For more information, refer to the Corente Virtual Services Gateway Hardware Preparation and Deployment manual. Regenerate Key: This option will regenerate the key used to create secure and private tunnels between your Locations and the Corente SCP. For more information, refer to Section 1.5, Regenerate Key. Regenerate Configuration: When an activated Location is in the Disconnected ( ) or Inactive ( ) state, this option will return the Location's status in App Net Manager to the Download state ( ) so that the personality file for this Location can be re-downloaded and re-installed. For more information, refer to Section 1.6, Regenerate Configuration. Alarms: Alarms are not refreshed automatically in App Net Manager. If you are monitoring the status of a Location that is generating an alarm and would like to view the most up-to-date alarm data for that Location, right-click the Location icon and select Alarms/Load Alarms. The most up-to-date data for this Location will be displayed on your map and in the domain directory. For more information about alarms, refer to Section 1.11, Alarms and Events. 1.2 Edit Location When you add a Location to your domain, you may have completed a form called the Location form. This form captures information regarding the setup and preferences for a particular Location, and then a unique personality file is created from this information. Even after you have activated a Location, you can view or modify this form at any time. To access this form for a Location: 2

29 Edit Location 1. Right-click on the Location icon in the map or domain directory and select Edit. 2. Double-click the Location name in the domain directory. 3. Select the Location name in the domain directory and then select the Edit option from the tool bar or the Edit menu. The Location form will be displayed. You can jump to a particular screen on the form by selecting one of the tabs displayed across the top. Figure 1.1 Location Form If you decide to make any changes, click OK to store your changes and close the window. Click Cancel to close the window and discard the changes. You must save your changes with the Save button on the tool bar in order for them to take effect. If you modify the form for a currently active Location, all changes to the personality will be downloaded directly to that Location. Be aware that some changes you make on this form may cause the Location server to restart when you Save your changes. If the Location restarts, service will be temporarily interrupted at that site. 21

30 Delete Location Warning When modifying a Location using the Location form, you must make certain that any changes you make in one screen are reflected in the other screens of the form. If the information you supply does not agree throughout the form, then it is possible that your Location or pieces of your domain or even LAN will stop working. The Location form will notify you in an alert box what additional information needs to be changed when you make a modification; however, you must go to those screens yourself and make the appropriate additional changes. For information about the tabs and fields on this form, creating new Locations, and downloading Locations for installation, refer to the Corente Virtual Services Gateway Hardware Preparation and Deployment manual. 1.3 Delete Location When you want to delete an entire Location from your Corente network, delete the site s Corente Virtual Services Gateway from App Net Manager. The Location and all computers operating behind it will no longer be a part of the Corente network. Warning Remember that this deletion will be permanent and cannot be undone. If you choose to delete a Location, you can add a new Location as a replacement at any time, but you must complete the personality configuration and installation procedures all over again, and then re-establish both Location and client partners. Follow this procedure to delete a Location from your Corente network. 1. Right-click the Location icon (on the map or in the Locations category of the domain directory) and select Delete. The Delete screen will appear in a new window. Figure 1.11 Delete Location Window 2. Enter your administrator password in the field and then click Delete to remove the Location. The icon for your Location will be removed from the view of App Net Manager. To re-add a Location at the same site that you just deleted, you will have to create a new personality file for it, even if you use the same machine. 1.4 Schedule Upgrade 22

31 Schedule Upgrade When a small purple triangle appears on a Location's icon on the map or in the domain directory ( ), Corente Customer Care has scheduled an upgrade for that Location at some point in the future. To view or modify the date and time when this upgrade will occur, right-click on the Location icon on the map (or in the Locations category of the domain directory) and select Schedule Upgrade. This will display the Schedule Upgrade window for this Location. Figure 1.12 Schedule Upgrade Window This window allows you to change a Location's scheduled upgrade once it has been marked for upgrade. You can schedule the upgrade during the Location's first maintenance time after a specified date or for a specific date and time. (The Preferred Maintenance Time for a Location is set during creation with the Location Wizard and can be changed later on the Location tab of the Location form.) If you set the Location to upgrade for a specific date and time that has already passed, the upgrade will occur as soon as possible. The fields and options on this screen are as follows: When: Select As soon as possible after to schedule the upgrade for as soon as possible after the chosen Day and Time. Select First Maintenance Time after to schedule the upgrade for the first Preferred Maintenance Time of the Location after the chosen Day and Time. Local Time: The date and time for the scheduled upgrade (that will either occur As soon as possible afteror First Maintenance Time after, depending on what you have selected). You can change this date and time by clicking on the item you would like to change and either using the arrows on the field or entering a new date or time. Location's Time: As above, but the date and time are displayed in the Location's own time zone (configured on the Location tab of the Location form). Reset to: Select one of the following buttons to change the date and time of the upgrade: Now: Select this button to date and time of the upgrade to the current date and time. 23

32 Regenerate Key Week: Select this button to move the date and time of the upgrade to a week ahead of the current date. Administered Weekly Maintenance Time: This field will display the Preferred Maintenance Time of the Location, which is administered on the Location tab of the Location form. Confirm Password to Schedule Upgrade: If you are making any changes to the Schedule Upgrade window, you must enter your administrator password to confirm your changes. Click Upgrade to save your changes, or Cancel to discard your changes and close the window. Note A Location will not upgrade if it is not Active ( the upgrade. ) or if it loses connectivity during 1.5 Regenerate Key Each Corente Virtual Services Gateway maintains a private, secure connection with the rest of your Corente network through an exchange of encryption keys and by attaching its digital signature to each message. Each Location gateway is assigned its own encryption key that is stored by every other Location gateway in your Corente network. The Corente SCP also stores this information and maintains its own key. When a tunnel is made between any of these devices, the devices present their key to the other device which checks this key against what is stored. If the key is verified, then a secure tunnel will be established. If you believe that the security of your network has been compromised or one of your Location gateways has been tampered with, you can force the Location gateway to generate a new encryption key. Important You may never need to use this command. It is only provided so that in extreme situations, you can maintain the security of your network. Follow this procedure to regenerate a new encryption key for a Location gateway. 1. Right-click on the Location icon (on the map or in the Locations category of the domain directory), highlight Regenerate, and then select Key. 2. The Generate Key window will appear, as shown below. Figure 1.13 Regenerate Location Key Window 3. Enter your administrator password in the appropriate field to complete this operation. Remember that you must have administrative power over this Location gateway to regenerate its key. 24

33 Regenerate Configuration 4. Click Generate. Important This operation will cause a temporary interruption of service. All Corente tunnels that were connected to the Location gateway will automatically be re-established once the key has been regenerated. When you use the Regenerate Location Key command, the Corente SCP and all of your Locations will receive the new key of the Location gateway to store in their databases. If any Location gateways are not connected to the Corente network when you perform this operation, they will receive the key the next time they contact the Corente SCP. 1.6 Regenerate Configuration Corente recommends that you keep each Location s personality file on disk after installation or that you create a backup copy of each Location s personality file and keep this disk in secure location. In the event that a Location gateway is ever destroyed (or if you simply need to change the hardware), you will save a lot of time and effort if you have kept a copy of the personality file on hand. See Section 2.18, Backup and Restore for information on how to create a backup personality disk in Gateway Viewer. However, if you do not have the original copy or a backup copy of a Location's personality file, you can create a personality file disk for your Location gateway using the Regenerate Location Configuration option. This option prevents you from having to delete this Location from App Net Manager and then create it again if you need to reinstall it. The Regenerate Configuration option is available only when the Location gateway is in the Disconnected ( ) or Inactive ( ) state. To regenerate the personality, right-click a Location icon (on the map or in the Locations category of the domain directory), highlight Regenerate, and then select Configuration. The Regenerate Location Configuration window will be displayed. Enter your password and click the Generate button. All of the keying material for this Corente Virtual Services Gateway will be regenerated and its icon on is returned to the Download state ( ). You can then use the Download Gateway option to download the personality file to a floppy disk and use this disk to install the personality file on the new Location gateway. Figure 1.14 Regenerate Location Configuration Window Note You should only use Regenerate Location Configuration if you need to start over and do not already have the original personality file disk or a backup personality file disk for this Location gateway. If you regenerate a personality file for a Location, because this option returns the Location to the Download state, you will not be able to connect to the Corente network with this Location gateway until you have reinstalled the personality file onto it. 25

34 Manage Your Corente Account and Domain 1.7 Manage Your Corente Account and Domain A feature in the Corente App Net Manager allows you to edit domain-wide settings for App Net Manager controls. When you right-click the name of a domain in the domain directory, a menu of options will be displayed that allow you to control display of and default values for the entire domain. Select the Preferences option to open the Domain Preferences window. The Domain Preferences window allows you to set certain default values for your domain that will apply to all applicable instances in App Net Manager unless modified individually. General: This tab allows you to configure two general settings for App Net Manager: Figure 1.15 Domain Preferences Window, General Tab Inactivity Timeout: When you select Enable inactivity timeout and enter a range from 1 minute to 24 hours in the adjacent fields, App Net Manager will automatically log administrators out after the specified period of inactivity and return them to the login dialog box. Inactivity is determined according to mouse movement or keyboard input. By default, timeout is disabled, meaning that App Net Manager will never timeout due to inactivity. Changes to the timeout period will not go into effect until the next administration session in App Net Manager. If a login account has administration rights on multiple domains, timeout will be based on the shortest non-zero timeout of all domains the administrator is logged into. This setting also applies to administrators of Gateway Viewer for all Locations in this domain. Custom Map Image: App Net Manager provides several default maps that can be used as backgrounds over which your domain is displayed, to provide a simple visual reference. Corente provides maps of the United States, the World, Japan, Asia/Australia, Europe/Asia, and Europe, as well as a blank background. If none of these maps suit your particular domain, you can provide your own custom background image to make your domain easier to view. To display a new background image, select or and enter the URL where the new image is located. The URL must be accessible by your computer in order for the image to appear; App Net Manager will not upload this image, but load it from this URL every time an administrator logs in. Modify the following options if necessary: 26

35 Manage Your Corente Account and Domain Background Color: If the aspect ratio of the custom background image doesn't match the window aspect ratio, the background color selected here will be used to fill in the remaining space. Select Use Default to use the default color blue, or select a new color by clicking the Select Color button. Location Text Color: This color is used to display the name of each Location on the domain map. If the default cyan color is unreadable on the custom map image that you have selected, you can select a new color by selecting the Select Color button. Select Use Default to use the default cyan color. Extranet Location Text Color: This color is used to display the name of each Extranet Location on the domain map. If the default orange color is unreadable on the custom map image that you have selected, you can select a new color by selecting the Select Color button. Select Use Default to use the default orange color. To display the custom image as your domain map background, click OK and Save your changes and then right-click the domain map. On the menu that appears, select View, then select Set Background, and then select Custom. The coordinates of each Location icon on the map will be maintained based on the default map size of 795 x 555 pixels, but scaled appropriately based on the custom image aspect ratio. This means that switching between default maps and the custom map should not affect icon placement. If no URL is specified on this tab or the image's URL cannot be loaded, then a message describing the problem will appear in the upper left corner of a blank map background. For more information on switching to the custom map, refer to Section , Changing Maps. Alerts: This tab allows you to enable domain-wide settings for alerts generated for this domain: Figure 1.16 Domain Preferences Window, Alerts Tab Notify on Administration Change: Enable this checkbox to generate notifications to the addresses in the table below each time a change has been made to this domain. The information in the notification is similar to the information provided on the Administration log of the Reports feature (see Section , Administration Logs. The subject line of the will display the domain in which the change was made, the action that was performed, the administrator who performed the action, and (if applicable) the fully-qualified name of the Location that was changed. The body of the will provide the same information, in addition to the time at which the action was performed. An example is as follows: Subject: UPDATE Corente Domain [mycompany] Admin [SCP Operator] Upgrade [mycompany.nyc] The following administrative action was performed 27

36 Manage Your Corente Account and Domain in Domain: mycompany at Date/Time: Thu Jan 2 9:27:12 EST 211 by Administrator: SCP Operator Update Upgrade mycompany.nyc By default, this feature is disabled. Default Addresses to receive Alerts: Specify up to five (5) default addresses that will be used for notification of alerts if you have not specifically overridden these addresses. These addresses can be overridden for each Location on the Alerts tab of the Location form (see the Corente Services Policy Definition and Provisioning manual for more information about the Location form). Password: The Password tab allows you to set password settings that will apply to all entities that that use a password to log into your application network (i.e., administrators of App Net Manager, administrators of Gateway Viewer, Corente Clients, and Corente SSL Clients). Figure 1.17 Domain Preferences Window, Password Tab Password Minimum Length: Enter the minimum length of passwords that can be set for login accounts. This value can be from 3 to 2 characters. Expire Passwords After: Select this option if you would like to enable password expiration. If this option is selected, you must enter the length of time that passwords will remain valid until they expire. This value can be from 1 to 365 days. When a password expires, the user will be instructed to choose a new password, with the minimum length you chose above and at least: one lower-case letter one upper-case letter one numeric character Password Reuse Restriction: Enter the number of previously used passwords that may not be set again for login accounts. You can restrict up to 12 previous passwords from being reused. This option is only available if password expiry is active. SMTP Server: The SMTP Server tab allows you to store preferred settings for the SMTP mail server that administrators of your domain use to send . These settings are used, for example, when forwarding reports or alarms via . 28

37 SNMP Figure 1.18 Domain Preferences Window, SMTP Server Tab SMTP Host Name: Enter the host name or IP address of your SMTP server. SMTP Port: Enter the port number on which to contact the SMTP server. By default, the port number is 25. Timeout: Enter the amount of time (in seconds) that the App Net Manager will wait for a response from the SMTP server before declaring the server unresponsive. By default, the timeout is 15 seconds. SMTP server requires a secure connection (SSL): Select this option if your SMTP server requires a secure connection via SSL to send . SMTP server requires authentication: Select this option if you must login to the SMTP server in order to send from it. Subnet Mask: The Subnet Mask tab allows you to set the default subnet mask that will appear in screens for this domain in App Net Manager when you must specify IP addresses (i.e., when configuring network interfaces on the Network tab and creating User Groups on the User Groups tab of the Location form). A valid subnet mask is between 16 and 32. Figure 1.19 Domain Preferences Window, Subnet Mask Tab 1.8 SNMP The Simple Network Management Protocol (SNMP) is a protocol used to monitor network performance and certain aspects of network devices. You can use SNMP v1, v2, or v3 to monitor your Corente Virtual Services Gateways and each of their tunnel connections. 29

38 Overview of SNMP Configuration To administer SNMP for use with Corente, you must complete the SNMP tab and the Alerts tab in the Location form of each Location gateway that you would like to monitor. You must also use two tools that are available in the SNMP category of the App Net Manager domain directory: SNMP Views and SNMP Users Overview of SNMP Configuration To determine how you will configure SNMP for use with your Corente network, review the following summary of the procedure you will need to complete: 1. Identify the SNMP MIBs and MIB objects that provide the information you need to monitor. You can view the MIBs that are available for use with Corente Virtual Services Gateways by accessing Gateway Viewer and opening the Download page. Each MIB is listed on this screen with a corresponding text file that you can download. This text file contains the definitions of all objects (i.e., SNMP variables) within that MIB. (For more information about the Download screen in Gateway Viewer, refer to Section 2.19, Download. 2. After identifying the MIBs and/or MIB objects that provide the information you need, you must then create logical groups of these MIBs and MIB objects on the SNMP Views interface (see Section 1.8.2, SNMP Views. 3. Identify the Corente Virtual Services Gateways you will be monitoring (if using SNMP v1 or v2) or the users who will be monitoring the Corente network (if using SNMP v3). If using SNMP v1 or v2, assemble these Locations into logical groups and give each group a name. Administer an SNMP Community for each group (this requires configuration on the machine that will be performing the polls/receiving the traps). If using SNMP v3, administer user accounts on the SNMP Users interface (see Section 1.8.3, SNMP Users. 4. Identify the IP addresses of the machines that will be performing the SNMP queries/receiving the SNMP traps (i.e., the SNMP Managers). Create User Groups on the User Group tab of the Location form for these machines. For SNMP Managers that are receiving traps, they must each be placed in their own User Group. 5. You must make sure that the User Groups containing the SNMP Managers can access this Corente Virtual Services Gateway. This may require the configuration of special tubes to this Location. To allow local computers on the Location gateway s LAN the ability to monitor this Location gateway, modify the LAN to Location tube on the Partners tab of the Location form or with the Tubes Wizard. To allow remote computers behind a Location partner the ability to monitor this Location gateway, you can create a specific tube from a remote User Group to the local Location LAN Address. Any Firewall Policy that is configured between an SNMP Manager's User Group and this Location gateway must allow the SNMP Firewall Service over the connection. For more information about configuring tubes, refer to the chapter entitled Define and Provision Security, Connectivity and QoS of the Corente Services Policy Definition and Provisioning manual. 6. Combine the information compiled in the previous steps and decide which views must be used to access which SNMP Communities (if using SNMP v1 or v2) and/or which SNMP Users require the use of which views (if using SNMP v3). Also, decide which SNMP Managers and their respective User Groups need access to which communities (v1/v2) or which users will be using each SNMP Manager and its respective User Group (v3). 3

39 SNMP Views Complete the configuration of SNMP by providing this information on each SNMP tab of the Location form for each Location gateway that will be monitored. 7. Finally, if you are using SNMP traps, you must enable the alerts you would like traps sent for on the Alerts tab of the Location form for each Location SNMP Views The SNMP Views feature allows you to define groups of MIBs and MIB objects that can later be allowed or denied on each Corente Virtual Services Gateway (on the SNMP tab of the Location form ) or SNMP User, to limit how SNMP Managers can query or monitor the Location gateway. To access the SNMP Views feature, open the Global Intranet Settings category of the domain directory, then open the SNMP subcategory, and then select SNMP Views. When you select SNMP Views, all SNMP Views that have been configured in this domain will be displayed in a table to the right of the domain directory. This table displays: SNMP View: the SNMP View name SNMP MIB Subtrees: the SNMP MIB subtree(s) that are included in the view In Use Locations: whether or not the SNMP View is currently in use by a Location In Use SNMP Users: whether or not the SNMP View account is currently assigned to a SNMP User account You can edit or delete any existing SNMP View. To add a new SNMP View, make sure SNMP Views is selected in the domain directory and: 1. Select the New button in the tool bar. 2. From the File menu, select Add SNMP View. 3. Right-click SNMP Views in the domain directory and select Add SNMP View. You will be taken to a blank Add SNMP View window. Figure 1.2 Add SNMP View 4. SNMP View Name: Enter a name for your new view in this field. You may use up to 3 alphanumeric characters. Hyphens and underscores are allowed, but do not use tabs, spaces, or punctuation marks when creating this name. 31

40 SNMP Users SNMP MIB Subtrees You can Edit or Delete any existing entries in the table. To add a new entry, click the Add button to display the Add SNMP MIB Subtree window. Figure 1.21 Add SNMP MIB Subtree Fill out the following fields: Include SNMP MIB Subtree/Exclude SNMP MIB Subtree: Select one of these options to include or exclude a MIB (or MIB object) in this view. SNMP MIB Subtree: Type the name of the MIB (and MIB obect, if applicable) in this field that you are including or excluding in the view. If you are specifying a MIB object, use this format: MIB name::mib object name. When you have completed these fields, click the OK button to store your changes or the Cancel button to close the window without storing your changes. Each SNMP View can contain multiple entries. When you have completed the definition of your new view, click the OK button to store your changes or the Cancel button to close the window without storing your changes. You must save your changes with the Save button in the App Net Manager tool bar in order for them to take effect SNMP Users SNMP v3 requires the use of user accounts to query entities. The SNMP Users feature allows you to add user accounts to your Corente network that can be used to obtain information from a Corente Virtual Services Gateway. To access the SNMP Users feature, open the Global Intranet Settings category of the domain directory, then open the SNMP subcategory, and then select SNMP Users. When you select SNMP Users, all SNMP User accounts that have been configured in this domain will be displayed in a table to the right of the domain directory. This table displays: SNMP User: the SNMP User account name Authorization Type: the Authorization Type that the account uses SNMP Views: the number of SNMP Views that have been assigned to them In Use by Traps: whether or not the SNMP User account is currently in use by a Location You can edit or delete any existing user. To add a new user, make sure SNMP Users is selected in the domain directory and: 32

41 Location Form - SNMP Tab 1. Select the New button in the tool bar. 2. From the File menu, select Add SNMP User. 3. Right-click SNMP Users in the domain directory and select Add SNMP User. You will be taken to a blank Add SNMP User window. Figure 1.22 Add SNMP User 4. Fill out this window as follows: SNMP User Name: Enter the username for this user. You may use up to 3 alphanumeric characters. Hyphens and underscores are allowed, but do not use tabs, spaces, or punctuation marks when creating this name. Authorization Type: Choose the type of authentication for SNMP users that is being used on your LAN. You can choose either MD5 or SHA. Authorization Pass Phrase: Enter the pass phrase for this user. Confirm Pass Phrase: Re-enter the pass phrase to confirm it and avoid mistakes. Selected SNMP Views: All views that you have created with the SNMP Views feature will be listed. Select the checkbox beside the view that you would like to assign to this user. Select as many views as you would like to assign. Select All will select all views in this list while Clear All will clear all of your current choices. 5. When you click the OK button and then save your changes with the Save button in the App Net Manager tool bar, the new user will be added to the SNMP Users list in the domain directory Location Form - SNMP Tab To use SNMP to query a Corente Virtual Services Gateway, you must access that Location s Location form (see Section 1.2, Edit Location. On each form, you must complete the SNMP tab. This tab allows you to configure how SNMP will be used to retrieve information about this Corente Virtual Services Gateway and its tunnel connections. 33

42 Location Form - SNMP Tab Figure 1.23 Location Form, SNMP Tab To configure SNMP for this Location, fill out this tab as described in the following sections Enable SNMP Enable SNMP at this Location: When this option is selected, the Location gateway will become an SNMP-agent and will respond to SNMP 'get' requests to its LAN IP address. It can also be configured to generate SNMP traps that provide alerts about certain alarms and events on the Location gateway Contact Information When SNMP is enabled, click the Contact Information button to fill out contact information for this Location. 34

43 Location Form - SNMP Tab Figure 1.24 SNMP Contact Information You can choose to populate the fields with existing data from the Location tab for this Location or from the Contact Information screen for this domain by selecting the corresponding option and selecting the Populate button. Otherwise, you can fill out the fields manually: Contact: Enter the name of the contact for this Location. Street: Enter the street address of the contact. City: Enter the city where the contact is located. State/Province: Enter the state/province where the contact is located, if applicable. Postal Code: Enter the postal code of the contact, if applicable. Country: Enter the country where the contact is located. Phone: Enter the phone number of the contact. Enter the address of the contact. Click OK to store your changes when you are finished. The tables on the SNMP tab list all of the Community Polls, Community Traps, and User Traps that you have configured for this Location Community Polls SNMPv1 and SNMPv2 use Community Polls to monitor servers. These polls can also be used to poll this Location gateway. This section lists all of the community polls that have been configured for this Location gateway. You can Edit or Delete any existing polls. To add a new community poll, select Add. 35

44 Location Form - SNMP Tab Figure 1.25 SNMP Add Community Poll Fill out the screen as follows: User Group (Source Subnet): Select a User Group that will be allowed to poll this Location gateway with SNMP v1 or v2 "get" requests to its LAN IP address. You may have to configure special tubes to this Location gateway containing this User Group. SNMP Community: If SNMP communities are in use in your implementation of SNMP, enter the community name for this Location in this field. An SNMP Community name functions like a password, because all queries to this Location must use this community name. SNMP View: Select a view from this list that specifies what MIBs and MIB objects can be retrieved by the User Group (Source Subnet). When you have completed these fields, click the OK button. This poll definition will be added to the Community Polls list Community Traps SNMPv1 and SNMPv2 can also use Community Traps to monitor servers. This Location can be configured to send community traps to the SNMP Manager. This section lists all of the community traps that have been configured for this Location. You can Edit or Delete any existing traps. To add a new community trap, select Add. Figure 1.26 SNMP Add Community Trap Fill out the screen as follows: User Group (Trap Listener): Select a User Group that will be allowed to listen to this Location to receive SNMPv1/v2 traps. This User Group must contain only one host. You may have to configure special tubes to this Location gateway containing this User Group. Port: Enter the port number on the User Group (Trap Listener) to which the Location will send the SNMPv1/v2 traps. 36

45 Location Form - SNMP Tab SNMP Community: If SNMP communities are in use in your implementation of SNMP, enter the community name for this Location gateway in this field. An SNMP Community name functions like a password for SNMP, because all queries to this Location gateway must use this community name. SNMP Version: Choose the SNMP version for this trap. You can choose v1 or v2c. Acknowledge Trap: Select whether or not the User Group (Trap Listener) will acknowledge receipt of a trap by sending a response packet to the Location gateway. If Acknowledge is selected and the Location gateway does not receive a response from the User Group (Trap Listener) after a trap is sent, the Location gateway will wait 3 seconds and send the trap again. The Location gateway will try three (3) times to send a trap. This option is available only when v2c is selected. When you have completed these fields, click the OK button. This trap definition will be added to the Community Traps list User Traps SNMPv3 uses User Traps to monitor servers. This Location gateway can be configured to send user traps to the SNMP Manager. This section lists all of the user traps that have been configured for this Location gateway. You can Edit or Delete any existing traps. Note that unlike SNMP v1 and v2, SNMP v3 is a user-based system. If you would like to poll Location gateways for information, all that is required to poll any Location gateway on your application network is a username and password that has been administered on the SNMP Users interface that has appropriate SNMP Views administered. However, if you would like to receive traps with SNMP v3, you must complete the fields and options on this screen. To add a new user trap, select Add. Figure 1.27 SNMP Add User Trap Fill out the screen as follows: User Group (Trap Listener): Select a User Group that will be allowed to listen to this Location gateway to receive SNMPv3 traps. This User Group must contain only one host. You may have to configure special tubes to this Location containing this User Group. Port: Enter the port number on the User Group (Trap Listener) to which the Location gateway will send the SNMPv3 traps. Engine ID: Enter the engine ID of the Trap Listener to help further encrypt the trap. An engine ID is a unique identifier that confirms the identity of both entities when a SNMPv3 trap is sent and received. 37

46 Location Form - Alerts Tab SNMP User: Select the user account that will receive these traps. Security Model: Select the security model that will be used to deliver the traps. Auth No Priv will require authentication of the user, but will not encrypt the traps sent to the SNMP Manager. Auth with Priv will both authenticate the user and encrypt the traps. Acknowledge Trap: Select whether or not the User Group (Trap Listener) will acknowledge receipt of a trap by sending a response packet to the Location gateway. If yes is selected and the Location gateway does not receive a response from the User Group (Trap Listener) after a trap is sent, the Location gateway will wait 3 seconds and send the trap again. The Location gateway will try three (3) times to send a trap. When you have completed these fields, click the OK button. This definition will be added to the User Traps list Location Form - Alerts Tab After enabling SNMP traps for a Location, you should access the Location's Alerts tab to enable SNMP traps for the conditions about which you would like to be notified. Figure 1.28 Location Form, Alerts Tab 38

47 Location Form - Alerts Tab You can enable SNMP traps to be sent for the conditions described in the following sections Tunnel Alarms This section contains the following options: Notify on configuration alerts: When the SNMP box for this condition is selected, the service will send an SNMP trap if a User Group of this Location has a configuration problem. The following configuration problems would cause this alert: This Location's User Group(s) contain nested subnets (within themselves or within a Location partner's User Group(s)) and the Allow Locations to be configured with nested subnets option is unchecked on the Network tab. The User Group(s) of this Location overlap with the User Group(s) of one of its partners and no NAT options have been selected by this Location and/or its partners. The User Group(s) of this Location overlap with the User Group(s) of one of its partners and the wrong NAT options have been set on this Location and/or its partners. If this Location is configured as a DNS Updater, this Location is unable to update the DNS servers it has been configured to update. Your Location and its tunnel connections will remain disabled until the configuration problem has been resolved. Notify on loss of connection to SCP: When the SNMP box for this condition is selected, the service will send an SNMP trap if this Location becomes disconnected from the Corente SCP. The trap will be sent according to the threshold that you have chosen with the Duration of connection loss before receiving notification pull-down menu. Notify on loss of connection to Partners: When the SNMP box for this condition is selected, the service will send an SNMP trap if this Location becomes disconnected from any of its Location partners. The trap will be sent according to the threshold that you have chosen with the Duration of connection loss before receiving notification pull-down menu. Duration of connection loss before receiving notification: This option allows you to set the length of time before an SNMP trap notification is triggered, ranging from immediate notification to notification only after 8 hours of downtime. You may also choose to never be notified. The benefit of immediate notification is that you can respond to any problems as soon as they occur; however, a longer delay prevents unnecessary notifications. For example, your ISP may have an interruption of service for 5 minutes and then re-establish your Internet connection. If you have chosen to be notified immediately, you would receive a trap even though Internet connection is re-established quickly. If you have chosen to be notified in 1 hour, by which time the Location gateway has reconnected to the Corente SCP and its partners, you would avoid this trap System Alarms This section contains the following options: Notify on Software Upgrade: You cannot choose to be notified of this alarm by an SNMP trap. Notify on Failover: When the SNMP box is selected for this condition, the service will send an SNMP trap if a hardware switch (when using Redundant Hardware) or traffic failover has occurred for this Location gateway. 39

48 Create an Extranet Notify on Security Alert: When the SNMP box is selected for this condition, the service will send an SNMP trap if a security alert occurs on this Location or one of its tunnels Alarm Suppression This section contains the following options: Duration: Select how long the alarm suppression should last when activated. Frequency: Select when the alarm suppression should be activated: daily or on a given day of the week, starting at the time of your choice. Alarm Categories: Select to which categories of alarms the suppression applies. When a box for a given category is checked, and the alarm suppression is active, no alarms are sent for that category: Application Monitoring, Server Monitoring and/or Tunnel Alarms. 1.9 Create an Extranet In addition to connecting the world-wide sites of your own organization, you can create connections to other organizations for easy and secure business-to-business transactions. With the Extranet Imports/ Exports feature, you can create a secure tunnel from a Location and the computers it serves in your domain to a Location and the computers it serves in the domain of another company (provided that you are both using this service). When you select Extranet Imports/Exports, all domains involved in an extranet with this domain will be displayed in a table to the right of the domain directory. Figure 1.29 Extranets For each Domain Partner, the table lists: Domain Exported To: the name of the Domain Partner 4

49 Before You Begin Import Status: the Domain Partner's Import status. Possible statuses are: Imported (currently involved in an extranet with one or more of your Locations) Available for Import (the domain gave permission to your domain for an extranet) Unavailable for Import (your domain is exporting Locations to the domain, but the domain has not agreed to an extranet connection) Locations Exported: the number of Locations that you have exported to the Domain Partner When you open the Extranet Imports/Exports category in the domain directory, a list of all domains involved in an extranet with this domain will be displayed with their Import Status in parentheses. When you select a domain, information about the Domain Partner will be displayed in a table to the right of the domain directory. This table displays: Export to Domain: the name of the Domain Partner Domain is Imported: whether or not you have selected to import Locations of the Domain Partner Exported Location: the Locations that have been exported to the Domain Partner User Groups: the number of User Groups of each Location that have been exported Applications: the number of Applications of each Location that have been exported When you open the branch for a Domain Partner in the domain directory, a list of all the Locations you have exported to that Domain Partner will be displayed. When you open a branch for a Location, a list of all the User Groups or applications from that Location that have been exported to the Domain Partner will be displayed Before You Begin The Extranet creation process is a joint procedure. It requires administration by both: an administrator of your company s Corente network an administrator of your Extranet Partner's Corente network Plan ahead of time which Locations will participate in your Extranet. Only the User Groups/Applications that you export will be able to access the imported User Groups/Applications of your Extranet Partner. Both parties must choose to export the User Groups/Applications that will allow you to connect the appropriate parts of your companies. Important Remember that tunnels are always two-way connections. To be granted access to your Extranet Partner's Location, you must allow them to access your own Location as well. When you create an extranet with another company, you can limit that company's access to specific User Groups or applications within your domain. Furthermore, only the User Groups/Applications that you export will be able to access the imported User Groups/Applications of your partner. This means that it is necessary to plan which User Groups/Applications will participate in your Extranet. Make sure both of you choose to export the User Groups/Applications that will allow you to connect the appropriate parts of your companies. 41

50 Add an Extranet Finally, remember that Extranet creation is a cooperative process. It requires steps that must be completed in your Corente network as well as steps that must be completed in the Corente network of the other company. Some steps must be completed by both sides of the connection before either of you can move ahead to the next step Add an Extranet To begin creating an extranet with another domain, you must first choose what Locations and User Groups/Applications that you would like to export to the Domain Partner. Make sure Extranet Imports/ Exports is selected in the domain directory and: 1. Select the New button in the tool bar. 2. From the File menu, select Add Export. 3. Right-click Extranet Imports/Exports in the domain directory and select Add Export. You will be taken to a blank Export to Domain window. Figure 1.3 Export to Domain 4. Fill out this window as follows: Export to Domain: Enter the domain name of the company with which you would like to create an extranet. Make certain that this domain name is typed exactly how the customer entered it during the registration process. For security purposes, the service will not validate the name you supply in this field. Exported Locations: This list displays all of the Locations that you are exporting to the domain that you entered in the Export to Domain field. You can Edit or Delete existing entries in this list. 5. To add a new entry, select the Add button. The Export Location window will be displayed. 42

51 Add an Extranet Figure 1.31 Export Location On the screen that is displayed, select a Location from the pull-down menu labeled Exported Location. The User Groups/Applications configured for that Location will appear in the Select User Groups/ Applications to Export list. Select as many of these User Groups and/or applications as you would like to export. If you choose a User Group, the machines in this User Group will be visible to the other company's Location. If you choose an application, this application will be available for use by users at the other company's Location. You can use the Select All button to select all of the User Groups/Applications in the list or the Clear All button to clear your choices. When you are finished, click the OK button to store your changes. You can export as many Locations to your Domain Partner as you would like. 6. When you are finished choosing Locations and User Groups/application to export to your new Domain Partner, select the OK button to store your changes. You must now save your changes with the Save button in the App Net Manager tool bar in order to continue connecting with your new Domain Partner. 7. The administrator of your new Domain Partner must fill out the same Add Export form to continue creating an extranet. Once the other administrator has entered your exact domain name and selected the Locations and User Groups/Applications that they will expose in the extranet, you should Refresh your domain in the domain directory. An entry for the new Domain Partner will now be displayed in the Extranet Imports/Exports table with a status of Available for Import. 8. You must now import the domain of the Domain Partner to continue. To do this, make sure the Extranet Imports/Exports branch is open in your domain directory. Right-click the name of your new Domain Partner. In the menu that is displayed, select Import Domain. 43

52 Connecting Locations in an Extranet Figure 1.32 Importing a Domain By completing this step, you are granting permission to your Domain Partner to access your exported User Groups and applications, and accepting the access that they have granted to you. The administrator of the other domain must also select this option for your domain to establish the extranet. 9. Click OK to store your changes. Once both you and the other administrator save your changes with the Save button in the App Net Manager tool bar, the extranet will be established. However, no connections between Locations have been established yet. You must continue to form the extranet by partnering together the appropriate Locations, as described in the next section Connecting Locations in an Extranet After you and your Domain Partner have Imported each other into your respective domains, icons will pop up along the left side of your map that represent the newly imported Locations from your Domain Partner ( ). This may take a few seconds to occur. You will not be able to alter the position of these icons on the map. You will not be able to administer or view the personalities of these Locations, and your Domain Partner will not be able to administer or view the personalities of your Locations. In order to establish a tunnel between one of your Locations and a Location of your Domain Partner, you must partner the Locations together. To do this, choose one of these options: Launch the Partner Locations wizard. Edit your Location and use the Partners tab to establish a connection. when you Add a new partner and select the Extranet option, you will now see the names of the imported Locations in the adjacent menu. The partnering process includes choosing configuration options to control the behavior of the partnership (in particular, the Connection Sharing and Auto Resolve NAT options are particularly useful for extranets). The process also includes creating tubes. Once you have completed partnering together the Locations, save your changes with the Save button in the App Net Manager tool bar. Note It will appear that you can partner together any of your Locations with the imported Locations. However, only the Locations that you exported will be able to create a 44

53 Modify an Export tunnel to these imported Locations. Furthermore, only the User Groups/Applications you have exported can be shared in a tube with the User Groups/Applications that have been imported from the Domain Partner. Just like creating tunnels between Locations within your own domain, the other administrator must partner their Location with your exported Location. Make sure that the tubes between each other's User Groups and/or applications match. If you have enabled Auto Resolve NAT for an extranet partner, the partner must also enable Auto Resolve NAT for your Location in order to automatically resolve IP address conflicts on both sides of the tunnel. When both of you have completed these steps, a line will appear to represent a tunnel between your Locations on the map. Connections between the computers behind your Location and the computers behind the other customer's Location will work exactly as if the imported Location was a part of your own domain. For more information about establishing Location to Location partnerships, refer to the Corente Services Policy Definition and Provisioning manual Modify an Export To modify an existing export, you have several options. You can select the Domain Partner and: double-click it in the domain directory select the Edit option from the Tool Bar from the Edit menu, select the Edit option right-click the item and select Edit This will display the Export form for your Domain Partner, which you configured when you first added the Domain Partner. After making your changes to this form, click OK to submit your changes and close the window. Cancel will discard any changes that you have made and close the window. If you want to export a new Location to an existing Domain Partner, you can simply right-click the Domain Partner's name in your domain directory. In the menu that appears, select Export Location. On the screen that is displayed, select a new Location to export to this partner from the Exported Location pull-down menu. Then select User Groups/Applications from this Location to share with the Domain Partner. After making your changes to this form, click OK to submit your changes and close the window. Cancel will discard any changes that you have made and close the window. If you want to modify what User Groups/Applications of an exported Location that you are sharing with an existing Domain Partner, you can open the Domain Partner's branch in your domain directory. Select one of the Locations listed under that partner and use the Edit feature. On the screen that is displayed, you can select or unselect User Groups/Applications to export from this Location to your Domain Partner. After making your changes to this form, click OK to submit your changes and close the window. Cancel will discard any changes that you have made and close the window. You can quickly modify the User Groups/Applications that you are exporting to a Domain Partner on Note Remember that, no matter how you make your changes, you must save your changes in order for them to take effect Delete an Export 45

54 Reports When you no longer need an extranet with your Domain Partner, you have two options: To temporarily suspend an extranet, choose one of these methods: Right-click the name of your Domain Partner in the domain directory. On the menu that appears, select the Revoke Domain Import option. Figure 1.33 Revoking a Domain Import Select the Domain Partner in your domain directory and use the Edit feature. On the Export screen that is displayed, deselect the option labeled Import this Domain. Select OK at the bottom of the screen to store your changes. Save your changes. This method takes down every tunnel between your Locations and the imported Locations of this Domain Partner, but does not delete their profile from your Extranet Exports/Imports list. To re-establish an extranet with a suspended partner, simply right-click the name of the Domain Partner and select the Import Domain option. To re-establish Extranet connections, both you and your Domain Partner must make sure the appropriate extranet Locations are mutually enabled as partners. To delete a Domain Partner, select the export and choose one of these methods: Select the Delete option from the Tool Bar. From the Edit menu, select the Delete option. Right-click the item and select Delete. You must save your changes in order for them to take effect. The Export entry for the Domain Partner will be removed from your domain. This method takes down every tunnel between your Locations and the imported Locations of this Domain Partner. You will have to go through the entire extranet creation process with the other company if you wish to re-establish an extranet partnership. 1.1 Reports App Net Manager provides graphical and statistical reports for each Corente network. The Reports feature provides graphs that allow you to monitor the performance of your domain and logs that allow you to monitor various activities. Reports do not refresh automatically in App Net Manager; to view the most 46

55 Sending Reports via recent data in a report, you must right-click the report in the domain directory and select Refresh/Clear Changes. Depending on the level of permissions that your administration account has been granted, you may or may not have access to the Reports feature in App Net Manager Sending Reports via App Net Manager allows you to forward reports via to the address(es) that you specify. Graphs will be sent as image files and logs will be displayed in the in a table format. Alarms will be sent in the same format as they are sent when ed for notification. To a report or alarm, right-click the report or alarm in the domain tree and select Figure Reports This will display the Select Recipients screen. 47

56 Graphs Figure 1.35 Selecting Recipients for Reports Fill out the screen as follows: Check Recipients: Use this section to select the recipients of the report or alarm. This section will display the default address(es) that you have saved in the Domain Preferences window for your domain. Select either the checkbox beside All (to send the report to all addresses within this list) or beside as many individual addresses as you would like. To add a new address to this list, enter the fully-formed address in the Address field above and select Add. SMTP Server and Port: Enter the host name or IP address of the SMTP server that you use to send in the SMTP Server field. Enter the port number used to contact this server in the Port field. If you have entered a default SMTP server and port number in the Domain Preferences window for your domain, that information will appear in these fields by default. Sender s Enter your address in this field. Requires Authentication: Select this checkbox if your SMTP server requires you to log in to send . When this checkbox is selected, fill in the following fields: Sender's User Name: Enter the username required to log in to the SMTP server for your address. Sender's Password: Enter the password required to log in to the SMTP server for your address. Click Send to send the report. Note You can store settings for your SMTP mail server in the App Net Manager Domain Preferences window. For more information, refer to Section 1.7, Manage Your Corente Account and Domain Graphs 48

57 Graphs The Graphs category of Reports contains graphs per Location that detail certain statistics over time. When you open the Graphs category, a list of all Locations in your domain that have contacted the Corente SCP at least once will be displayed. When you select a Location, all of the available graphs for that Location will be displayed in the table on the right side of the interface. This table displays: Report Type: the type of graph Location: the Location whose graphs you are viewing Partner: the associated partner for this graph, if applicable Application/Server:the associated application or server for this graph, if applicable Last Update: the last time the graph was updated with new data (to update the graph, right-click Graphs or the specific graph in the domain directory and select Refresh/Clear Changes) Time Loaded: the last time the graph was refreshed in App Net Manager You can select one of these graphs from the table to open it, or open a Location in the domain directory and select a graph from the subcategories listed inside. You can open a graph in a new window by rightclicking the report in the domain directory and selecting Open in New Window from the menu that appears. You can also save the report to file by right-clicking the report and selecting Save to File and saving the graph with a.txt extension (when saved to file, the report will contain the data points for the past 24 hours and is formatted with comma separated fields). All graphs are displayed on the right side of the interface and can be displayed in four different time measurements: the last day, the last week, the last month, and the last year. To select between these time measurements, use the tabs at the top of each graph. In addition, each graph can be controlled by options available by right-clicking the graph (including Zoom options, which allow you to view the graph in smaller time measurements than one day). The legend for the graph is always displayed at the bottom of the interface. 49

58 Graphs Figure 1.36 Reports: Graphs When you open a Location in the domain directory, the graph reports are organized according to the following categories (note that certain categories will be displayed only if the reports are applicable): Bandwidth Partners Applications Servers Explanations of the graphs in these categories are as follows: Bandwidth: This report displays two graphs: the inbound bandwidth and the outbound bandwidth through the Location, over time. These graphs allow you to monitor bandwidth usage for each of your Locations. Both graphs display the maximum and the average bandwidth for each direction of traffic. Partners: When you open the Partners subcategory, all of the partners of this Location (that have contacted the Corente SCP at least once) are displayed. When you select a partner, the table on the right side of the interface will list only those reports that are available for this Location and the partner. You can also open the partner in the domain directory to show a list of available reports between the partners. Select a report on the table or in the domain directory to display the report on the right side of the interface. In addition to partners of this Location within your domain, these reports are available for partners of this Location that were imported into your domain with the Extranet feature (see Section 1.9, Create an Extranet. 5

59 Graphs Bandwidth: The Bandwidth report for partners allows you to monitor bandwidth usage, over time, between this Location and its partner. This report displays one graph: the outbound bandwidth to the partner from this Location, over time. The graph displays both the maximum and the average bandwidth for the outbound direction of traffic. Latency: The Latency reports allow you to monitor the amount of latency of traffic over time as the traffic travels between this Location and its partner. If you have configured QoS priority levels for any traffic that travels between these Locations, the data will be split into measurements for each priority level that you have used (high, medium, and/or low). Select one of the following types of Latency reports from the tabs at the top of the graph: The Minimum Latency report allows you to monitor the minimum amount of latency of traffic, over time, as the traffic travels between this Location and its partner. The Maximum Latency report allows you to monitor the maximum amount of latency of traffic, over time, as the traffic travels between this Location and its partner. The Average Latency report allows you to monitor the average latency of traffic, over time, as the traffic travels between this Location and its partner. Jitter: The Jitter reports allow you to monitor the amount of jitter of traffic over time as the traffic travels between this Location and its partner. (Jitter is the difference between when a packet is expected to arrive and when it actually arrives.) If you have configured QoS priority levels for any traffic that travels between these Locations, the data will be split into measurements for each priority level that you have used (high, medium, and/or low). The Minimum Jitter report allows you to monitor the minimum amount of jitter of traffic, over time, as the traffic travels between this Location and its partner. The Maximum Jitter report allows you to monitor the maximum amount of jitter of traffic, over time, as the traffic travels between this Location and its partner. The Average Jitter report allows you to monitor the average jitter of traffic, over time, as the traffic travels between this Location and its partner. Loss: The Loss reports allow you to view graphs of the percentage of packets lost in traffic as the traffic travels between this Location and its partner. If you have configured QoS priority levels for any traffic that travels between these Locations, the data will be split into measurements for each priority level that you have used (high, medium, and/or low). The Maximum Loss report allows you to monitor the maximum amount of packet loss, over time, as the traffic travels between this Location and its partner. The Average Loss report allows you to monitor the average amount of packet loss, over time, as the traffic travels between this Location and its partner. Applications: When you open the Applications subcategory, all of the applications that have been registered on this Location are displayed. When you select an application in the domain directory, the table on the right side of the interface will display only those reports that have been generated for that application. You can also open one of these applications in the domain directory to view the available reports. Select one of these reports from the table or the domain directory to display it on the right side of the interface: Bandwidth: This report displays two graphs: the inbound bandwidth and the outbound bandwidth through the application, over time. These graphs allow you to monitor bandwidth usage for this 51

60 Graphs application. Both graphs display the maximum and the average bandwidth usage for each direction of traffic. If you have enabled test(s) for the application that return results within an elapsed time, report(s) will be available for the test(s). Application test reports will display maximum, minimum, and average latency measurements. The Network Quality and Roundtrip Latency tests will display average loss measurements in addition to the latency measurements. The File Share test will not generate reports since this test does not measure latency. Open the Partners subcategory to display all of the partners that have been granted access this application in a tube definition. In addition to partners of the application's Location within your domain, these reports are available for partners of this application's Location that were imported into your domain with the Extranet feature. When you open a partner, categories are displayed that allow you to view partner-specific graphs for each of these categories: Bandwidth: These graphs monitor maximum and average bandwidth usage, over time, for an application per set of Location partners. These graphs detail all traffic flowing between the Location and the partner for the application (both inbound traffic going to the application from the partner and outbound traffic leaving from the application to the partner). Note The use of "local" in a partner name denotes that the Location's local LAN has been configured to use the application in a tube definition. Servers: When you open the Servers subcategory, all of the servers that have been registered on this Location (as either an application server or a monitored server) are displayed. When you select a server in the domain directory, the table on the right side of the interface will display only those reports that have been generated for that server. You can also open one of these servers in the domain directory to view the available reports. Select one of these reports from the table or the domain directory to display it on the right side of the interface: Resource: The Resource reports provide graphs that detail, over time, percent utilization of the resources of the selected server, both average and maximum measurements. Select the tabs along top of graph to show usage graphs for each of the following resources: CPU Usage, Disk Usage, Memory Usage, and Swap Usage. Depending on what has been configured for each server, some of these graphs may not be available. (These reports can be enabled when you register a server on the Monitored Servers tab of the Location form.) Bandwidth: This graph allows you to monitor bandwidth usage, over time, for an application server. These graphs detail the maximum and average bandwidth flowing through the Location server for that server (both inbound traffic going to the LAN and outbound traffic leaving from the LAN). (This report is enabled when you register an application, specify a server for this application, and select Monitoring Enabled on the Applications tab of the Location form.) Open the Partners subcategory to display all of the partners that have been granted access this application server in a tube definition. In addition to partners of the application server's Location within your domain, these reports are available for partners of this application server's Location that were imported into your domain with the Extranet feature. When you open a partner, report categories are displayed that allow you to view partner-specific graphs for each of these reports: Bandwidth: These graphs allow you to monitor average and maximum bandwidth usage, over time, for an application server per set of Location partners. You can view graphs that detail all traffic flowing between those partners for the application server (both inbound traffic going to the server from the partner and oubound traffic leaving from the server to the partner). Note that the use of 52

61 Logs "local" in a partner name denotes that the Location's local LAN has been configured to use one or more application(s) on the server in a tube definition Graph Menu When you right-click a graph, a menu is displayed that provides certain controls over how the graph is displayed in App Net Manager. Properties: Select this option to display a tabbed dialog box that allows you to control how the appearance of the graphs. Copy: Select this option to copy the current graph for pasting into another application. Save as: Select this option to save a capture of the current graph as a png file on your system. Print: Select this option to print a capture of the current graph. Zoom In: Highlight this option to zoom in on either the horizontal axes, the vertical axes, or both axes at once. This option allows you to view more detail in the graph. Zoom Out: Highlight this option to zoom out on either the horizontal axes, the vertical axes, or both axes at once. This option allows you to view a more summarized graph. Auto Range: Highlight this option to return to the default zoom on either the horizontal axes, the vertical axes, or both axes at once Logs The Logs category of Reports contains monthly activity logs for the following categories of activity: Administration Logs Application Server Status Logs Application Status Logs Client Logs Hardware Failover Logs Host Status Logs Traffic Failover Logs Select or open a category in the domain directory to view the available monthly logs for that category. Logs for up to twelve months may be available. To view a log, select the month in either the domain directory or on the table on the right side of the interface. The log will be displayed as a table on the right side of the interface. 53

62 Logs Figure 1.37 Reports: Logs You can also save a log to file by right-clicking the report, selecting Save to File, and saving the log with a.txt extension (when saved to file, the report will be formatted with comma separated fields) Administration Logs The Administration Logs allow you to view monthly summaries of the activity of administrators in your domain. Each monthly log displays: Date/Time: the date/time when the action occurred Administrator: the user account who performed the Action Action: the action that was taken by the Administrator Category: the category of Object that was changed Object: the specific item in the domain that was changed (there may be two objects if the change occurred between them) Source: where the action originated from, if applicable User Host Name (IP): the location from where App Net Manager was accessed To sort the log by any of these headings, simply click on a heading. The types of users who may be listed on these logs are Super User (the administrator username that you created during registration), SCP Operator (if your application network was modified by your Corente SCP operator), External (an administrator from another application network to whom you granted application network access permissions), and End User (if a user downloads the Corente Client Software). In addition, 54

63 Logs if you have created additional administrator accounts for App Net Manager, each activity by these accounts will be listed by username Application Server Status Logs The Application Server Status Logs allow you to view monthly logs of the status of each application server that is registered to a Location within your domain. Each monthly log displays: Date/Time: the date/time when the status of the server changed Location: the Location on which the application server was registered, using the Applications tab of the Location form Monitored Server: the host name that you entered for the server of an application on the Applications tab IP Address: the IP address that you entered for the server of an application on the Applications tab Status: the status of the server. The possible statuses are: Table 1.4 Application Server Status Status Description Up The server is currently active and can be used. Down The server is currently unavailable. Unknown This status may denote any of the following states: the application(s) on the server are down, the server is down, and/or there is no connectivity to the application(s) or server. Warning If a server provides multiple applications that use different protocols, this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or one or more application(s) on the server have exceeded their warning threshold, as defined on the Applications tab, and are generating a warning alarm. Critical One or more application(s) on the server have exceeded their critical threshold, as defined on the Applications tab, and are generating a critical alarm. N/A Test(s) used to determine the status of application(s) on this server have not been configured on the Applications tab. Therefore, the status cannot be identified. To sort the log by any of these headings, simply click on a heading Application Status Logs The Application Status Logs allow you to view monthly logs of status changes of the applications registered in your domain. Each monthly log displays: Date/Time: the date/time when the status of the application changed Location: the Location on which the application was registered, using the Applications tab of the Location form Application: the name that you entered for the application on the Applications tab Type: whether this is an application used inside the application network (application) or outside the application network (service) 55

64 Logs IP Address: the IP address that you entered for the application's server on the Applications tab Service: the protocol associated with the application that changed status Port: the port number associated use by the Service Display Name: the test that detected a change in status for the application Status: the status of the application. The possible statuses are: Table 1.5 Application Status Status Description Up The application is currently active and can be used. Down The application is currently unavailable. Unknown This status may denote any of the following states: the application is down, the server is down, and/or there is no connectivity to the application or server. Warning If an application uses multiple protocols (for example, an application would use both the POP protocol and the SMTP protocol), this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or the application has exceeded its warning threshold, as defined on the Applications tab, and is generating a warning alarm. Critical The application has exceeded its critical threshold, as defined on the Applications tab, and is generating a critical alarm. N/A A test used to determine the status of the application has not been configured on the Applications tab. Therefore, the status cannot be identified. To sort the log by any of these headings, simply click on a heading Client Logs The Client log allows you to view logs of the activity by each Corente Client that has connected to a Location in your domain. Each monthly log displays: Date/Time: the date/time when the Status of the Client changed Client: the Client account Partner: the Location partner to whom the Client is/was connected Status: the status of the connection (the possible statuses are Up, Down, and Alert) To sort the log by any of these headings, simply click on a heading Hardware Failover Logs The Hardware Failover log allows you to view the date and times at which a hardware failover occurred for any of the Locations in your domain that have Redundant Hardware Configuration enabled (on the Location tab of the Location form for more about this feature, refer to the Corente Services Policy Definition and Provisioning manual ). Each monthly log displays: Date/Time: the date/time when the hardware failover occurred (that caused the Active and Standby Location servers to rotate their statuses) 56

65 Logs Location: the Location whose hardware failed over Scheduled: whether or not the failover was a scheduled switch (either during a software upgrade or during the Weekly Maintenance window, if this option has been selected on the Location tab for the Location) (yes) or if the failover occurred because of a failure of the Active Location (no). Status: whether the Location is connected to the Corente SCP (Up) or not (Down) To sort the log by any of these headings, simply click on a heading Host Status Logs The Host Status log allows you to view monthly logs of status changes for each monitored server that is registered in your application network. Each monthly log displays: Date/Time: the date/time when the status of the server changed Location: the Location on which the monitored server was registered, using the Monitored Servers tab of the Location form Monitored Server: the name that you entered for the monitored server on the Monitored Servers tab Type: this field will always list host IP Address: the IP address of the monitored server that you entered on the Monitored Servers tab Service: the resource being monitored whose status changed (CPU Usage, Disk Usage, Memory Usage, or Swap Usage) Status: the status of the server. The possible statuses are: Table 1.6 Host Status Status Description Up The server is currently active and can be used. Down The server is currently unavailable. Unknown This status may denote any of the following states: the server is down and/or there is no connectivity to the server. Warning If multiple resources are being monitored on the server, this status indicates that the test(s) for some of the resource(s) are failing while others are succeeding or this status indicates that the Service has exceeded its warning threshold, as defined on the Monitored Servers tab, and is generating a warning alarm. Critical This status indicates that the Service being monitored on the server has exceeded its critical threshold, as defined on the Monitored Servers tab, and is generating a critical alarm. N/A A test used to determine the status of the server's resource(s) has not been configured on the Monitored Servers tab. Therefore, the status cannot be identified. To sort the log by any of these headings, simply click on a heading Traffic Failover Logs The Traffic Failover log allows you to view a history of User Group failovers that have occurred in your application network. (More information about traffic failover can be found in the section about the High 57

66 Custom Availability tab of the Location form in the Corente Services Policy Definition and Provisioning manual.) Each monthly log displays: Date/Time: the date/time when the traffic failover occurred Location: the Primary Location involved in the failover Partner: the partner of the Primary Location that had to fail over or fail back to the Backup Location Failover Location: the Backup Location involved in the failover Description: whether the event was a take over or a fail back To sort the log by any of these headings, simply click on a heading Custom In addition to the Graphs and Logs categories of Reports, an additional Custom category of reports may be available for your domain. These reports have been enabled for you specifically by your Corente SCP operator. The following custom reports may be available: All Clients in Domain All Location Routes in Domain All Location to Location Tubes in Domain All Location User Groups in Domain All Locations in Domain Client Partnership Detail Location SSL Information You can save a custom report to file by right-clicking the report, selecting Save to File, and saving the report with a.txt extension (when saved to file, the report will be formatted with comma separated fields). You may also choose to a custom report to an address of your choice All Clients in Domain This report displays all of the Corente Client and Corente SSL Client accounts that have been created in the domain. This report lists: Client: The name of the Corente Client or SSL Client. The icon beside the client name indicates what type of client it is. Version: If this is a Corente Client, the version of the software that the Corente Client is running. If this is an SSL Client, this field will display SSL Client. Created: When this client account was first created. First Contact: If this is a Corente Client, the first time that the Corente Client contacted the Corente SCP. If this is an SSL Client, this field will display Not Set. Last Contact: If this is a Corente Client, the most recent time that the Corente Client contacted the Corente SCP. If this is an SSL Client, this field will display Not Set All Location Routes in Domain 58

67 Custom Routes are used to allow multiple subnets in a local network to participate in the Corente application network. This report displays all routes that have been configured between local subnets and Location gateways within the Domain. This report lists: Location: The Location on which a given route was created. The icon beside the Location name indicates the current status of this Location. Primary and Secondary WAN Address: The IP address and subnet mask of the Location's primary and (if present) secondary WAN interface. Primary and Secondary WAN Gateway: The IP address of the gateway associated respectively with the primary and (if present) secondary WAN interface. Primary and Secondary DNS: IP address of the primary and secondary DNS server. A primary and secondary DNS server may be configured for both the primary and secondary WAN interface of a Location. LAN Address: The IP address and subnet mask of the Location s LAN interface. Route: The IP range and subnet mask of the subnet for which a given route was configured. Route Gateway: The IP address of the gateway that provides external network connectivity from within a given subnet. For more information on routes, refer to the section entitled Routes in the Corente Services Policy Definition and Provisioning manual All Location to Location Tubes in Domain This report displays all of the Location to Location tubes that have been created in the domain. This includes tubes created between Locations in the domain, and tubes created between Locations in the domain and Locations imported from other domains through extranets (however, with extranet partnerships, only the tubes that were created on the local side will be displayed in this report). For more information about tubes, refer to the Corente Services Policy Definition and Provisioning manual. This report lists: Location: The Location on which this tube was created. The icon beside the Location name indicates the current status of this Location. Partner: The partner of the Location to which this tube was created. The icon beside the partner name indicates the current status of this partner, as well as whetherit is a local or imported Location. User Group/Application: The name of the User Group or application of the Location that is involved in this tube (i.e., the Local User Group/Application). Partner User Group/Application: The name of the User Group or application of the Partner that is involved in this tube (i.e., the Remote User Group/Application). Firewall Policy: If a Firewall Policy was assigned between the Location's User Group/Application and the Partner's User Group/Application, this Firewall Policy will be displayed in this field. Application: Whether or not the User Group/Application entry for this tube is an application. Partner Application: Whether or not the Partner User Group/Application entry for this tube is an application. Outbound QoS: If a Quality of Service (QoS) entry was assigned to outbound traffic in this tube, this field will display the entry that was assigned. 59

68 Custom Inbound QoS: If a QoS entry was assigned to inbound traffic in this tube, this field will display the entry that was assigned All Location User Groups in Domain This report displays all of the User Groups and applications that have been created/registered on Locations in the domain. This report displays: Location: The Location on which this User Group was created/application was registered. The icon beside the Location name indicates the current status of this Location. User Group/Application: The name of the User Group or application. Config: The configuration of the Location (Peer or Inline). Application: Whether or not the User Group/Application entry is an application. Type: If this entry is a User Group, the type of User Group that was created (i.e., whether the group defined a range of addresses Included in the User Group, or if the group defined a range of addresses Excluded from the Default User Group to create this User Group). If this entry is an application, this field will display App. Start Address: If this entry is a User Group, this field will display the first address of the address range in the User Group. End Address: If this entry is a User Group, this field will display the last address of the address range in the User Group. Outbound NAT: The Outbound NAT option assigned to this User Group/Application. Possible entries are Permitted, Prohibited, or Specified. If this entry is an application, this field will always display Permitted. Firewall Policy: If a Firewall Policy was assigned to this User Group/Application, this Firewall Policy will be displayed in this field. Outbound QoS: If a Quality of Service (QoS) entry was assigned to outbound traffic for this User Group/ Application, this field will display the entry that was assigned. Inbound QoS: If a QoS entry was assigned to inbound traffic for this User Group/Application, this field will display the entry that was assigned All Locations in Domain This report displays all of the Locations that have been created in the domain. This report lists: Location: The name of the Location. The icon beside the Location name indicates the current status of this Location. Version: The version of the Location software that it is running. State: The current state of the software. See Table 1.7 for details. Target Version: The target software version that has been set for the Location by the Corente SCP Operator. Maintenance Time: The date and time that was selected for the Preferred Maintenance Time of this Location. Clone Version: The version of the Location software on the other partition of the Location server's hard disk. 6

69 Custom Clone State: The current state of the software on the other partition of the Location server's hard disk. See Table 1.7 for details. Status: The current status of this Location. Possible statuses include Download, Downloaded, Active,Inactive, Alert, and Denied. Config: The configuration of this Location (i.e., Inline or Peer). Created: The date the Location was created in App Net Manager. Last Contact: The most recent time when the Location contacted the Corente SCP. The possible States and Clone States are as follows: Table 1.7 Software State and Clone State State Description INITIAL This is the first time Location software has run on this machine. UNKNOWN The state of this software is unknown and should not be switched to. This is typically the result of a failed upgrade. STAGING The partition is in the process of staging an upgrade to a new version of the software and should not be switched to. STAGED A new version of the software has finished STAGING and is ready to be ARMED. ARMED The partition is set as ready to run on the next reboot. BOOTING UP A new release is running for the first time, but has not yet created a tunnel to the Corente Services Control Point (SCP). If failure occurs in this state, the active software will automatically switch to what is stored on the / clone partition (which should contain the last working release). WORKS The release works (or has worked at least once - enough to create a secure tunnel to the Corente SCP). FAILED If a new release fails to contact the Corente SCP after a specified amount of time, the release is marked FAILED and an automatic return to the /clone partition (which should contain the last working release) is initiated Client Partnership Detail This report provides detailed information about the partnerships between Clients and Locations within your domain. This report lists: Client: The name of Corente Client or SSL Client that has a partnership with one of the Locations within the Domain. The icon beside the client name indicates what type of client it is. Type: The type of client RAS or SSL. Client Group: The client group of which the client is a member. Location: The Location with which the client has established a partnership. User Group/Application: The user group or application in which the client participates Location SSL Information This report displays the Corente SSL Client configuration of all Locations in the domain. This report lists: 61

70 Alarms and Events Location: The name of the Location. The icon beside the Location name indicates the current status of this Location. Port: The port number on the Location server that remote computers use to access the SSL Client. The default port is 443 for the SSL Client. If the port number is not 443, SSL Client users must connect directly to that port number. (For example, if the Visible DNS Name of Location is sslclient.example.com and the SSL Port is 999, to use the SSL Client for this Location, users would type This port number must also be opened in any firewalls shielding this Location. Visible DNS Name: The DNS name that SSL Client users use to connect to this Location from the WAN. Users enter and this name in the location bar of their web browser. (If this DNS name is not resolvable via a public DNS server, this name should be added to the DNS server at each remote user's location or added as an entry to the hosts file of each user's computer.) SSL Enabled: Whether or not access to the SSL Client is enabled on this Location Alarms and Events Alarms and events allow you to monitor the health of your application network. Certain alarms and events trigger notifications that are delivered to you via SMNP traps and/or s to specified addresses (depending on how you have configured the Alerts tab of a Location's Location form). The Alarms and Events feature allows you to keep track of these alerts directly in App Net Manager. Figure 1.38 Alarms and Events An alarm is generated when a problem that affects service is detected by the system. With every alarm, there is an associated clearing notification that is generated when the problem has been resolved. Alarms indicating a current problem are listed in the Active Alarms category; when an alarm has cleared, it is listed in the Cleared Alarms category. 62

71 Active Alarms An event is generated when something has happened within the system that generally does not affect service but still requires attention. A clearing notification is not generated for an event. Events are listed in the Events category. For ease of viewing, you can sort the alerts in each category of this feature by four (4) different methods. When you right-click Alarms and Events in the domain directory and highlight Sort Alarms/Events, you can select from the following options: By Day: Sort alerts by date. This option will be selected by default. By Class: Sort alerts by the class of alert. By Code: Sort alerts by alert code. By Source: Sort alerts by the source of the alert (i.e., a Location or Client). When you select Alarms and Events in the domain directory, the number of Active Alarms, Cleared Alarms, and Events that are currently stored for this domain in App Net Manager will be displayed in the table on the right side of the interface. Depending on the level of permissions that your administration account has been granted, you may or may not have access to the Alarms and Events feature. Like reports, you can forward any alarm or event that is displayed on this interface to the address(es) that you specify. Simply right-click the alarm or event, select , and fill out the screen that is displayed. For more information, refer to Section 1.1.1, Sending Reports via . If a Q appears on the icon for an alarm or event, this indicates that the alarm was Queued to be displayed on the App Net Manager interface. This means that the issue that caused the alert occurred while the affected Location was not connected to the Corente SCP. As soon as the Location was able to contact the Corente SCP, the alert was generated and displayed on the interface, and the notification (if applicable) was sent. The date and time of the alert reflect the date and time when the Location was able to contact the Corente SCP Active Alarms When you select Active Alarms, all of the current alarms are listed in a table on the right side of the interface. This table displays: Time Set: the date and time when the problem was detected and the alarm was first generated Reference #: the unique reference number assigned to the alarm for identification purposes Class: the category of alarm that was generated Code: the code number corresponding to the type of alarm that was generated Source: the Location or Client generating this alarm You can click each of these headings to sort the alarms in the table by that heading. When you open the Active Alarms branch in the domain directory, your active alarms will be sorted in the domain directory according to the Sort option that you have selected. Alarms will be listed in the Active Alarms category until they have been cleared View Active Alarm To view detailed information about an active alarm that is listed on this interface: Double-click the alarm in the table on the right side of the interface. 63

72 Active Alarms Double-click the alarm in the domain directory. Right-click an alarm in the domain directory and select Edit. Select an alarm in the domain directory and select Edit from the tool bar or the Edit menu. Figure 1.39 Details of an Active Alarm A window will be displayed that further explains this particular alarm: Ref Number: The unique reference number assigned to this alarm for identification purposes. Class: The category of alarm that was generated. State: The entry in this field will be Active, to denote that this is a currently active alarm. Source: The Location or Client that is generating this alarm. Set Time: The date and time when this alarm was first generated. Clear Time: Not applicable. Sent: If this checkbox is selected, the addresses where the alarm was sent will be displayed in the adjacent list. Suppressed: If this checkbox is selected, the addresses for which Alarm Suppression was active at the time of the alarm will be displayed in the adjacent list. Alarm Text: The text in this box describes the problem that caused the alarm. If Sent is checked, this is the text that was sent in the notification to the listed addresses. If a note in red text appears at the top of this window, it indicates that the issue that caused the alarm occurred when the affected Location was unable to contact the Corente SCP. As soon as the Location was able to contact the Corente SCP, the alert was generated and displayed on the interface, and the notification (if applicable) was sent. The date and time of the alert reflect the date and time when the Location was able to contact the Corente SCP. 64

73 Cleared Alarms Cleared Alarms When you select Cleared Alarms, all of the cleared alarms are listed in a table on the right side of the interface. This table displays: Time Set: the date and time when the problem was detected and the alarm was first generated Reference #: the unique reference number assigned to the alarm for identification purposes Class: the category of alarm that was generated Code: the code number corresponding to the type of alarm that was generated Source: the Location or Client that generated this alarm Time Cleared: the date and time when the problem was resolved and the alarm was cleared You can click each of these headings to sort the alarms in the table by that heading. When you open the Cleared Alarms branch, your cleared alarms will be sorted in the domain directory according to the Sort option that you have selected. Cleared alarms will be stored and displayed in the Cleared Alarms category for one month after the date the alarm was cleared View Cleared Alarm To view detailed information about a Cleared Alarm that is listed on this interface: Double-click the alarm in the table on the right side of the interface. Double-click the alarm in the domain directory. Right-click an alarm in the domain directory and select Edit. Select an alarm in the domain directory and select Edit from the tool bar or the Edit menu. Figure 1.4 Details of a Cleared Alarm 65

74 Events A window will be displayed that further explains this particular alarm: Ref Number: The unique reference number assigned to this alarm for identification purposes. Class: The category of alarm that was generated. State: The entry in this field will be Clear, to denote that this is a cleared alarm. Source: The Location or Client that generated this alarm. Set Time: The date and time when this alarm was first generated. Clear Time: The date and time when this alarm was cleared. Sent: If this checkbox is selected, the addresses where the alarm cleared notification was sent will be displayed in the adjacent list. Suppressed: If this checkbox is selected, the addresses for which Alarm Suppression was active at the time of the alarm will be displayed in the adjacent list. Alarm Text: The text in this box describes what caused the alarm. If Sent is checked, this is the text that was sent in the notification to the listed addresses. Resolution Text: The text in this box describes what happened to clear the alarm. If Sent is checked, this is the text that was sent in the notification to the listed addresses. If a note in red text appears at the top of this window, it indicates that the issue that caused the alarm occurred when the affected Location was unable to contact the Corente SCP. As soon as the Location was able to contact the Corente SCP, the alert was generated and displayed on the interface, and the notification (if applicable) was sent. The date and time of the alert reflect the date and time when the Location was able to contact the Corente SCP Events When you select Events, all of the event notifications are listed in a table on the right side of the interface. This table displays: Time Set: the date and time when the event was detected Reference #: the unique reference number assigned to the event for identification purposes Class: the category of event that was generated Code: the code number corresponding to the type of event that was generated Source: the Location or Client that generated this event Count: how many times the event has occurred Last Occurred: the date and time of the last occurrence You can click each of these headings to sort the events in the table by that heading. When you open the Events branch, your events will be sorted in the domain directory according to the Sort option that you have selected. Events will be stored and displayed in the Events category for one week after they have been generated View Event To view detailed information about an Event that is listed on this interface: 66

75 Events Double-click the event in the table on the right side of the interface. Double-click the event in the domain directory. Right-click an event in the domain directory and select Edit. Select an event in the domain directory and select Edit from the tool bar or the Edit menu. Figure 1.41 Details of an Event A window will be displayed that further explains this particular event: Ref Number: The unique reference number assigned to this event for identification purposes. Class: The category of event that was generated. State: The entry in this field will be Event, to denote that this is an event. Count: How many times the event has occurred. Source: The Location or Client that generated this event. Set Time: The date and time when this event was generated. Clear Time: Not applicable. Last Occurred: The date and time of the last occurrence. Sent: If this checkbox is selected, the addresses where the event notification was sent will be displayed in the adjacent list. Suppressed: If this checkbox is selected, the addresses for which Alarm Suppression was active at the time of the alarm will be displayed in the adjacent list. Event Text: The text in the event that caused an event notification to be generated. If Sent is checked, this is the text that was sent in the notification to the listed addresses. 67

76 Viewing Alarms on the Map If a note in red text appears at the top of this window, it indicates that the event that caused the alert occurred when the affected Location was unable to contact the Corente SCP. As soon as the Location was able to contact the Corente SCP, the alert was generated and displayed on the interface, and the notification (if applicable) was sent. The date and time of the alert reflect the date and time when the Location was able to contact the Corente SCP Viewing Alarms on the Map Alarms are not loaded or refreshed automatically in App Net Manager. To view alarms on your map when you log into App Net Manager: 1. Right-click anywhere on the map but a Location icon. 2. Highlight Alarms. 3. Select Load Alarms. Alarms data will be loaded onto your map so that you can see what Locations are generating alerts. Locations that are generating alerts will display a yellow alarm image on their icons ( ). If you have already loaded alarms, are monitoring the status of an alarm in the domain, and would like to view the most up-to-date alarm data on the interface: 1. Right-click anywhere on the map but a Location icon. 2. Highlight Alarms. 3. Select Refresh Alarms. The most up-to-date alarms data will be displayed on your map and in the domain directory Deleting a Tunnel From time to time, you may need to delete a tunnel connection between two Location partners when that connection is no longer needed. There are two methods for deleting a tunnel just as there are two methods for creating them. You can delete a tunnel using either the Location form or drag and drop Deleting a Tunnel with the Location Form Follow these steps to delete a tunnel connection. 1. Edit a Location. On the Location form that appears, click Partners from the tabs displayed across the top of the form. 2. Select a Location partner in this list and click the Delete button. 3. Click OK at the bottom of the form. The tunnel will be disabled. You do not have to perform this procedure on the former Location partner, even though this Location will remain selected on the former partner's Partners tab Deleting a Tunnel with Drag and Drop Follow these steps to delete a tunnel connection. 1. Hold down the Shift key. 68

77 Deleting a Tunnel with Drag and Drop Figure 1.42 Deleting a Tunnel: Shift-Click a Location 2. Click a Location icon and hold the mouse button. A double white circle will appear around the icon to mark it as the first Location partner you have selected, as shown below. 3. Drag your cursor across the window. A white line will follow the cursor. This line represents the tunnel that you will delete. Figure 1.43 Deleting a Tunnel: Drag the Cursor 4. Drag the cursor to the icon of the Location that is already a partner of the first Location. The double white circle around the first Location will become a double red circle, a red circle appears around the second Location, and a red line joins the two icons, as shown below. This indicates that a deletion is possible. Figure 1.44 Deleting a Tunnel: Select the Partner Location 5. Release the cursor over the icon to delete the tunnel. Upon successful completion, the tunnel line will disappear from between the icons. This may take a few seconds to occur. 69

78 7

79 Chapter 2 Corente Virtual Services Gateway Administration with Gateway Viewer Table of Contents 2.1 Before You Access the Gateway Viewer User Groups Clients and Servers Peer Configuration Proxy Servers Multiple Subnets Logging Into Gateway Viewer Main Screen for Administrators Monitoring User Interface Administrator Interface Application Status on Network Detailed Information on Application Statistics History on Application Detailed Information on Server Statistics History on Server Active Connections to Application Statistics History on Application (Client Statistics) Active Connections to Server Statistics History on Server (Client Statistics) Detailed Status on Application/Service Detailed Status on Server Status History on Server Update Comment Top Talkers Set Options Local Network Remote Networks Browsing Computers on Each Remote Network Network Administration NAT Information Monitor Computers Add Computers Remove Computers Mobile User Report Gateway Admin Upgrade Notification Status Corente Gateway Information Connection Status Show Detail Test Control Partner List Refresh Remote Login Backup and Restore

80 Accessing the Gateway Viewer 2.19 Download Corente Gateway Download Log Files Download SNMP Extension Agent Corente Gateway MIB files Version SSL Administration This chapter describes the Gateway Viewer application. This browser-based application allows users to access both local and remote computers on the Corente network and allows an administrator to manage the local Corente Virtual Services Gateway. Accessing the Gateway Viewer To access this application, type the IP address of your local Corente Virtual Services Gateway into the address bar of your web browser. Remote Gateway Viewer Access If permission has been enabled on a remote Corente Virtual Services Gateway's Location form, you can connect to a remote Location that is a partner of your local Location gateway by typing its IP address in your web browser. You will only be able to access the Local Network page and the administration controls for this remote Location. To configure access of the Gateway Viewer for a remote user, in App Net Manager: 1. Access the Location form of your Location gateway. 2. On the Partners tab of this form, Edit the remote user s Location gateway. 3. Create a tube to the remote user s Location gateway between the local Location LAN Address and the remote User Group that contains the remote user's IP address. The Firewall Policy for this tube should allow only the gateway_viewer Firewall Service inbound. 4. Create a tube on the other Location s Location form to this Location using the local User Group that contains the user s IP address and this Location's Location LAN Address. A Firewall Policy should be selected that allows only the gateway _viewer Firewall Service outbound. Requirements This application requires: The current version of Internet Explorer, Firefox, Chrome or Safari A connection to the active Corente Virtual Services Gateway on your local area network (LAN) Refer to the next section (Section 2.1, Before You Access the Gateway Viewer ) for additional changes that may need to be made in order for local computers to access the Gateway Viewer. SSL Encryption Gateway Viewer uses SSL for secure access to the Corente Virtual Services Gateway. Users who access Gateway Viewer will now be redirected to a secure site on port 8 and will be asked to accept a certificate, signed by Corente. Although the certificate will not be signed by a trusted authority, the user should verify the information on the certificate and accept it to provide encryption to the Corente Virtual Services Gateway. Using Internet Explorer 7. 72

81 Before You Access the Gateway Viewer If you are using Internet Explorer 7. or later, you will be alerted that the certificate does not appear to be valid. Select Continue Anyway to access Gateway Viewer without harm to your system. 2.1 Before You Access the Gateway Viewer You may have to perform the following configurations to your local network or to certain computers on your network before users can access the Gateway Viewer application and share resources with remote Corente network computers User Groups For a local computer to participate in the Corente network, the IP address of the computer must be included in the Default User Group of your local Corente Virtual Services Gateway. Users will not be able to access remote computers when their computer is not included in the Default User Group. Similarly, if a computer is not included in the local Default User Group, it will be invisible to remote computers on the Corente network. Additionally, in tube definitions to each Location partner, different local User Groups or applications can be matched with different remote User Groups or applications. In addition, Firewall Policies can be enabled on each tube that may limit how certain machines in the User Groups can access remote machines or be accessed by remote machines (or even whether they can access or be accessed at all). These "asymmetric tunnels" will affect what remote Corente network computers each user can access (and therefore, what remote computers their Gateway Viewer application will list) and how their own computer can be accessed. To find out how to use App Net Manager to configure the User Groups, applications, and tubes of your Corente Virtual Services Gateway, refer to the section entitled User Groups, Applications, and Partners in the Corente Services Policy Definition and Provisioning manual Clients and Servers As in all networks, there are two classifications for computers that participate in a Corente network: clients and servers. Clients refer to computers that can access resources on other machines, but not share their own resources. Usually, this is the default configuration for Windows 98/Me. Servers refer to computers that not only can access resources on other machines, but also provide resources (file, print, etc.) sharing themselves. Usually, this is the default configuration for Windows NT/2/XP/Vista/7/8. Only computers that support SMB-based file/print services and non-windows computers will be visible on the Corente network. A Windows PC that is configured as a client will not be visible in the Corente network. If you would like a Windows PC to appear in the Gateway Viewer and be visible on the Corente network, you should access the Network configuration for your computer and install the File and Printer Sharing for Microsoft Networks component on the system. As long as the machine is running file/print services, it will automatically be added to the Gateway Viewer. If you want to add a machine to the Corente network but are unable to configure that computer to be automatically added to the Corente Network Neighborhood, you can add the computer using the Add Computers screen (see Section 2.1, Add Computers ) to manually add it to the Corente network. Those computers added with this option must be manually removed using the Remove Computers screen (see Section 2.11, Remove Computers ) available in the Networks menu Peer Configuration 73

82 Proxy Servers If your location is using a Corente Virtual Services Gateway in a Peer configuration, you need to make the appropriate modifications to your network routing in order for computers on your network to function properly on the Corente network. Specifically, you need to change the routing infrastructure of your network to ensure that packets from your local network to all other remote networks within the Corente network are properly routed via your local Corente Virtual Services Gateway. Refer to the Corente Services Planning manual for more detailed instructions Proxy Servers If your Corente Virtual Services Gateway is operating behind a proxy server, you must make sure that all Corente network users on your network change their web browser's settings to bypass the proxy server for local addresses and to specifically exclude the LAN IP address of the Corente Virtual Services Gateway. This must be done for every computer that will have access to the Location gateway. For instructions, refer to Appendix A, Accessing App Net Manager or Gateway Viewer from Behind a Proxy Server Multiple Subnets Windows computers that are on a different subnet than the local Corente Virtual Services Gateway can automatically appear in the Gateway Viewer if the router of that subnet can be configured to forward the UDP broadcast packets within its network to the Corente Virtual Services Gateway. Otherwise, you can add computers on different subnets than the local Location gateway to Gateway Viewer using the Add Computers screen (see Section 2.1, Add Computers ). Computers added with this screen will remain static in the Gateway Viewer; i.e., they can only be removed from the Gateway Viewer using the Remove Computers screen (see Section 2.11, Remove Computers ). 2.2 Logging Into Gateway Viewer The initial screen of the Gateway Viewer is shown below. Figure 2.1 Monitoring (User Interface) in Gateway Viewer Before logging in, by default, the only buttons available in the Gateway Viewer toolbar are Monitoring, Networks, Admin Login, and Help. The Monitoring button provides access to only the User Interface. To access the administrative features of Gateway Viewer, you must select the Admin button and then click Login. When you enter the Gateway Viewer username and password and click OK, the complete set of Gateway Viewer features will be available for use. When you have finished using the administrative features of Gateway Viewer, you should logout of the application by selecting the Logout button. Gateway Viewer is intended for use by both users and administrators of the Corente network. 74

83 Main Screen for Administrators For users, Gateway Viewer provides an interface for connecting to both local and remote computers as well as checking the status of applications that can be used locally and over the Corente network. For administrators, Gateway Viewer provides localized control over the Location gateway, a platform for monitoring network usage, and information that can aid in problem drill-down and diagnosis. To prevent users from gaining access to the administrative interface, a login is required Main Screen for Administrators The initial screen of the Gateway Viewer after Admin Login is shown below. Figure 2.2 Monitoring (Administrator Interface) in Gateway Viewer Each of the buttons across the top of the screen presents a menu of options that will take you to specific areas of the Gateway Viewer. Monitoring: The items that are available in this menu depend on what services have been enabled for your Corente network. Application allows users to monitor the availability of applications in the Corente network and administrators to monitor the status of local applications as well as usage and latency statistics. If server monitoring is also enabled, this option also allows you to monitor the status and certain usage statistics of local servers. Server allows users to monitor the status and certain usage statistics of local servers. Top Talkers allows you to monitor network activity between machines on the local network and machines at remote sites and/or the Internet, to identify what machine pairs are using up the most bandwidth (i.e., the "top talkers"). Networks: This button contains two options. Local Network allows users to connect to all computers on the local Corente network. 75

84 Main Screen for Administrators Remote Networks allows users to connect to Location partners and computers the local Corente networks of those Location partners. Network Admin: This button contains five options. These options allow you to manage the connections that this Corente Virtual Services Gateway provides. You must be logged in to view this button and access these options. NAT Info allows an administrator to view the Outbound NAT, Inbound NAT, and Auto Resolve NAT information for the IP addresses on the network. Monitor Computers allows you to select what type of computers will be updated in the list on the Local Network page. Add Computers allows an administrator to make computers visible on the local Corente network. Remove Computers allows an administrator to delete computer(s) from the local Corente network that are no longer in service. Mobile User Report allows an administrator to monitor the Mobile User connections to the Corente Virtual Services Gateway. Gateway Admin: This button contains eight options. These options allow you to manage this Corente Virtual Services Gateway. You must be logged in to view this button and access these options. Status displays information concerning this Corente Virtual Services Gateway. Test allows an administrator to perform several connectivity tests to verify the operational status of the Corente Virtual Services Gateway and its tunnels. Control allows an administrator to start/stop/restart/failover the Corente Virtual Services Gateway Software and shutdown/reboot the Corente Virtual Services Gateway server. Remote Login allows an administrator to select whether or not to allow remote login access to this Corente Virtual Services Gateway over the secure tunnel from the Corente Services Control Point (SCP). Backup Restore allows an administrator to backup and restore the Corente Virtual Services Gateway's personality information to/from a floppy disk. Download allows an administrator to download the Corente Virtual Services Gateway's log files into a single compressed file that can be sent to Customer Services for troubleshooting purposes. It can also be used to download a text file for each of the SNMP MIB files that are available on the Location gateway to review the information that each MIB can provide. Version allows you to view version information about software that is installed on your Corente Virtual Services Gateway. 76

85 Monitoring SSL Admin: This button contains three options. You can use these optionsto administer and monitor SSL access to this Location gateway via the Corente SSL Client. You must be logged in to view this button and access these options. SSL Certificate allows you to upload or define a new certificate that will be used to encrypt users' sessions with SSL. This feature is explained in the Corente Services SSL Client manual. SSL Log allows you to view the history of logins and logouts to this Corente Virtual Services Gateway via the SSL Client. This feature is explained in the Corente Services SSL Client manual. SSL User Report lists all active SSL Client sessions to this Corente Virtual Services Gateway. This feature is explained in the Corente Services SSL Client manual. Admin: This button contains one option. You can use these options to administer and monitor SSL access to this Location gateway via the Corente SSL Client. You must be logged in to view this button and access these options. Admin Login allows you to login to Gateway Viewer in order to access the administer-only options. Help: This button contains one option. Gateway Viewer Help provides online help for all areas of the Gateway Viewer. 2.3 Monitoring Depending on whether or not you have subscribed to application and/or server monitoring, the Monitoring interface allows you to view statistics and graphs about applications and servers within your Corente network. Server monitoring allows local administrators to monitor local servers. Simply register the server(s) with the local Corente Virtual Services Gateway in App Net Manager, and you can view usage statistics about each server concerning CPU, disk space, physical memory, and/or swap space. Application monitoring allows your company to deploy applications easily between sites within your Corente network. Simply register the application with the local Corente Virtual Services Gateway in App Net Manager, and you can share the application securely (like an User Group) with any other Corente location(s) within your intranet or extranet. Corente application monitoring was designed with the following principles in mind: to confirm to both users and administrators that the applications are functioning correctly; to facilitate communication between both parties when they are not; to provide reports to help with capacity planning; and to provide diagnostic capabilities to locate bad actors within the network. 77

86 User Interface Top Talkers allows you to monitornetwork activity between machines on the local network and machines at remote sites and/or the Internet, to identify what machine pairs are using up the most bandwidth (i.e., the "top talkers"). The features that are available on the Monitoring screen(s) depend on whether or not you have logged in to Gateway Viewer via the Admin Login User Interface The User Interface of Monitoring will be displayed if you have subscribed to application monitoring and if you have not logged into Gateway Viewer via the Admin Login button. This is the default page of the Gateway Viewer application. Figure 2.3 Monitoring (User Interface) in Gateway Viewer This interface allows users to view the status of each application that is available on local and remote networks, and to communicate with the specific administrator of each application via . Depending on the permissions that the user's IP address has been granted via tubes in App Net Manager, applications that appear on this page may not be accessible. If unsure, users should contact their administrators to determine what applications they have been permitted to access. The tables on this interface can be sorted via any category simply by selecting that category's heading. The category that is currently used for sorting will be displayed in bold characters. By default, the tables will be sorted alphabetically by the Application and Service categories. The information on this interface will refresh automatically every 5 minutes. You can manually refresh the interface at any time by right-clicking your mouse and selecting Refresh from the menu that appears. The Application Status Summary table displays information about applications that you can access on local or remote networks via your company's Corente network: Application: This field displays the name or type of application. Status: This field displays the current status of the application. Possible statuses include: Table 2.1 Application Status Status Description Up The application is currently active and can be used. 78

87 User Interface Status Description Down The application is currently unavailable. Unknown This status may denote any of the following states: the application is down, the server is down, and/or there is no connectivity to the application or server. Warning If an application uses multiple protocols (for example, an application would use both the POP protocol and the SMTP protocol), this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or the application has exceeded its warning threshold as defined by an administrator. Critical This status indicates that the application has exceeded its critical threshold as defined by an administrator. N/A A test used to determine the status of the application has not been configured in App Net Manager. Therefore, the status cannot be identified. Last Status Change: This field displays the date and time that the application changed to its current status. Comment: This field displays a short note written by the application's administrator. If it has been configured, an envelope icon will appear in this column that you can click to send an message to the administrator of the application. This link allows you to get in touch with the appropriate administrator for each application. The Service Availability Summary table displays information about applications or services that are available to you and other local users. Service: This field displays the name or type of the service. Status: This field displays the current status of the service. Possible statuses include: Table 2.2 Service Status Status Description Up The service is currently active and can be used. Down The service is currently unavailable. Unknown This status may denote any of the following states: the service is down, the server is down, and/or there is no connectivity to the service or server. Warning If a service uses multiple protocols (for example, an application would use both the POP protocol and the SMTP protocol), this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or the service has exceeded its warning threshold as defined by an administrator. Critical This status indicates that the service has exceeded its critical threshold as defined by an administrator. N/A A test used to determine the status of the service has not been configured in App Net Manager. Therefore, the status cannot be identified. Last Status Change: This field displays the date and time that the service changed to its current status. 79

88 Administrator Interface Comment: This field displays a short note written by the service's administrator. If it has been configured, an envelope icon will appear in this column that you can click to send an message to the administrator of the application. This link allows you to get in touch with the appropriate administrator Administrator Interface The Administrator Interface of Monitoring will be displayed if you have logged into Gateway Viewer via the Admin Login button. This interface provides network administrators with tools for analysis and problem drill down concerning the network and the applications and/or servers running on the network. It is more complex than the user interface and contains multiple screens: Application Status on Network Server Status on Network Detailed Information on Application Statistics History on Application Detailed Information on Server Statistics History on Server Active Connections to Application Statistics History on Application (Client Statistics) Active Connections to Server Statistics History on Server (Client Statistics) Detailed Status on Application/Service Detailed Status on Server Detailed Status on Server History Update Comment You can set the refresh rate for the Administrator Interface by clicking the refresh icon that is displayed at the top of each page. Enter a value in the dialog box that appears. You can enter a value between 5 seconds and 36 seconds (1 hour). This value is persistent and will be used for all Administrator Interface pages. The default refresh rate is 3 seconds (5 minutes). To manually refresh a page at any time, click the right mouse button within the frame that you would like to refresh and select the Refresh option from the menu that appears. In general, do not use the Back button on your browser to navigate through the application monitoring interface. This may cause cached information to be displayed. To ensure that you are viewing the most upto-date data, use only the hyperlinks provided on the interface to load pages Application Status on Network The Application Status on Network page provides a summary of the local applications, services, and/or servers that are registered on the local Location gateway for monitoring and/or sharing with other Corente network locations. Selecting certain items on this page will display detailed information about those items. 8

89 Application Status on Network Figure 2.4 Application Status on Network Page The tables on this interface can be sorted via any category simply by selecting that category's heading. The category that is currently used for sorting will be displayed in bold characters. The Network Statistics table provides a summary of the traffic traveling to and through the local Corente Virtual Services Gateway. If the number of bytes recorded in any category exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Bytes on LAN: The total number of bytes, measured by the Location gateway, that have been sent on the LAN since the last time the Location gateway was started (i.e., the date/time in the Network Statistics section heading). Bytes on WAN: The total number of bytes, measured by the Location gateway, that have been sent on the WAN since the last time the Location gateway was started (i.e., the date/time in the Network Statistics section heading). WAN traffic includes both Internet traffic and alternate connection traffic (i.e., non-corente-network-site-to-site traffic). Bytes on App Network: The total number of bytes, measured by the Location gateway, that have been sent on the Corente network since the last time the Location gateway was started (i.e., the date/time in the Network Statistics section heading). Bytes on LAN*: The total number of bytes, measured by the Location gateway, that have been sent on the LAN in the last 5-second interval. This 5-second interval is the 5 seconds preceding the last date and time the page was refreshed (i.e., the date and time displayed in the heading of this table). Bytes on WAN*: The total number of bytes, measured by the Location gateway, that have been sent on the WAN in the last 5-second interval. WAN traffic includes both Internet traffic and alternate connection traffic (i.e., non-corente-network-site-to-site traffic). Bytes on App Network*: The total number of bytes, measured by the Location gateway, that have been sent on the Corente network in the last 5-second interval. The Application Status Summary table displays a summary of information about each application that has been registered with the local Corente Virtual Services Gateway for use over the Corente network. Application: This field dispays the name or type of application. Click the entry in this field to display the Detailed Information on Application page about this application. 81

90 Application Status on Network Status: This field displays the last reported status of the application. Click the entry in this field to display the Detailed Status on Application page about this application's status. Possible entries in the field are: Table 2.3 Application Status Status Description Up The application is currently active and can be used. Down The application is currently unavailable. Unknown This status may denote any of the following states: the application is down, the server is down, and/or there is no connectivity to the application or server. Warning If an application uses multiple protocols (for example, an application would use both the POP protocol and the SMTP protocol), this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or the application has exceeded its warning threshold, as defined in App Net Manager, and is generating a warning alarm. Critical This status indicates that the application has exceeded its critical threshold, as defined in App Net Manager, and is generating a critical alarm. N/A A test used to determine the status of the application has not been configured in App Net Manager. Therefore, the status cannot be identified. Last Status Change: This field displays the time that the application changed to its current status. Comment: This field displays a short note about the application or its status that is displayed to users. Click the entry in this field to use the Update Comment page to add a comment, delete the current comment, or change the current comment. This comment will be displayed on both the User Interface and the Administrator Interface. The Service Availability Summary table displays a summary of information about applications and services that are only available for use by local users. These may be applications or services on the local network, on the Internet, etc., but they are not shared over the Corente network. Service: This field displays the name or type of service. Status: This field displays the last reported status of the service. Click the entry in this field to display the Detailed Status on Service page about this service's status. Possible entries in the field are: Table 2.4 Service Status Status Description Up The service is currently active and can be used. Down The service is currently unavailable. Unknown This status may denote any of the following states: the service is down, the server is down, and/or there is no connectivity to the service or server. Warning If a service uses multiple protocols (for example, an application would use both the POP protocol and the SMTP protocol), this status indicates that the test(s) for some of the protocol(s) are failing while others are succeeding or the service has exceeded its warning 82

91 Detailed Information on Application Status Description threshold, as defined in App Net Manager, and is generating a warning alarm. Critical This status indicates that the service has exceeded its critical threshold, as defined in App Net Manager, and is generating a critical alarm. N/A A test used to determine the status of the service has not been configured in App Net Manager. Therefore, the status cannot be identified. Last Status Change: This field displays the time that the service changed to its current status. Comment: This field displays a short note about this service or its status. Click the entry in this field to use the Update Comment page to add a comment, delete the current comment, or change the current comment. This comment will be displayed on both the User Interface and the Administrator Interface. The Server Status Summary table displays a summary of information about local servers that have been registered with the local Location gateway. Server: This field displays the name or type of the server. Status: This field displays the last reported status of the server. Click the entry in this field to display the Detailed Status on Server page about this server's status (see). Possible entries in the field are: Table 2.5 Server Status Status Description Up The server is currently active and can be used. Down The server is currently unavailable. Unknown This status may denote either of the following states: the server is down and/or there is no connectivity to the server. Warning If multiple resources are being monitored on the server (for example, the following resources can all be monitored: CPU Load, Disk Space Usage, Memory Usage, and Swap Space Usage), this status indicates that the test(s) for some of the resource(s) are failing while others are succeeding or this status indicates that one or more of the resources have exceeded their warning thresholds, as defined in App Net Manager, and are generating a warning alarm. Critical This status indicates that one or more of the resources being monitored on the server have exceeded their critical thresholds, as defined in App Net Manager, and are generating a critical alarm. N/A A test used to determine the status of the server has not been configured in App Net Manager. Therefore, the status cannot be identified. Last Status Change: This field displays the time that the server changed to its current status. Comment: Because server monitoring data is viewable only by administrators, the comment field is unavailable Detailed Information on Application The Detailed Information on Application page displays statistics and connection information about the application that you have selected. 83

92 Detailed Information on Application Figure 2.5 Detailed Information on Application Page The Application Statistics table displays statistics from the last 5-second interval. This 5-second interval is the 5 seconds preceding the date and time that the page was last refreshed (i.e., the date and time displayed at the bottom of the page). If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. % of Traffic on LAN: The percent of the total traffic on the LAN during the 5-second interval that consisted of traffic to and from this application. % of Traffic on WAN: The percent of the total traffic on the WAN during the 5-second interval that consisted of traffic to and from this application. WAN traffic includes both Internet traffic and alternate connection traffic (i.e., non-corente-network site-to-site traffic). % of Traffic on App Network: The percent of the total traffic on the Corente network during the 5second interval that consisted of traffic to and from this application. Bytes from Application: The total number of bytes sent from the application to machines with active connections during the 5-second interval. Bytes to Application: The total number of bytes sent to the application from machines with active connections during the 5-second interval. Bytes Total: The total number of bytes both sent and received by this application during the 5-second interval. # of Connections Added: The number of connections that were added during the 5-second interval. # of Connections Dropped: The number of connections that were dropped during the 5-second interval. The Application Statistics table displays host information, protocol, and traffic information about the selected application. If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Host Name: The name of server providing this application. Select the entry in this field to show the Detailed Information on Server page for this server. Host IP Address: The IP address of the server that is providing this application. 84

93 Detailed Information on Application Service (Port): The type of service/protocol and the corresponding port number that machines must use to make connections to this application. This field may contain multiple entries. Duration (HH:MM:SS): The amount of time between the date/time displayed in the heading of this section and the date/time displayed at the bottom of the page. The statistics within this section have all been collected during this duration. Bytes from Application: The total number of bytes sent from the application to machines with active connections since the last time the Location gateway was last started (i.e., the date/time displayed in the heading of this section). Bytes to Application: The total number of bytes sent to the application from machines with active connections since the last time the Location gateway was last started (i.e., the date/time displayed in the heading of this section). Bytes Total: The total number of bytes both sent and received by this application since the last time the Location gateway was last started (i.e., the date/time displayed in the heading of this section). # of Current Connections: The total number of current connections that are established to this application. The Connected Networks table lists all of the networks with machines that are currently connected to this application. The total number of current connected networks is displayed in the title of the section. Click the Show History hyperlink to display the Statistics History on Application page and view historical graphs of all active network connections to this application. If there are more than ten connected networks, an additional hyperlink will be displayed: click the Top Ten hyperlink to view historical graphs of only the top 1 network bandwidth users (based on the total number of bytes sent and received by the application to/from each network). If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Network: The name of the Corente Virtual Services Gateway whose network has active connections with this application. If the Location gateway is within another Corente domain and has an extranet connection with the local Location gateway, this entry will contain the Location gateway's full name (i.e., domainname.gatewayname). Select an entry in this column to view the Active Connections (by client IP address) on this network to the application. Note The icon to the right of each entry in this column indicates whether the entry is a network ( ) or a Remote Corente Client ( ). If this entry is a Corente Client, when the entry is selected, the Active Connections page will display the statistics for a single computer (i.e., the Corente Client itself). Duration (HH:MM:SS): The total duration of this network or Corente Client's connection to the application. Bytes from App: The total number of bytes sent from the application to machines on this network or to this Corente Client since the last time the Location gateway was started (i.e., the date/time displayed in the heading of the Application Statistics section). Bytes to App: The total number of bytes sent to the application from machines on this network or from this Corente Client since the last time the Location gateway was started (i.e., the date/time displayed in the heading of the Application Statistics section). Bytes Total: The total number of bytes both sent and received by the application to and from machines on this network or this Corente Client since the last time the Location gateway was started (i.e., the date/ time displayed in the heading of the Application Statistics section). 85

94 Statistics History on Application Bytes from App*: The total number of bytes sent from the application to machines on this network or to this Corente Client during the 5-second interval. Bytes to App*: The total number of bytes sent to the application from machines on this network or from this Corente Client during the 5-second interval. Bytes Total*: The total number of bytes both sent and received by the application to and from machines on this network or this Corente Client during the 5-second interval Statistics History on Application The Statistics History on Application page displays graphs of the traffic (in bytes) sent and received by the application per 5-second interval from each network that is connected to the application. The first graph details the traffic sent by the application, the second graph details the traffic received by the application, and the third graph details the total amount of traffic both sent by and received by the application. Important The data on this screen is captured as you view both this screen and the application's Detailed Information on Application screen. If you move to another screen, the graphs may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on these pages to collect the amount of historical data that you need. These graphs can provide up to 24 hours worth of information (the most recently captured data always appears on the right side of each graph). The total duration of the historical data that you have captured in the graphs is displayed in the heading of this page. As time passes, you will be able to view the graphs in shorter time increments (the last 1 minutes, the last 3 minutes, etc.) by using the links that also appear in heading of this page. The graph increment that you are currently viewing is displayed in bold white characters. If you modify the refresh rate on this page by selecting the refresh icon, you will not be able to set the refresh rate to intervals greater than every 1 minutes. If your refresh rate is already set to intervals greater than 1 minutes, it will automatically be changed to refresh every 1 minutes. Note If you select the Show History hyperlink from the Active Connections interface, you can view historical graphs of the application traffic broken down per connected client rather than per connected network Detailed Information on Server The Detailed Information on Server page displays statistics and connection information about the server that you have selected from a Detailed Information on Application page. A single server on your network can provide multiple applications via the Corente Virtual Services Gateway. 86

95 Detailed Information on Server Figure 2.6 Detailed Information on Server Page The Server Statistics table displays statistics from the last 5 second interval. This 5-second interval is the 5 seconds preceding the date and time that the page was last refreshed (i.e., the date and time displayed at the bottom of the page). If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. % of Traffic on LAN: The percent of the total traffic on the LAN during the 5-second interval that consisted of traffic to and from this server. % of Traffic on WAN: The percent of the total traffic on the WAN during the 5-second interval that consisted of traffic to and from this server. The WAN includes Internet traffic and alternate connection traffic (i.e., non-corente-network site-to-site traffic). % of Traffic on App Network: The percent of the total traffic on the Corente network during the 5second interval that consisted of traffic to and from this server. Bytes from Server: The total number of bytes sent from the server to machines with active connections during the 5-second interval. Bytes to Server: The total number of bytes sent to the server from machines with active connections during the 5-second interval. Bytes Total: The total number of bytes both sent and received by the server during the 5-second interval. # of Connections Added: The number of connections that were added to this server during the 5second interval. # of Connections Dropped: The number of connections that were dropped from this server during the 5-second interval. The Server Statistics table displays address, protocol, and traffic information about the selected server. If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Host IP Address: The IP address of this server. Duration (HH:MM:SS): The amount of time between the date/time displayed in the heading of this section (the date/time that the server established its current UP status) and the date/time displayed at 87

96 Detailed Information on Server the bottom of the page (the date/time the page was last refreshed). The statistics within this section have all been collected during this duration. # of Current Connections: The total number of connections that have been established to this server since the date/time displayed in the heading of this section. Bytes from Server: The total number of bytes sent from the server to machines with active connections since the last time the Location gateway was started (i.e., the date/time displayed in the heading of this section). Bytes to Server: The total number of bytes sent to the server from machines with active connections since the last time the Location gateway was started (i.e., the date/time displayed in the heading of this section). Bytes Total: The total number of bytes both sent and received by this server since the last time the Location gateway was started (i.e., the date/time displayed in the heading of this section). The Connected Networks table lists all of the networks with machines that are currently connected to this server. The total number of current connected networks is displayed in the title of the table. Click the Show History hyperlink to display the Statistics History on Server page and view historical graphs of all active partner connections to this server. If there are more than ten connected networks, an additional hyperlink will be displayed: click the Top Ten hyperlink to view historical graphs of only the top 1 network bandwidth users (based on the total number of bytes sent and received by the server to/from each network). If the number of bytes recorded in a category on this table exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Network: The name of the Corente Virtual Services Gateway whose network has active connections with this server. If the Location gateway is within another Corente domain and has an extranet connection with the local Location gateway, this entry will contain the Location gateway's full name (i.e., domainname.gatewayname). Select an entry in this column to view the Active Connections (by client IP address) on this network to the server. Note The icon to the right of each entry in this column indicates whether the entry is a network ( ) or a Remote Corente Client ( ). If this entry is a Corente Client, when the entry is selected, the Active Connections page will display the statistics for a single computer (i.e., the Corente Client itself). Duration (HH:MM:SS): The total duration of this network or Corente Client's connection to the server. Bytes from Srv: The total number of bytes sent from the server to machines on this network or to this Corente Client since the last time the Location gateway was started (i.e., the date/time displayed in the heading of the Server Statistics section). Bytes to Srv: The total number of bytes sent to the server from the machines on this network or from this Corente Client since the last time the Location gateway was started (i.e., the date/time displayed in the heading of the Server Statistics section). Bytes Total: The total number of bytes both sent and received the server to and from the machines on this network or Corente Client since the last time the Location gateway was started (i.e., the date/time displayed in the heading of the Server Statistics section). Bytes from Srv*: The total number of bytes sent from the server to the machines on this network or to this Corente Client during the 5-second interval. 88

97 Statistics History on Server Bytes to Srv*: The total number of bytes sent to the server from the machines on this network or from this Corente Client during the 5-second interval. Bytes Total*: The total number of bytes both sent and received by the server to and from the machines on this network or this Corente Client during the 5-second interval Statistics History on Server The Statistics History on Server page displays graphs of the traffic (in bytes) sent and received by the server per 5-second interval from each network that is connected to the server. The first graph details the traffic sent by the server, the second graph details the traffic received by the server, and the third graph details the total amount of traffic both sent by and received by the server. Important The data on this screen is captured as you view both this screen and the server's Detailed Information on Server screen. If you move to another screen, the graphs may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on these pages to collect the amount of historical data that you would like. These graphs can provide up to 24 hours worth of information (the most recently captured data always appears on the right side of each graph). The total duration of the historical data that you have captured in the graphs is displayed in the heading of this page. As time passes, you will be able to view the graphs in shorter time increments (the last 1 minutes, the last 3 minutes, etc.) by using the links that also appear in heading of this page. The graph increment that you are currently viewing is displayed in bold white characters. If you modify the refresh rate on this page by selecting the refresh icon, you will not be able to set the refresh rate to intervals greater than every 1 minutes. If your refresh rate is already set to intervals greater than 1 minutes, it will automatically be changed to refresh every 1 minutes Active Connections to Application When you select the name of a Corente Virtual Services Gateway on the Detailed Information on Application page, the Active Connections page will be displayed. This page will list all of the clients behind that Corente Virtual Services Gateway that currently have active connections to the application. The total number of connected clients behind the Location gateway is displayed at the top of the page. Figure 2.7 Active Connections to Application Page Click the Show History hyperlink to display the Statistics History on Application page and view historical graphs of all active connections to this application per client. If the number of bytes recorded in a category 89

98 Statistics History on Application (Client Statistics) on this page exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Source: The DNS name or IP address of the machine that currently has an active connection to the application. Duration: The duration of the machine's current connection to the application. Bytes from App: The total number of bytes sent from the application to this machine since you first accessed this page. Bytes to App: The total number of bytes sent to the application from this machine since you first accessed this page. Bytes Total: The total number of bytes both sent and received by the application to/from this machine since you first accessed this page. Important The data for the Bytes from App, Bytes to App, and Bytes Total fields on this screen is captured as you view this screen. If you move to another screen, the data on this screen may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on this page to collect the amount of data in these fields that you would like. Bytes from App*: The total number of bytes sent from the application to this machine during the last 5second interval. This 5-second interval is the 5 seconds preceding the date and time that the page was last refreshed (i.e., the date and time displayed at the bottom of the page). Bytes to App*: The total number of bytes sent to the application from this machine during the 5-second interval. Bytes Total*: The total number of bytes both sent and received by the server to/from this machine during the 5-second interval Statistics History on Application (Client Statistics) The Statistics History on Application (Client Statistics) page displays graphs of the traffic (in bytes) sent and received by the application per 5-second interval from each machine that is connected to the application from a specific Corente Virtual Services Gateway's LAN. The first graph details the traffic sent from the application to each client, the second graph details the traffic sent to the application from each client, and the third graph details the total amount of traffic both sent and received by the application to/ from each client. Important The data on this screen is captured as you view both this screen and the Active Connections screen. If you move to another screen, the graphs may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on these pages to collect the amount of historical data that you would like. These graphs can provide up to 24 hours worth of information (the most recently captured data always appears on the right side of each graph). The total duration of the historical data that you have captured in the graphs is displayed in the heading of this page. As time passes, you will be able to view the graphs in shorter time increments (the last 1 minutes, the last 3 minutes, etc.) by using the links that also appear in heading of this page. The graph increment that you are currently viewing is displayed in bold white characters. 9

99 Active Connections to Server If you modify the refresh rate on this page by selecting the refresh icon, you will not be able to set the refresh rate to intervals greater than every 1 minutes. If your refresh rate is already set to intervals greater than 1 minutes, it will automatically be changed to refresh every 1 minutes Active Connections to Server When you select the name of a Corente Virtual Services Gateway on the Detailed Information on Server page, the Active Connections page will be displayed. This page will list all of the clients behind that Corente Virtual Services Gateway that currently have active connections to the server. The total number of connected clients behind the Location gateway is displayed at the top of the page. Click the Show History hyperlink to display the Statistics History on Server page and view historical graphs of all active connections to this application per client. If the number of bytes recorded in a category on this page exceeds 124, the number of bytes will be rounded off and listed in K(ilobytes), M(egabytes), G(igabytes), etc. Source: The DNS name or IP address of the machine that currently has an active connection to the server. Duration: The duration of this machine's current connection to the server. Bytes from Srv: The total number of bytes sent from the server to this machine since you first accessed this page. Bytes to Srv: The total number of bytes sent to the server from this machine since you first accessed this page. Bytes Total: The total number of bytes both sent and received by the server to/from this machine since you first accessed this page. Important The data for the Bytes from Srv, Bytes to Srv, and Bytes Total fields on this screen is captured as you view this screen. If you move to another screen, the data on this screen may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on this page to collect the amount of data in these fields that you would like. Bytes from Srv*: The total number of bytes sent from the server to this machine during the last 5second interval. This 5-second interval is the 5 seconds preceding the date and time that the page was last refreshed (i.e., the date and time displayed at the bottom of the page). Bytes to Srv*: The total number of bytes sent to the server from this machine during the 5-second interval. Bytes Total*: The total number of bytes both sent and received by the server to/from this machine during the 5-second interval Statistics History on Server (Client Statistics) The Statistics History on Server (Client Statistics) page displays graphs that detail the traffic (in bytes) sent and received by the server per 5-second interval from each machine that is connected to the server from a specific Corente Virtual Services Gateway's LAN. The first graph details the traffic sent from the server to each client, the second graph details the traffic sent to the server from each client, and the third graph details the total amount of traffic both sent and received by the server to/from each client. 91

100 Detailed Status on Application/Service Important The data on this screen is captured as you view both this screen and the Active Connections screen. If you move to another screen, the graphs may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on these pages to collect the amount of historical data that you would like. These graphs can provide up to 24 hours worth of information (the most recently captured data always appears on the right side of each graph). The total duration of the historical data that you have captured in the graphs is displayed in the heading of this page. As time passes, you will be able to view the graphs in shorter time increments (the last 1 minutes, the last 3 minutes, etc.) by using the links that also appear in heading of this page. The graph increment that you are currently viewing is displayed in bold white characters. If you modify the refresh rate on this page by selecting the refresh icon, you will not be able to set the refresh rate to intervals greater than every 1 minutes. If your refresh rate is already set to intervals greater than 1 minutes, it will automatically be changed to refresh every 1 minutes Detailed Status on Application/Service The Detailed Status page displays status information about the application or service that you have selected. The status of each protocol used by the application or service is presented in a separate table on this page. Figure 2.8 Detailed Status on Application/Service Page The Application Information table displays identity information about the server being monitored. Host Name: The DNS name of the server that is providing the application/service. If you are viewing the detailed status of an application (rather than a service), the entry in this field can be selected to display the Detailed Server Information page for this server. Host IP Address: The IP address of the server that is providing the application/service. The following information is displayed for each protocol of the application/service: Service Protocol: The protocol used by machines to connect to this application/service. Each protocol employed by the application/service will have its own table on this page, with its own corresponding status information. Service Port: The port number on the server used by machines to connect to the application/service with the Service Protocol. Status: The summarized status of the Service Protocol. 92

101 Detailed Status on Server Last Status Change: The date and time that the Service Protocol changed to its current Status. Last Verification: The last date and time that the current status of the Service Protocol was verified. Verification Interval: The period of time between automatic status verifications. Verification Type: The type of test that the Location gateway will perform to verify the status of the Service Protocol. This test is chosen when registering the application/service with the Location gateway in App Net Manager. Latency: The average latency of Service Protocol packets sent to and from the application/service as determined by the verification test. Detailed Results: The detailed results of the verification test. The information provided in this field depends upon the Verification Type that has been configured for this Service Protocol. This field can be used to analyze and diagnose any problems with the application/service or its connection. The Verify Now hyperlink at the top of each table can be used to verify the status of that table's Service Protocol immediately. This hyperlink can be used instead of waiting for the next automatic verification Detailed Status on Server The Detailed Status on Server page displays usage information about resources on the server that you have selected. Figure 2.9 Detailed Status on Server Page The Server Information table displays identity information about the server being monitored. Host Name: The DNS name of the server. Host IP Address: The IP address of the server. Show History: Click this hyperlink to display the Status History on Server page for this server, which presents a historical graph of utilization for all resources that are being monitored on this page. The following information is displayed for each resource that an administrator in App Net Manager has selected to be monitored on this server: Resource Type: The resource whose status is displayed in this table. Possible resources are: CPU Load (in the last minute), Disk Space Usage, Memory Usage, and Swap Space Usage. 93

102 Status History on Server Usage Info: The percentage of this resource being used on the server. Status: The summarized status of this resource on the server. Last Status Change: The date and time that the resource on the server changed to its current Status. Last Verification: The last date and time that the current status of the resource on the server was verified. Verification Interval: The period of time between automatic status verifications. Detailed Results: Additional information about the resource. The Verify Now hyperlink at the top of each table can be used to verify the status of that resource immediately. This hyperlink can be used instead of waiting for the next automatic verification Status History on Server The Status History on Server page displays a graph that details the percent utilization of resources that are being monitored for the server on the Detailed Status on Server page. Usage of the following resources may be displayed on the graph: CPU, memory, swap space, and disk space. Usage of each resource is graphed using a different colored line. Important The data on this screen is captured as you view this screen. If you move to another screen, the graphs may be reset to allow the Location gateway's resources to be utilized more effectively. You must remain on these pages to collect the amount of historical data that you would like. The graph can provide up to 24 hours worth of information (the most recently captured data always appears on the right side of the graph). The total duration of the historical data that you have captured is displayed in the heading of this page. As time passes, you will be able to view the graph in shorter time increments (the last 3 minutes, the last hour, etc.) by using the links that also appear in the heading of this page. The graph increment that you are currently viewing is displayed in bold white characters. Figure 2.1 Status History on Server Page Update Comment 94

103 Top Talkers If you would like to provide users with information about an application or its status, you can add a comment to the users' Monitoring page by selecting the entry in that application's Comments field and entering information on this page. Figure 2.11 Update Comment Page Comment: Enter the comment in this field. You may use up to 5 characters. Valid for: Select the period of time that this comment will be displayed on the Monitoring page. Enter a value in this field and select Minutes, Hours, Days, Months, or Years. When this period of time has expired, the comment will no longer be displayed. When you have completed these fields, click the Submit button. If there is a current comment that has not yet expired for the application, that comment will be replaced by this new comment. To clear the fields and start again, click the Reset button. 2.4 Top Talkers Top Talkers allows an administrator to monitor network activity between machines on the local network and machines at remote sites and/or the Internet, to identify what machine pairs are using up the most bandwidth (i.e., the "top talkers"). This feature is useful, for example, as a way of identifying machines infected by a Trojan horse or local users abusing BitTorrent. This option is available via the Monitoring button when logged into Gateway Viewer as an administrator. Figure 2.12 Top Talkers When an administrator selects Top Talkers, the page will be opened using the default configuration settings. Top Talkers will begin after a 1 second delay, during which time it is gathering information. The Top Talkers page will then be updated automatically based on the refresh rate that you choose for the Monitoring pages. (The maximum refresh rate allowed for Top Talkers is 6 seconds. If a refresh rate longer than 6 seconds has been chosen for the Monitoring pages, the refresh rate will be temporarily changed while the Top Talkers page is open to refresh every 6 seconds. Similarly, the minimum refresh rate allowed is 1 seconds. If a refresh rate shorter than 1 seconds has been chosen, the refresh rate will be temporarily changed to 1 seconds while the Top Talkers page is open.) Each refresh presents new, non-aggregated data. 95

104 Set Options Only one administrator can monitor the Top Talkers page for a Corente Virtual Services Gateway at a time. If another administrator of the Location gateway attempts to open the Top Talkers page, an error message will be displayed to inform the administrator that someone else is already using it. The page presents the following data in a table: Local Host: the WINS name (if applicable) of the local machine in the top talker pair. Local IP: the IP address of the local machine in the top talker pair. Port: the port number being communicated with on the local machine in the top talker pair (when Display Type is By Address and Port; see Set Options). Remote IP: the IP address of the remote machine to which the Local Host is "talking". Remote Port: the port number being communicated with on the remote machine (when Display Type is By Address and Port; see Set Options). Packets/Bytes Sent: the number of packets or bytes sent by the local top talker to the remote machine (what is displayed here depends upon the Data Type chosen; see Set Options). This heading will be in bold if this Data Type is being used to calculate the top talkers. Packets/Bytes Received: the number of packets or bytes received by the local top talker from the remote machine (what is displayed here depends upon the Data Type chosen; see Set Options). This heading will be in bold if this Data Type is being used to calculate the top talkers. Packets/Bytes Total: the aggregate number of packets or bytes both sent and received by the local top talker to/from the remote machine (what is displayed here depends upon the Data Type chosen; see Set Options). This heading will be in bold if this Data Type is being used to calculate the top talkers. An administrator can click Set Options to view or change the monitor and display options. Any new selections will apply to all subsequent reports until the options are changed again or you navigate to another page. Note Only the traffic that travels through the Location gateway will be measured by Top Talkers. This means that if your Location gateway is in the Peer configuration, only secure Corente network traffic and traffic that is specifically routed through the gateway will be included in the calculations Set Options When you select Set Options, you can change how the Top Talkers page reports and displays data. Figure 2.13 Set Options for Top Talkers 96

105 Local Network You can change the options on this page as follows: Interfaces: Enter the network interfaces of the Location gateway that will be monitored for discovering top talkers. By default, the LAN-side interface(s) of the gateway will be included. AddressRanges: Enter an address pool of local IP addresses that willbe included in calculating the Top Talkers. By default, this field will be filled in with an address pool containing all of the local subnets that the Location gateway knows about, including the entire Default User Group of this Location as well as any addresses entered in the Special Internal Network Description User Group. Display Type: Choose the way in which is data is examined and displayed. By default, By Address and Port will be selected. Bandwidth use will be examined in port number to port number pairs between each pair of local and remote machines. This can be helpful for administrators, if they are trying to narrow down the specific bandwidth stealing culprits on the machine pairs (i.e., web traffic, a specific application, etc.). Selecting By Address Only will change Top Talkers monitoring so that top talkers will be determined by the total traffic between machine pairs. Data Type: Choose the way in which Top Talkers data is calculated. You can choose to calculate the top talkers in terms of Bytes Sent, Bytes Received, Bytes Total, Packets Sent, Packets Received, or Packets Total. The option that you select here will have its heading bolded on the Top Talkers interface to indicate that is how Top Talkers is being calculated. By default, Bytes Total will be selected. Report Count: Enter the number of top talkers to display. By default, the top 1 talkers will be displayed. The maximum number of top talkers that can be displayed is 5. When you select Submit to save your changes, the new options will apply to all subsequent Top Talkers refreshes (until the options are changed again). If you navigate to another page, all options you have changed will return to the default values. 2.5 Local Network Click Local Network to view the Connect to computers on local network page, which displays a current listing of both Windows and non-windows computers on your local Corente network. You do not have to log in to view this page. Figure 2.14 Computers on the Local Network Computers on your local network are listed on this page alphabetically. If a machine is configured as an SMB-based file/printer server, there will be a hyperlink available for that machine. Users can simply click the link to browse the shared resources on that server or place their cursor over the link to view the server's IP address. Windows computers that are not configured as either file or print servers will not be listed. Non-Windows computers that do not have file/print services running on the system will be listed without hyperlinks. Although a user will not be able to access these computers directly from this interface, any other protocols can be used to connect to these machines (e.g., FTP, HTTP, telnet, etc.). 97

106 Remote Networks Computers with hyperlinks will be listed before computers without hyperlinks. A machine whose name is not known (e.g., it does not register in the Domain Name System (DNS)), will be listed by its IP address only. Computers that have been disconnected from the network will be removed from the local computer list within 3-45 minutes. Click Local Network again or use the Refresh button on the browser at any time to view the most up-to-date list. If you do not manually refresh the page, the page will automatically update every 15 minutes. Note The computer that you are currently using will be highlighted in gray. 2.6 Remote Networks Click Remote Networks to browse the remote Location gateways and the computers running the Corente Client on your Corente network. You do not have to log in to view this page. Figure 2.15 List Remote Networks The Connect to computers on remote networks page displays all remote Corente Virtual Services Gateways that are currently up and running within the Corente network. Click on a Location gateway to browse computers within that remote Location gateway network. If your local Location gateway is a member of an Extranet with another company, any Location gateways imported into your Corente network from the other Corente network will be listed by their full Location gateway name (i.e., domainname.gatewayname). Note A computer needs the proper Corente Virtual Services Gateway access permissions in order to connect to Location gateways and computers on the Corente network. Only the Location gateways that is has permission to access will be listed on this page. The computer must be included in appropriate User Group and tubes of the local Corente Virtual Services Gateway in order to access the appropriate Location gateways and computers across the Corente network. Users will receive an access denied error message when they click on the Corente network Networks if they are not included in the User Group. For more information about User Groups and Tubes, refer to the sections entitled User Groups and Partners in the Corente Services Policy Definition and Provisioning manual. Remote Location gateways that have disconnected from the Corente network will be removed from this page immediately. Click Remote Networks or use the Refresh button on the browser to view the most up-to-date listing of Location 98

107 Browsing Computers on Each Remote Network gateways. If you do not manually refresh the page, the page will automatically update every 15 minutes. The Corente Virtual Services Gateway Software must be running in order to browse and connect to computers on remote networks Browsing Computers on Each Remote Network When a user clicks the hyperlink for a remote Corente Virtual Services Gateway on the Remote Networks page, a new page will be displayed in the browser that lists all machines (both Windows and non-windows) that are included in the User Group of that remote Corente Virtual Services Gateway. Figure 2.16 Computers on the Remote Network This page displays the computers on the remote Corente network that you have selected. This page is very similar to the one described in Section 2.5, Local Network ; you can refer to that section of the manual for basic browsing information. You can place your cursor over a hyperlink to view a remote computer's IP address. When you click on a link for a specific computer, your machine will be connecting to the remote machine with this IP address. This IP address may be translated (i.e., it may be different than the real IP address of the remote computer). To display both the connection IP address and the real IP address of the computers on the remote network, click on the Show All link available at the top of the computer list box. To display the connection IP address only (default), click on the Show One link. You can use the computer names that are listed on this page for all network connections, such as map network drive, FTP, HTTP, telnet, etc. You can access a remote machine by name even if you do not have any name services configured on your computer (e.g., WINS or DNS). Remote computers that have been disconnected from the Corente network will be removed from the remote computer list within 3-45 minutes. You can use the Refresh button on your browser to view the most up-to-date computer listing for a particular network. If you do not manually refresh the page, the page will automatically update every 15 minutes. Note If you receive a message that "The page cannot be displayed" after you click on the link of a remote computer, try clicking the Refresh button on your browser to update the current page. Sometimes the responses from the server will not be displayed correctly until the page is refreshed. Users will need the proper file/print sharing permissions to browse and access the resources on a remote server. This authentication is usually based on the username/password that is used to log onto the local computer. The help documentation provided with your operating system should describe how to set these permissions for remote users on your server. 99

108 Network Administration If a computer is disconnected from the network, it may still be listed on this page for 3-45 minutes. If you try to connect to the computer during this period of time, you will receive an error message. The Corente Virtual Services Gateway Software must be running in order to browse and connect to computers on remote networks. 2.7 Network Administration The options available from the Network Admin button of the Gateway Viewer allow you to manage the connections that this Corente Virtual Services Gateway provides to users. The options affect the ways in which the Local Network and Remote Networks pages are displayed. You must log in to view these pages. 2.8 NAT Information Clicking the NAT Info option will take you to the screen shown below. Figure 2.17 Corente Gateway NAT Information This page displays information about the IP addresses that the local Corente Virtual Services Gateway is using for Network Address Translation (NAT). When connecting locations for your Corente network, overlapping IP addresses will create a problem. If two networks in different locations contain IP addresses in the same address space, packets will not get routed to the appropriate computers. NAT can be used to solve this problem. This page allows an administrator to check the NAT settings for the local Location gateway and determine what addresses the Location gateway is using to NAT each local or remote subnet, according to how NAT has been enabled for this Location gateway in the App Net Manager application. The information is divided into categories for each NAT option: Outbound NAT and Auto Resolve/Inbound NAT. Outbound NAT is enabled on the local Corente Virtual Services Gateway for local subnets that are participating in the Corente network. A Corente network administrator identifies a local subnet that the Corente Virtual Services Gateway will NAT to another subnet before the subnet is made visible to remote Corente network partners. The administrator is able to specify the subnet that will be used for NATing. The User Group column lists the real IP addresses and netmasks of all local subnets that are participating in the Corente network. If Outbound NAT has been specified for a local subnet, the NAT column will display the NATed IP address of that subnet. (This is the subnet of IP addresses that Corente network partners will use to make connections to the machines.) If Outbound NAT has not been enabled for this subnet, the column will display "N/A" and Corente network partners will use the real IP addresses of the machines for Corente network connections. 1

109 Monitor Computers To facilitate data viewing, you can sort the entries in this table by User Group subnet or by NAT subnet simply by clicking on the headings at the top of each column. The entries will be sorted in order, from lowest to highest subnet. If there are any Corente Clients that connect to this Location gateway, any subnets that are being NATed by Outbound NAT will be listed twice. One entry will list the subnet as NATed, the other entry will not. This occurs because NAT does not function between Corente Client partners and their host Location gateway. Corente Clients connect to the Location gateway like local clients rather than remote partners, so they connect to servers using real IP addresses. Auto Resolve/Inbound NAT are enabled on the local Corente Virtual Services Gateway for each partner. Inbound NAT will re-map all IP addresses in the partner's User Group to a new set of addresses that have been chosen by a Corente network administrator, while Auto Resolve NAT will automatically perform NAT if a conflict is detected between the User Group of the local Location gateway and the User Group of the partner. If an IP address conflict is detected when Auto Resolve is enabled, the local Corente Gateway will NAT the partner's subnets to a new subnet (chosen by the Location gateway) so that local machines will be able to access computers in the partner's User Group. Both types of NATing will only occur locally; the NAT will be invisible to the remote computers. The Partner column lists the fully-qualified name of the partner (i.e., domainname.gatewayname) that is participating in NAT-Internal with the local Location gateway. The User Group column lists the real IP addresses and netmasks of the subnets of this Location partner. (Depending upon what is included in the Location partner's User Group, there may be multiple subnets per partner.) The NAT column will display the NATed IP addresses of these subnets. Local computers will use these translated IP addresses for Corente network connections. Auto Resolve NAT partners will not be listed unless Auto Resolve NAT is currently occurring with this partner. In order for Auto Resolve NAT to solve addressing conflicts between two partners, it must be enabled on both sides of the connection (i.e., both the local Location gateway and the Location partner must enable Auto Resolve for each other). To facilitate data viewing, you can sort the entries in this table by Partner, User Group subnet, or by NAT subnet simply by clicking on the headings at the top of each column. The entries will be sorted in order, either alphabetical (for Partner entries) or from lowest to highest subnet (for User Group or NAT entries). 2.9 Monitor Computers The Monitor Computers on the Local Corente Gateway Network page allows you to select what type of computers will be automatically listed and updated on the Local Networks page. Figure 2.18 Monitoring Computers on the Local Corente Gateway When a computer connects and disconnects from the Corente network, it is automatically removed or added to the Local Network page. It is also automatically removed or added to the Remote Networks 11

110 Add Computers page of any partners with the proper User Group permissions to access that computer. By default, all computers on the local network (both Windows and non-windows) are automatically monitored, and therefore automatically added or removed from the lists. However, you may want the Corente Gateway to monitor only Windows computers if you are concerned about extra traffic on the local network, as non-windows computers are monitored via periodic query requests from the Location gateway. Windows computers, however, are monitored via the announcements to the LAN from these computers. This does not generate any additional traffic on the local network. Monitor all computers on local network: Select this option to monitor all computers on the local network. (This option is selected by default.) Monitor only Windows computers on local network: Select this option if you do not want the nonwindows computers to be automatically monitored. Any change to the Monitor Computers option takes effect immediately. If you select Monitor only Windows computers and click the Submit button, all non-windows computers will be deleted immediately from the Local Network page and the Remote Networks pages of partners. If you later decide to select Monitor all computers again, all non-windows computers that the Location gateway can detect will be re-added to the pages immediately. Note If you have selected Monitor only Windows computers, yet users also need to access certain non-windows computers, you can manually add these nonwindows computers to the Local Network page using the Add Computers option. You can change the Monitor Computers option only when the Corente Virtual Services Gateway Software is running. 2.1 Add Computers Clicking the Add Computers option will take you to the screen shown below. Figure 2.19 Adding Computers to the Local Corente Gateway Network This page enables an administrator to add any computers on the local Corente network to the Gateway Viewer listing. However, there should be no need to use the Add Computers interface to add any machines to the local Corente network. If there is a Windows machine and you would like other users on the Corente network to view that computer, you should simply install the File and Printer Sharing for Microsoft Networks component on that system. As long as a Windows PC is running file/print services, it will be added to the local Corente network automatically. Computers that are on the same subnet as the Corente Virtual Services Gateway are automatically added to the local network (including those computers that provide file/print services as well as nonwindows computers). Windows computers that are on a different subnet than the local Corente Gateway 12

111 Remove Computers can also be automatically added if the router of that subnet can be configured to forward the UDP broadcast packets within its network to the Corente Gateway. If you are unable to re-configure a computer and/or a subnet so that the computer(s) will be automatically added to the network, you can manually add that machine with the Add Computers option. You can specify both the name and the IP address of the machine to be added. Both name and IP must be unique within the local network in order for the machine to be added successfully. A computer that is manually added with this option will be listed on the Local Networks page with a hyperlink. You can simply click the link to browse the shared resources on that server or place your cursor over the link to view the server's IP address. Additionally, it will be available to SSL users on the Corente SSL Client interface, if that service has been enabled for this Location gateway. A manually-added machine will be persistent, i.e., it will never be deleted automatically and can only be removed by using the Remove Computers option. If a machine is added manually, it will not be updated dynamically. Remember that appropriate Corente Virtual Services Gateway access permissions (i.e., User Groups) are needed so that the appropriate computers on the local Corente network will appear automatically on the Remote Networks pages of the appropriate networks within the Corente network. Note You will receive an error message if you try to add a computer when it has already been added to the network. You can add a computer to the local network only when the Corente Virtual Services Gateway Software is running Remove Computers Clicking the Remove Computers option will take you to the screen shown below. Figure 2.2 Removing Computers from the Local Corente Gateway Network The Remove Computers From the Local Corente Gateway Network page displays computers on the local Corente network and allows an administrator to remove those computers that should no longer be accessible on the Corente network. Note This option should be used to remove only local computers that have been added with the Add Computers tool (see Section 2.1, Add Computers ). All other local computers are automatically added and removed from Gateway Viewer as they are added and removed from the physical network. To prevent a computer that was not added with the Add Computers tool from being listed in a partner's Gateway Viewer, 13

112 Mobile User Report you must modify the User Group of this Location gateway in the App Net Manager application and remove the computer's IP address from the Default User Group. This interface can be used to remove computers that normally are added and removed automatically only if these computers have disconnected from the network and Gateway Viewer has not yet registered this information (as computers can take 3-45 minutes to be removed automatically from the Local Networks page). If you remove this type of computer when it is not disconnected, be aware that it will be readded to the interface. To remove a computer, simply check the computer and click the Submit button. There is no limitation on how many computers can be deleted at once. Note If a computer has been included using the Add Computers page, it will never be deleted automatically from the Local Network or Remote Networks pages, even when it disconnects from the network or is shut down. You must use this interface in order to remove such computers from the Corente network. You can remove computers from the local network only when the Corente Virtual Services Gateway Software is running. The computer that you are currently using will be highlighted in gray Mobile User Report The Mobile User Report page allows an administrator to view which Mobile Users are currently connected to the Corente Virtual Services Gateway. These pages are unavailable until the Enable Mobile Users option has been enabled for this Corente Gateway on the User Remote Access tab of the Location form in App Net Manager. For more information on using this screen, please refer to the Corente Services Mobile User manual Gateway Admin The options available from the Gateway Admin button of the Gateway Viewer allow an administrator to monitor and control the local Corente Virtual Services Gateway. You must log in to view these pages Upgrade Notification Occasionally, you may see the following notification at the top of your Gateway Admin screens: Figure 2.21 Software Upgrade Notification This indicates that your Corente Gateway has downloaded an upgrade of the Corente Virtual Services Gateway Software, but it must be rebooted in order to enable this new software. Clicking on the notification will take you to the Control screen (see Section 2.16, Control. Important When this notice appears, you should reboot your Location gateway as soon as possible to activate the software upgrade. The network behind this Location 14

113 Status gateway will be unable to access the Corente network temporarily until the Location gateway has installed the new software. This may take a few minutes. You can check the status of the upgrade installation using the Status function available on the Gateway Admin menu (see Section 2.14, Status ) Status When you click on the Status option, you will be taken to the screen shown below. Figure 2.22 Corente Gateway Identity and Connection Status The Corente Gateway Identity and Connection Status screen is separated into two sections, Corente Gateway Information and Connection Status. In addition, a Show Detail hyperlink appears at the top of the page. When clicked, this hyperlink provides additional information in the Connection Status section Corente Gateway Information Name is the name assigned to this Corente Virtual Services Gateway when it was created with App Net Manager. This name is also used as the actual computer name on the Corente Gateway. It can be prefixed with the Corente network name to form a fully-qualified Corente Virtual Services Gateway name (i.e., domainname.gatewayname). LAN Address is the IP address assigned to the Ethernet interface of the Corente Gateway. If the Location gateway is installed in a Peer configuration, there is only one Ethernet interface and it will be listed in this spot. If the Location gateway is installed in an Inline configuration, there are two Ethernet interfaces; the LAN interface which is connected to the private internal network and the WAN interface which is connected to the public (Internet facing) network. WAN Address is the IP address assigned to the WAN Ethernet interface of an Inline Corente Gateway. A Peer configuration does not have a WAN interface. When the Location gateway is installed in an Inline configuration, the LAN interface must be connected to the private internal network, and the WAN interface must be connected to the public (Internet facing) network. Secondary WAN Address is the IP address assigned to the secondary WAN (Wide Area Network) Ethernet interface of an Inline Corente Virtual Services Gateway, when the Dual WAN feature has been enabled. This secondary interface connects to the public (Internet facing) network and is currently in use only if the word ACTIVE appears next to this entry. DMZ Address is the IP address assigned to the DMZ-facing Ethernet interface of a Corente Gateway. Using this interface, the Corente Gateway acts as an intermediary between servers on the DMZ and those 15

114 Corente Gateway Information machines (both on the LAN and on the Internet/WAN) who access the servers. This arrangement prevents unwanted Internet/WAN traffic from infultrating the LAN. Virtual IP Address is the internal IP address that was assigned by Corente when this Location gateway was created. A VIP (Virtual IP) address will be assigned for both Peer and Inline Location gateway configurations. This address is used for internal routing purposes when secure tunnels are being created. You cannot use this address for any other computer in your network and you cannot communicate with the Location gateway via this address using programs such as telnet or ping. LAN DHCP, WAN DHCP, and Secondary WAN DHCP indicate the status of DHCP on the LAN, WAN, and Secondary WAN. The values in these fields will be determined by what has been chosen in the Location form for this Location gateway in App Net Manager. Possible values in these fields include: Table 2.6 DHCP Status Status Description N/A This field does not apply to this Corente Virtual Services Gateway. none This interface does not support DHCP. client This interface of the Corente Virtual Services Gateway receives its network configuration via a DHCP server. server This interface of the Corente Virtual Services Gateway is a DHCP server. Time/Uptime/Load each display the current time on the Location gateway (operating system clock), the amount of time since the Corente Gateway was last stopped, and the CPU utilization load average on the Location gateway (three averages are displayed 1 minute average, 5 minute average, and 15 minute average), respectively. Active Software indicates the version of the Corente Virtual Services Gateway Software stored on the boot partition and currently active on the Location gateway. The Location gateway stores two versions of the Location gateway software the currently active version (the version that was used at the last system boot) and the inactive version. The state of the software is indicated in the brackets. All possible states are listed in the table below. Other Software indicates the version of the Corente Virtual Services Gateway Software stored on the special non-boot partition of the Location gateway (/clone). The inactive version could be an earlier or later version relative to the currently active version. It may be the last release to work on this Location gateway in case the currently active software has failed, or it may be the most recent upgrade of the software waiting to be made active. The state of the software is indicated in brackets. All possible states are listed in the table below. The possible states for both Active Software and Other Software are as follows: Table 2.7 Software State State Description Initial This is the first time Corente Virtual Services Gateway Software has run on this machine. Unknown The state of this partition is unknown and should not be switched to. This is typically the result of a failed upgrade. Staging The partition is in the process of staging an upgrade and should not be switched to. Staged A new version of the software has finished staging and is ready to be armed. 16

115 Connection Status State Description Armed The partition is set as ready to run on the next reboot. Booting A new release is running for the first time, but has not yet created a tunnel to the Corente Services Control Point (SCP). If failure occurs in this state, the active software will automatically switch to what is stored on the / clone partition (which should contain the last working release). Works The release works (or has worked at least once - enough to create a secure tunnel to the SCP). Failed If a new release fails to contact the SCP after a specified amount of time, the release is marked failed and an automatic return to the /clone partition (which should contain the last working release) is initiated. Hardware Failover indicates whether or not hardware failover (also known as redundant hardware) has been enabled on this Location gateway. If hardware failover is enabled, a number (1 or 2) will appear next to this field to identify the Location gateway hardware that is currently active. If it is not enabled, this entry will be listed as disabled Connection Status The bottom section of the Status page presents information about the status of all secure tunnels associated with this Corente Virtual Services Gateway. There are two types of tunnel connections displayed here: The SCP Connection is a connection that every Corente Virtual Services Gateway creates with the Corente Services Control Point. This secure tunnel is used whenever you administer your Corente network with App Net Manager. Gateway to Gateway Connections are the connections between your Corente Virtual Services Gateway and each of its remote Location partners. These connections will be listed by the name of each remote Location (for example, domainname.gatewayname). The type of Transport (or protocol) that is used for each connection will be listed beside the connection name. The possible types are TCP and UDP. In addition to the Transport type, the Connection and Security state of each connection will also be listed. The meanings for each of the possible states are presented in the following tables: Table 2.8 Connection State Connection State Description Unknown The connection is in the process of being established. Established The connection is fully established. Table 2.9 Security State Security State Description Inactive The Location gateway is waiting for contact from this partner. No tunnel connection will be established until this partner replies to the Location gateway. In Progress The secure tunnel is in the process of being established. Secure The tunnel is secure. 17

116 Show Detail Security State Description Terminating The tunnel is being torn down. Configuration Alert This Location gateway and its partner are able to communicate with each other; however, the User Groups that each partner is exporting to the other contain conflicting address spaces. You must use one of the NAT options on the Location form in App Net Manager to remap one of the User Groups to a new address space or manually reconfigure one of the conflicting subnets to resolve this alert Show Detail This hyperlink is available at the top of the Connection Status box. Show Detail gives more information about the status of the Location gateway's Ethernet interfaces and each connection between the Location gateway and its partners. This information is typically used only by technical support personnel. Figure 2.23 Show Detail of Corente Gateway Interfaces and Connections The Corente Gateway Interface Details section lists eight possible Ethernet interfaces and describes the status of each interface's current links. For Peer Location gateways, eth functions the WAN/LAN interface. For Inline Location gateways, eth and eth1 function as the WAN and LAN interfaces. If an Ethernet interface is not in use, it will be listed as "Unavailable". The information displayed for Connection Status when Show Detail is clicked includes: Table 2.1 Connection Status Details Status Field Description Name/(Transport) The name of the Corente Virtual Services Gateway partner and the protocol used for the connection (either TCP or UDP). If a connection has not been established, the Transport will be listed as Unknown. IP/VIP The Visible IP address of each partner Location gateway and the Virtual IP address assigned to this partner by the Corente SCP. Latency (msec) Latency over the secure connection to this Location gateway, in msec. Conn/Security State The state of the TCP/UDP connection as well as the state of the IPSec connection. You can return to the summarized information by clicking on the hyperlink Show Summary Test 18

117 Test The Test Network Connectivity page provides a method for testing connectivity between the Application Gateway and its partners, your DNS servers, the Internet, and the Corente Services Control Point (SCP). Figure 2.24 Test Network Connectivity Network Tools: This table provides several tools that allow you to test connectivity and network performance: Test SCP Connectivity: To test connectivity from this Location gateway to the Corente SCP, click the Test SCP Connectivity button. On the page that is displayed, click Test Network to begin the test. When this test is successful, the network setup of the Location gateway (including all IP address, network mask, and default Internet gateway information, as well as the associated physical wiring) has been validated. The Location gateway's ability to communicate with the Corente SCP over a secure tunnel via the Internet has also been validated. If the test does not succeed, failure codes will be returned to help debug the problem. Packet Capture: This button allows you to perform packet traces through the Location gateway. When you click this button, the Packet Capture page will be displayed. Interface: Select the interface of the Location gateway through which the packets will be traced and then displayed to you as a log. You can select Any, to signify any available interface, or the WAN/LAN interface (if Peer), the WAN or the LAN interface (if Inline), or the DMZ interface (if there is a DMZ interface configured on this Location gateway). Host IP or Name: If you would like, you can specify the host name or IP address of entities to isolate in your packet capture and only capture packets that travel between them and the Location gateway. 19

118 Test You may enter one or more entries in this field, but you must separate the entries using either the and or the or modifier. This field is optional. Operator: Select a modifier to define how to combine the entrie(s) in the Host IP or Name field with the entrie(s) in the Service Port or Name field when performing the packet capture. Selecting "and" will capture only packets that meet the criteria in both fields, while selecting "or" will ensure that packets need only meet the criteria in one of the fields to be captured. Service Port or Name: If you would like, you can specify the service port or port name to isolate in your packet capture and only capture packets that travel to and from that port on the Location gateway. You may enter one or more entries in this field,but you must separate the entries using either the and or the or modifier. This field is optional. Duration: Enter the duration (in seconds) for which you would like the packet capture to be performed. You may enter between 1 and 12 seconds. The default is 2 seconds. After you make your selections and fill out the fields, click the Submit button to perform the packet capture. The Processing page will be displayed while the packets are being captured. You may interrupt the capture at any time by clicking the Stop and View button on this page to see what packets have been captured up until that point. When the packet capture has completed or has been interrupted, you can click the Save Capture button at the bottom of the log to save the packet capture log to your computer as a.txt file. If the Save Capture button is not displayed, you can save the log by right-clicking the page and selecting Select All from the menu that appears, then right-clicking the highlighted text and selecting Copy. Then you can Paste the text in a text editor such as Wordpad and save the file. Host Ping / Traceroute: This section allows you to ping or traceroute to any machine from the Location gateway, as long as the machine is accessible by this Location gateway. Ping: Ping is a computer network tool used to test whether a particular host is reachable across an IP network. Enter an IP address or DNS name that you would like this Location gateway to ping in the Host field and click the Ping button. Traceroute Host: Traceroute is a networking tool used to determine the route taken by packets across an IP network. The results of the test you select will be displayed on a new page in Gateway Viewer. Enter an IP address or DNS name to which you would like this Location gateway to traceroute in the Host field and click the Traceroute button. The results of the test will be displayed on a new page. Network Interface: This table lists each Ethernet interface of the Corente Virtual Services Gateway and their statuses: Name: The name of the interface. (LOOPBACK is the standard IP address used for a loopback network connection.) Status: The status of the interface. IP Address: The IP address currently assigned to the Ethernet interface. Ping: Whether or not the Location gateway can successfully ping this interface. This entry should read Echo. Default Gateway: The IP address of the default Internet gateway for this interface. Only WAN or WAN/ LAN interfaces will have a Default Gateway. Ping: Whether or not the WAN or WAN/LAN Ethernet inteface can successfully ping the Default Gateway. 11

119 Control Domain Name Server: This table lists each Domain Name Server (DNS) Server that is registered on this Corente Virtual Services Gateway: DNS: Whether the DNS server is the Primary or the Secondary server. IP Address: The IP address assigned to the DNS server. Ping: Whether or not the LAN or WAN/LAN Ethernet interface of this Location gateway was able to successfully ping this DNS server when the Test page was loaded. Test: Click the Ping button to ping the IP address of this DNS server or the Traceroute button to traceroute to the IP address of this DNS Server. The results of the test that you select will be displayed on a new page in Gateway Viewer. DNS Query: If this Location is configured as a DNS Server or DNS Updater on the DNS Server tab of the Location form, the Test page will include this table. When you click on the Query button in this table, the answers from all DNS servers that respond to the query will be displayed. This includes all of the DNS entries within the DNS zone that this Location gateway serves, and entries for the subzones of this zone (that provide the name of the subzone and either the VIP address of the Location gateway or the IP address of the third-party DNS server in charge of this subzone). Internet: This table lists the Administration Homepage(listed by web address) and the Corente SCP. Name: The name of the entity. IP Address: The IP address assigned to the entity. Ping: Whether or not the WAN or WAN/LAN Ethernet interface of this Corente Virtual Services Gateway was able to successfully ping this entity when the Test page was loaded. Test: Click the Ping button to ping the IP address of this entity or the Traceroute button to traceroute to the IP address of this entity. The results of the test that you select will be displayed on a new page in Gateway Viewer. Partners: This table displays all of the partners of this Corente Virtual Services Gateway, including Intranet, Extranet, and Corente Client partners. Addressing information for Corente Clients is displayed only if they are currently connected to the Location gateway. If the addressing information is not displayed, the partner is not available for a Connection, Ping, or Traceroute test. Name: The name of the partner. IP Address: The visible IP address assigned to the partner. Ping: Whether or not the WAN or WAN/LAN Ethernet interface of this Location gateway was able to successfully ping this partner when the Test page was loaded. Test: Click the Connection button to perform a simple connection test to this Location gateway's partner, which will provide a descriptive, non-technical result. If a problem is detected, the result will inform you what sort of action to take. Click the Ping button to ping the IP address of this partner. Click the Traceroute button to traceroute to the IP address of this entity. The results of the test that you select will be displayed on a new page in Gateway Viewer. No test buttons will be available if the connection, ping, and traceroute tests will not give meaningful results for a diagnosis. For example, buttons will not be available if a partner is in the Peer configuration and its interior IP address is the same as its public visible IP address Control 111

120 Control Clicking the Control option will take you to the screen shown below. Figure 2.25 Machine and Server Control The Machine and Server Control screen can be used to perform the following operations: START Service RESTART Service STOP Service REBOOT Machine SHUTDOWN Machine FAILOVER Machine FAILOVER to Secondary WAN Interface FAILBACK to Primary WAN Interface To perform an operation, click the button for the desired operation and then click OK. If you want to clear your selection, click the Reset button. Any selection made from this page will present a confirmation screen that describes the selected operation and its consequences. Clicking on Cancel will send you back to the previous page, while Continue will complete the operation and display its results. The FAILOVER Machine option will only be enabled if Hardware Failover (also known as Redundant Hardware) has been configured for this Location gateway. Selecting this option will cause the Location gateway hardware to alternate between which Location gateway is currently Active and which is Standby. The FAILOVER to Secondary WAN Interface and FAILBACK to Primary WAN Interface options will be available only if the Dual WAN feature has been configured for this Location gateway. Only one option will be selectable at a time, depending on which WAN interface (primary or secondary) is currently active. When you select FAILOVER to Secondary WAN Interface and click Submit, the Corente Gateway Service will restart and attempt to use the secondary WAN interface as its WAN connection. The secondary WAN interface will remain the active WAN interface until the secondary WAN interface fails, the gateway is restarted, or you return to this page and use the FAILBACK to Primary WAN Interface option. Use of the secondary WAN interface is not static upon restart of the Location gateway service or hardware. When the service or hardware is started, restarted, or rebooted, the Location gateway will attempt to detect both WAN interfaces, and will always attempt to use the primary WAN interface first. If both the primary and secondary WAN connections are unusable, the Location gateway will continuously reboot until one of the WAN connections is functional. The WAN interface that is currently in use will be displayed at the top of the Active Corente Gateway WAN Interface table. For more information on the Dual WAN feature, refer to the Corente Services Policy Definition and Provisioning manual. 112

121 Partner List Refresh Important Executing any of the operations on this page (except START Gateway Service) will cause an interruption of the Corente Virtual Services Gateway Service for this location. This location will be disconnected from the service and any in-progress communications over the Corente network will be interrupted. Consequently such operations should be planned for off hours. Performing these operations on an Inline Location gateway has additional implications because of the additional services that an Inline Location gateway can provide. For example, the Firewall state and Internet Connection Sharing state of the Location gateway will be maintained when you STOP Gateway Software. SHUTDOWN or REBOOT of an Inline Location gateway will interrupt the LAN gateway function that this machine performs. This means that all communications between machines on the private network will be disabled, as well as communication with machines in any location on the public network Partner List Refresh The Corente Services Control Point (SCP) sends incremental updates to all Corente Virtual Services Gateways containing their personality configurations. These updates do not contain the full partner list for a Location gateway; they contain only the specific changes that have been made to the partner list. If the partner list for a Location gateway appears incorrect, an option is available to send a full partner list to the Location gateway. To request an update of the partner list from the Corente SCP, select any of the options listed on the Control page. When you select Submit, another screen will appear that asks if you would like to resend the configuration information. If you select the option Force <Location gateway name> to refresh entire partner list upon reconnection to the Corente SCP and then click Continue, the entire partner list will be resent to your Location gateway as soon as the Location gateway is able to connect with the Corente SCP Remote Login Clicking the Remote Login option will take you to the screen shown below. Figure 2.26 Remote Login Administration The Remote Login Administration screen allows you to enable or disable remote login access from the Corente SCP to your Corente Virtual Services Gateway over the secure tunnel. Customer Operations personnel may request this access if you are having problems with your Corente network. If you want to prevent remote login access to this Corente Virtual Services Gateway over the secure tunnel from the Corente SCP, check the Disable check box and then click the Submit button. If you want to enable remote login access from the SCP for an indefinite period of time, check the Enable remote login access with no time-out box and then click the Submit button. 113

122 Backup and Restore If you want to enable remote login access from the Corente Services Control Point for a specified period of time and then automatically disable that access when that period has expired, check the Enable remote login access for minutes box. Enter the period of time (in minutes) that this access will remain enabled. Then click Submit. Your current setting will be highlighted in gray. Important Corente recommends that you leave this option set on Enable so that Customer Operations can access this Location gateway's personality configuration in case of problems. Note that using the Enable option does not allow Corente to access your network data. Only the Location gateway's personality settings are available to the Customer Operations staff Backup and Restore Clicking the Backup-Restore option will take you to the screen shown below. Figure 2.27 Configuration File Backup and Restore The Configuration File Backup and Restore page provides a mechanism to save and restore critical personality information. The Location gateway personality information is normally stored on the hard drive of the Location gateway and could be lost in the event of a hard disk crash. You can backup this Location gateway's personality file to (and restore it from) either a floppy disk or a USB flash drive. This page provides Backup and Restore options for each storage option. Clicking Backup or Restore for either the USB flash drive or floppy disk options will guide you step-by-step through the proper procedure for either action. To ensure the integrity of the personality file, all Location gateway services are momentarily suspended during the operation. USB Flash Drive Backup and Restore: These options require a USB flash drive in the FAT format. The flash drive must be inserted into a USB port of the Corente Virtual Services Gateway (not the computer you are currently using) during the operation. For Backup operations, the flash drive must have at least 6 MB of free space. For Restore operations, the flash drive must contain a previously saved Location gateway personality file. Floppy Disk Backup and Restore: These options require an MS-DOS formatted floppy disk to be inserted into the floppy disk drive of the Corente Virtual Services Gateway (not the computer you are currently using) during the operation. For Backup operations, the floppy must be writeable and contain enough space to hold the personality file. 114

123 Download For Restore operations, the floppy must contain a previously saved personality file. During normal operation of the Corente Virtual Services Gateway, a USB flash drive or floppy disk should not be left inserted in the Location gateway, as this will cause the Location gateway to fail during reboot after an automatic upgrade or a power outage. You will be reminded to remove the floppy disk or flash drive after the Backup/Restore operation is completed. In addition to backing up and restoring the personality information of a Location gateway, these operations can be used when changing Location gateway hardware. In this case, first save (Backup) the personality file from the old Location gateway to a floppy or a USB flash drive, install the Corente Virtual Services Gateway Software on the new Location gateway, and then use the saved personality file when prompted. Note The Location gateway personality file contains sensitive information. Any floppy disk or USB flash drive containing this file should be kept in a secure location to prevent someone from breaking into your secure network Download Clicking the Download button will take you to the screen shown below. Figure 2.28 Download Corente Gateway Files Corente Gateway Download Log Files Customer Operations may request that you obtain all of the log files from a Location gateway and send them to Corente for analysis. This section automates that process. When you click the Download button in the Corente Gateway Download Log Files section, the Gateway Viewer will gather all relevant log files, create a compressed archive file, and download that archive file to the hard disk of the PC that you are currently using. (The duration of the compression and download will depend on both the size of these files and the speed of your Internet connection.) You can then the compressed file to Customer Operations. 115

124 Download SNMP Extension Agent Download SNMP Extension Agent The Download SNMP Extension Agent section allows you to download the required SNMP monitoring component for servers running Windows 2/XP/Vista/7/8. To monitor a Windows 2/XP server, you must first make sure that the Windows component Managing and Monitoring Tools is installed on the server. To install this component on the server, access Add/Remove Programs on the server's Control Panel and then select Add/Remove Windows Components. A list of components will be displayed. Make sure Managing and Monitoring Tools is selected in this list. You may be required to insert the Windows Operating System CD when installing this component. To monitor a Windows Vista/7/8 server, you must be logged in as an administrator or a member of the Administrators group. Click Start and go to the Control Panel, double-click Programs and Features, then click Turn Windows features on or off in the left-hand side of the page. Select the Simple Network Management Protocol check box, and click OK, then click Next. You may be required to insert the Windows Operating System CD when installing this component. To configure the SNMP agent, access the Control Panel. Double-click Administrative Tools and then double-click Computer Management. In the console tree, click Services and Applications and then click Services. In the details pane, scroll down and click SNMP Service. From the Action menu, click Properties. On the Security tab, select Send authentication trap if you want a trap message to be sent whenever authentication fails. Under Accepted community names, click Add. Under Community Rights, select a permission level for this host to process SNMP requests from the selected community. In Community Name, type a case-sensitive community name, and then click Add. Specify whether or not to accept SNMP packets from a host: To accept SNMP requests from any host on the network, regardless of identity, click Accept SNMP packets from any host. To limit acceptance of SNMP packets, click Accept SNMP packets from these hosts, click Add, type the appropriate host name and IP or IPX address, and then click Add again. Click Apply to apply the changes. After the component has been installed and configured, you must access Gateway Viewer from the server and download the SNMP Extension Agent by clicking the Download Agent button. An InstallShield package called perfmib.exe will be downloaded to the hard disk. Install the agent by double-clicking the package and following the prompts. When this agent has been installed, you can now monitor this server from a Location gateway using server monitoring. (For more information about server monitoring, see Section 2.3, Monitoring Corente Gateway MIB files The section lists all of the SNMP MIBs that are available on the Corente Virtual Services Gateway. When you select a MIB and click the Download button, you can download the text file for that MIB onto the computer that you are currently using and view its object definitions. If you are using a special program on your computer to monitor the Location gateway with SNMP, you can install the text files for your chosen MIBs in that program. If you are querying the Location gateway manually, you can use the text files as guides to what objects and information are available through the MIB. To view only the MIBs that can provide Corente-specific information about this Location gateway, select the option labeled Show only Corente specific MIBs. When this option is not selected, all supported MIBs will be shown. 2.2 Version 116

125 SSL Administration The Corente Gateway Software Version Information page displays a list of all the software that is installed on this Corente Virtual Services Gateway and each software package's version number. Figure 2.29 Corente Gateway Software Version Information Each software package is listed on this page as a hyperlink. When you click the hyperlink for a software package, a new page will be displayed that provides information about this package as well as a change log that details the history of the package on this Location gateway. Every time a change is made to the software package, the change will be recorded in this log. This will allow you to view when a software package has been upgraded or modified SSL Administration The options in the SSL Administration menu (SSL Certificate, SSL Log, and SSL User Report) are unavailable until Corente SSL Client access has been purchased and enabled to this Corente Virtual Services Gateway in App Net Manager. You must log in to view these pages. For more information on enabling the SSL Client and viewing these screens, please refer to the Corente Services SSL Client manual. 117

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Oracle Corente Cloud Services Exchange. Corente Services Gateway Deployment Guide for Release 9.4.3

Oracle Corente Cloud Services Exchange. Corente Services Gateway Deployment Guide for Release 9.4.3 Oracle Corente Cloud Services Exchange Corente Services Gateway Deployment Guide for Release 9.4.3 E80339-03 May 2017 Oracle Legal Notices Copyright 2016, 2017, Oracle and/or its affiliates. All rights

More information

Installation Guide Release for Microsoft Windows

Installation Guide Release for Microsoft Windows [1]Oracle Fail Safe Installation Guide Release 4.1.1 for Microsoft Windows E57046-01 January 2015 Oracle Fail Safe Installation Guide, Release 4.1.1 for Microsoft Windows E57046-01 Copyright 1999, 2015,

More information

ExpressCluster X 3.2 WebManager Mobile

ExpressCluster X 3.2 WebManager Mobile ExpressCluster X 3.2 WebManager Mobile Administrator s Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description 1st 2/19/2014 New manual Copyright NEC Corporation 2014. All rights

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.7 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

ExpressCluster X 3.1 WebManager Mobile

ExpressCluster X 3.1 WebManager Mobile ExpressCluster X 3.1 WebManager Mobile Administrator s Guide 10/11/2011 First Edition Revision History Edition Revised Date Description First 10/11/2011 New manual ii Copyright NEC Corporation 2011. All

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

EXPRESSCLUSTER X Integrated WebManager

EXPRESSCLUSTER X Integrated WebManager EXPRESSCLUSTER X Integrated WebManager Administrator s Guide 10/02/2017 12th Edition Revision History Edition Revised Date Description 1st 06/15/2009 New manual 2nd 09/30/2009 This manual has been updated

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

SureClose Product Line

SureClose Product Line SureClose Product Line Release Notes 3.7 June 21, 2013 SureClose 3.7 Release Notes June 2013 1 Table of Contents Overview... 4 Post-Installation Considerations... 4 Features and Functionality... 6 New

More information

Accessing Data from the Web Interface

Accessing Data from the Web Interface 5 CHAPTER This chapter provides information about accessing Prime Performance Manager data from Prime Performance Manager web interface. This chapter contains: Supported Browsers, page 5-1 Accessing Prime

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Practice Labs User Guide

Practice Labs User Guide Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content

More information

KYOCERA Device Manager User Guide

KYOCERA Device Manager User Guide KYOCERA Device Manager User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

ExpressCluster X Integrated WebManager

ExpressCluster X Integrated WebManager ExpressCluster X Integrated WebManager Administrator s Guide 09/30/2009 Second Edition Revision History Edition Revised Date Description First 06/15/2009 New manual Second 09/30/2009 This manual has been

More information

E June Oracle Linux Storage Appliance Deployment and User's Guide

E June Oracle Linux Storage Appliance Deployment and User's Guide E90100-03 June 2018 Oracle Linux Storage Appliance Deployment and User's Guide Oracle Legal Notices Copyright 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

Access Gateway Client User's Guide

Access Gateway Client User's Guide Sysgem Access Gateway Access Gateway Client User's Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Release for Microsoft Windows

Release for Microsoft Windows [1]Oracle Fail Safe Tutorial Release 4.1.1 for Microsoft Windows E57061-02 April 2015 Oracle Fail Safe Tutorial, Release 4.1.1 for Microsoft Windows E57061-02 Copyright 1999, 2015, Oracle and/or its affiliates.

More information

Secure Web Appliance. Basic Usage Guide

Secure Web Appliance. Basic Usage Guide Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Oracle Cloud. Using Oracle Eloqua Adapter Release E

Oracle Cloud. Using Oracle Eloqua Adapter Release E Oracle Cloud Using Oracle Eloqua Adapter Release 12.1.3 E65434-01 August 2015 Oracle Cloud Using Oracle Eloqua Adapter, Release 12.1.3 E65434-01 Copyright 2015, Oracle and/or its affiliates. All rights

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

Astra Schedule User Guide Scheduler

Astra Schedule User Guide Scheduler Astra Schedule User Guide 7.5.12 Scheduler 1 P a g e ASTRA SCHEDULE USER GUIDE 7.5.12... 1 LOGGING INTO ASTRA SCHEDULE... 3 LOGIN CREDENTIALS... 3 WORKING WITH CALENDARS... 4 CHOOSING A CALENDAR AND FILTER...

More information

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide Version 4.1 June 2013 Xerox Device Agent (XDA) Lite User Guide 2008-2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the US and/or other countries.

More information

Cisco TelePresence VCS Cluster Creation and Maintenance

Cisco TelePresence VCS Cluster Creation and Maintenance Cisco TelePresence VCS Cluster Creation and Maintenance Deployment Guide Cisco VCS X8.5 Cisco TMS 13.2 or later December 2014 Contents Introduction 4 Prerequisites 5 Upgrading an X7.1 or later cluster

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

WebSphere Application Server V7: Administration Consoles and Commands

WebSphere Application Server V7: Administration Consoles and Commands Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 10/02/2017 6th Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 10/02/2017 6th Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Installation Guide 10/02/2017 6th Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the

More information

Oracle Test Manager. Test Manager User s Guide Release E

Oracle Test Manager. Test Manager User s Guide Release E Oracle Test Manager Test Manager User s Guide Release 12.3.0.1 E15486-10 July 2013 Oracle Test Manager Test Manager User's Guide, Release 12.3.0.1 E15486-10 Copyright 1997, 2013, Oracle and/or its affiliates.

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide

Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Version 1.0 Note Before using this information and the product it supports, read the information in Appendix A Notices on

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help, please contact Hangzhou

More information

RealPresence Access Director System Administrator s Guide

RealPresence Access Director System Administrator s Guide [Type the document title] Polycom RealPresence Access Director System Administrator s Guide 2.1.0 March 2013 3725-78703-001A Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

User Manual & Quick-Start Guide

User Manual & Quick-Start Guide User Manual & Quick-Start Guide Version 2 2002-2008 Promethean Software Corporation. All rights reserved. Table of Contents Introduction... 5 Quick-Start Guide... 5 o Installing TurboLaw... 5 o Configuring

More information

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 01/29/2016 3rd Edition

EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows. Installation Guide. 01/29/2016 3rd Edition EXPRESSCLUSTER X SingleServerSafe 3.3 for Windows Installation Guide 01/29/2016 3rd Edition Revision History Edition Revised Date Description 1st 02/09/2015 New manual 2nd 04/20/2015 Corresponds to the

More information

Getting Started with the Web Client

Getting Started with the Web Client Getting Started with the Web Client Getting Started with the Web Client The OmniVista Web Client for OmniVista 3.3 provides users access to basic versions of the OmniVista Locator, Notifications, and Topology

More information

Oracle Cloud Using the Google Calendar Adapter with Oracle Integration

Oracle Cloud Using the Google Calendar Adapter with Oracle Integration Oracle Cloud Using the Google Calendar Adapter with Oracle Integration E85501-05 January 2019 Oracle Cloud Using the Google Calendar Adapter with Oracle Integration, E85501-05 Copyright 2017, 2019, Oracle

More information

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( )

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( ) Oracle Beehive Using BlackBerry with Oracle Beehive Release 2 (2.0.1.6) November 2011 Document updated November 4, 2011 This document describes how to access Oracle Beehive from your RIM BlackBerry device

More information

IBM NetBAY Virtual Console Software. Installer and User Guide

IBM NetBAY Virtual Console Software. Installer and User Guide IBM NetBAY Virtual Console Software Installer and User Guide INSTRUCTIONS This symbol is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide 2018 Amazon AppStream 2.0: SOLIDWORKS Deployment Guide Build an Amazon AppStream 2.0 environment to stream SOLIDWORKS to your users June 2018 https://aws.amazon.com/appstream2/ 1 Welcome This guide describes

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

DSView. Installer/User Guide

DSView. Installer/User Guide DSView Installer/User Guide DSView Installer/User Guide Avocent, the Avocent logo, The Power of Being There, OutLook, DSView, AutoView, DSR, Dambrackas Video Compression, Click and Connect and OSCAR are

More information

Virtual Infrastructure Web Access Administrator s Guide ESX Server 3.0 and VirtualCenter 2.0

Virtual Infrastructure Web Access Administrator s Guide ESX Server 3.0 and VirtualCenter 2.0 Virtual Infrastructure Web Access Administrator s Guide ESX Server 3.0 and VirtualCenter 2.0 Virtual Infrastructure Web Access Administrator s Guide Revision: 20060615 Item: VI-ENG-Q206-217 You can find

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Wavelink Avalanche Site Edition Web Console User Guide. Version 5.3

Wavelink Avalanche Site Edition Web Console User Guide. Version 5.3 Wavelink Avalanche Site Edition Web Console User Guide Version 5.3 Revised 04/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Cluster creation and maintenance

Cluster creation and maintenance Cluster creation and maintenance Cisco TelePresence Deployment Guide Cisco VCS X6.1 Cisco TMS 12.6 or later D14367.08 May 2011 Contents Contents Document revision history... 5 Introduction... 6 Prerequisites...

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.12 PDF-SERVER-E-Rev1 Copyright 2012 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Order Management Bookings - Getting Started Guide for Manufacturers

Order Management Bookings - Getting Started Guide for Manufacturers Order Management Bookings - Getting Started Guide for Manufacturers Table Of Contents Order Management Bookings Getting Started Guide... 3 Purpose of this Document... 3 What is Order Management Bookings?...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Upgrading the Cisco ONS CL to Release 7.0

Upgrading the Cisco ONS CL to Release 7.0 This document explains how to upgrade Cisco ONS 15310-CL Cisco Transport Controller (CTC) software from Release 5.x or Release 6.x to Release 7.0.x, or from Release 7.0.x to a later maintenance release

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

Getting Started with Prime Network

Getting Started with Prime Network CHAPTER 1 These topics provide some basic steps for getting started with Prime Network, such as how to set up the system and the basic parts of the Prime Network Administration GUI client. Basic Steps

More information

Oracle Secure Global Desktop User Guide for Release 5.3

Oracle Secure Global Desktop User Guide for Release 5.3 Oracle Secure Global Desktop User Guide for Release 5.3 January 2017 E65657-01 Oracle Legal Notices Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

Adobe Connect: Overview

Adobe Connect: Overview Adobe Connect: Overview Table of Contents Table of Contents... 1 Overview of Adobe Connect... 2 Recommended Use... 2 Roles and Privileges... 2 Menu Bar... 3 Prepare Room and Upload Content... 4 Create

More information

Managing the CaseMap Admin Console User Guide

Managing the CaseMap Admin Console User Guide Managing the CaseMap Admin Console User Guide CaseMap Server, Version 2.3 Accessing the CaseMap Admin Console Registering CaseMap Servers Registering SQL Servers Setting Up Roles and Users Managing SQL

More information

Oracle Cloud Using the Google Calendar Adapter. Release 17.3

Oracle Cloud Using the Google Calendar Adapter. Release 17.3 Oracle Cloud Using the Google Calendar Adapter Release 17.3 E68599-09 October 2017 Oracle Cloud Using the Google Calendar Adapter, Release 17.3 E68599-09 Copyright 2015, 2017, Oracle and/or its affiliates.

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3

Wavelink Avalanche Site Edition Java Console User Guide. Version 5.3 Wavelink Avalanche Site Edition Java Console User Guide Version 5.3 Revised 04/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software

More information

User Manual. MPPTracker. Management Software for Solar Charge Controller. Version: 1.2

User Manual. MPPTracker. Management Software for Solar Charge Controller. Version: 1.2 User Manual MPPTracker Management Software for Solar Charge Controller Version: 1.2 Table of Contents 1. MPPTracker Overview... 1 1.1. Introduction... 1 1.2. Features... 1 2. MPPTracker Install and Uninstall...

More information

UIP1869V User Interface Guide

UIP1869V User Interface Guide UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.1.0 E73562-01 June 2016 Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter, Release 12.2.1.1.0 E73562-01 Copyright 2015,

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

SIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1

SIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1 Preface Connecting SCALANCE S615 to the WAN 1 SIMATIC NET VPN tunnel between SCALANCE S615 and 2 SINEMA RC Server Industrial Ethernet Security Getting Started 07/2017 C79000-G8976-C390-02 Legal information

More information

Network Camera. Application Guide 1.5 Before operating the unit, please read this manual thoroughly and retain it for future reference.

Network Camera. Application Guide 1.5 Before operating the unit, please read this manual thoroughly and retain it for future reference. A-EAK-100-15 (1) Network Camera Application Guide 1.5 Before operating the unit, please read this manual thoroughly and retain it for future reference. 2012 Sony Corporation Table of Contents Overview

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Getting Started with CMS

Getting Started with CMS CHAPTER 3 This chapter contains these sections that describe the Cluster Management Suite (CMS) on the Catalyst 3750 switch: Understanding CMS section on page 3-1 Configuring CMS section on page 3-8 Displaying

More information

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4 Configure Failover 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners. TC:1/4/2019

More information

Using the Prime Performance Manager Web Interface

Using the Prime Performance Manager Web Interface 3 CHAPTER Using the Prime Performance Manager Web Interface The following topics provide information about using the Cisco Prime Performance Manager web interface: Accessing the Prime Performance Manager

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3 Introduction Preparing the 3.2.X system for the upgrade Installing the BIG-IP version 9.2.3 software Licensing the software using

More information