Unified Performance Management Solution. User Guide

Size: px
Start display at page:

Download "Unified Performance Management Solution. User Guide"

Transcription

1 Unified Performance Management Solution User Guide

2 Copyright 2016 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form, or by any means, electronic or mechanical, including photocopying, for any purpose, without the express written permission of Colasoft. Colasoft reserves the right to make changes in the product design without reservation and without notification to its users. Contact Us Sales Technical Support Website Copyright 2016 Colasoft. All rights reserved. i

3 Contents 1. Preface Introduction Components Deployment Installation Technical support 3 3. Initialization Configurations Frontend Configuration Add frontend account Connect frontend to UPM Center View frontend information Network Device Configuration Network Path Configuration Settings Probe Configuration Network Segment Configuration Path Diagram Application Configuration Application Data Update Settings Diagram Options Node filter settings Access relationship diagram Node operation Node management Application management Business Configuration Business Definition Business Logic Diagram Business Transaction Path Alarm Settings Edit business System Configuration User Configuration Event Configuration 35 Copyright 2016 Colasoft. All rights reserved. ii

4 4.3. Application Configuration Probe Configuration Probe Configuration Aggregation Probe Configuration Network Segment Configuration Predefined Alarm Configuration Add alarm template Add alarm Business Alarm Configuration Customized Alarm Intelligent Alarm Asynchronous Duplex Long Connection Alarm Performance Alarm Configuration Probe Traffic Alarm Configuration SMTP/Radius Configuration SMTP Server Configuration Radius Server Configuration Send Configuration Alarm Send Configuration Syslog Send Configuration Scheduled SLA Report Configuration System Management Audit Logs Configurations Import/Export Configurations Import Configurations Export System Information License Information Home Page Business Alarm Network Alarm Probe Alarm Network Performance Monitor Applications Probe Traffic Monitor Business Monitor 52 Copyright 2016 Colasoft. All rights reserved. iii

5 7. Business Monitor Timeline Timeline components Time slice operation Fullscreen monitor Centralized Business Monitor Group Application Alternation Business sorting Business filter Monitor period Business search Business details Alarm logs Business Group Performance Monitor Group Business group and connecting business groups Business group status monitor Business Global Performance Monitor Node explanation Relationship diagram operation Alarm logs Network Performance Monitor Group Add node and path Add node Add network path Network Performance Monitor Monitor settings Network status monitor Probe utilization Path Analysis Alarm log Probe Monitor Probe Traffic Monitor Probe group Monitor view settings 70 Copyright 2016 Colasoft. All rights reserved. iv

6 Monitor information Probe Index Monitor Group Add Chart Chart operation Business Analysis Business Performance Analysis Business logic diagram analysis Business index analysis Generate SLA report History monitor Multi-segment analysis Business Index Analysis Index group Index query Index chart Probe Traffic Analysis Group Traffic Analysis Baseline Analysis Comparison Analysis Trend Analysis Alarm Business Alarm Specify query time Business Tree Structure Alarm statistical chart Alarm list Probe Traffic Alarm Specify query time Probe List Alarm statistical chart Alarm list Network Performance Alarm Specify query time Group List 94 Copyright 2016 Colasoft. All rights reserved. v

7 Alarm statistical chart Alarm list Report Business SLA Report Business List SLA report Probe Traffic Report Probe List Traffic report Download Retrieve Packets Retrieval settings Retrieve based on application Retrieve based on IP address Download Packets 101 Copyright 2016 Colasoft. All rights reserved. vi

8 1. Preface Summary This guide introduces the configurations, operations, and daily maintenances for Colasoft UPM. Who should read this guide This guide is written for all users of Colasoft UPM. Glossary The commonly used terms in this guide are described in table below: Term Probe Aggregation probe Frontend Access relationship Access relationship diagram Business Business logic diagram Business transaction path Network node Network path Intelligent alarm Asynchronous duplex long connection Description One probe indicates one data collection site, for collecting network packets. One probe corresponds to one network link on frontend. One aggregation probe is mapped with two or more probes. Frontend indicates nchronos Server, which is deployed at the critical links to capture, analyze and store network packets. If two IP addresses are communicated, there is access relationship between them. Access relationship diagram consists of the access relationships among multiple IP addresses. A business means a specific transaction completed via network. One business can be done via one or more network applications. A business logic diagram consists of the access relationships among server nodes and client nodes for the business. A business transaction path consists of server nodes and client nodes that are passed sequentially by to complete a specific task, such as balance inquiry, bank transfer. Network communication endpoint, one IP address or a network segment can be taken as one network node. Also called as communication path. A network path consists of probes and network devices passed sequentially by when two network nodes communicate. An advanced alarm triggered by UPM Center which automatically compares the packets difference, retransmission packets and probe data from two probes on one network path. One TCP connection method. Asynchronous duplex: when a program sends and receives data, there are two sub processes which send and receive data respectively. With long connection, one TCP connection can send multiple packets continuously. During the keep-live period of the TCP connection, if no packets are sent, both ends are required to send detection packets to keep the connection. Copyright 2016 Colasoft. All rights reserved. 1

9 2. Introduction Colasoft UPM is a network business oriented performance management system. By analyzing the network from service layer, application layer, down to network layer, Colasoft UPM combines network operation and maintenance with service performances, analyzes the performance, quality, fault, and security issues based on business, and thus provides the visibility to business performances. Colasoft UPM helps users promote business oriented, proactive network operational capability, ensure the running of businesses, and enhance troubleshooting efficiency Components Colasoft UPM consists of nchronos Server (hereinafter referred to as frontend ) and UPM Analysis Center (hereinafter referred to as UPM Center ). Frontend devices can be deployed at the key nodes on the communication link for business system, and capture business communication data by switch port mirroring or network TAP. The frontend collects and analyzes the performance index parameters and application alarm information in realtime, and uploads to UPM Center via the management interface for overall analysis. UPM Center is deployed to converge frontend devices, collect the business performance indexes and alarm information uploaded by frontend devices, and display the analysis results Deployment The deployment of UPM is visualized as the following figure: LAN UPM Center Work Station PC PC LAN Servers Farm LAN 3-Layer Switch nchronos Server nchronos Server Printer nchronos Server Office Office 3-Layer Switch Firewall Router nchronos Server nchronos Server nchronos Server Firewall Router nchronos Server Servers Farm Firewall Router Internet nchronos Server Servers Farm 2.3. Installation Please follow Colasoft UPM Installation Manual to install UPM Center, and follow Colasoft nchronos Server Installation Manual to install nchronos Server. Copyright 2016 Colasoft. All rights reserved. 2

10 2.4. Technical support Basically, we provide technical support to all users of our products, including commercial customers and freeware users, but please understand that commercial customers have priorities to get help and to be supported within one working day. For common questions, you can find answers in our Knowledge Base. Website support In addition to up-to-date FAQs and glossary, there is version upgrade information and public resources available at support You are welcome to contact us at with technical questions at any time. We will reply you as quickly as possible. Your should include information about the serial number of the product, product version and edition, the version of operating system, detailed description of the problem and other relevant information. Forum support To get our support, provide your suggestions and discuss our products with other users, please join our Support Forum. Copyright 2016 Colasoft. All rights reserved. 3

11 3. Initialization Configurations Colasoft UPM does the entire monitor and analysis job by analyzing the data from frontend devices, to thereby outline the application and network path information for network business. Therefore, before using UPM to monitor network businesses, it is required to do some initialization configurations, as following steps: Frontend Configuration Network Device Configuration Network Path Configuration Application Configuration Business Configuration 3.1. Frontend Configuration Frontend devices collect and analyze network traffic and regularly report data to UPM Center, while UPM Center centrally manages the frontend devices deployed at the various network locations or links to achieve distributive deployment and centralized management. Therefore, frontends must be successfully added to thereby perform the data interaction between UPM Center and frontends. Go to Configuration ->Frontend Configuration to enter the Frontend Configuration page, as the screenshot below: Add frontend account If it is the first time to use UPM, it is required to add a frontend account, which is for frontend devices to login UPM to send data to UPM. Click the Add button to open the Add Frontend Account box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 4

12 Enter the username and password to set up a frontend account. One frontend account can be used for more than one frontend device to connect to UPM Center Connect frontend to UPM Center Login nchronos Server web portal and go to the Analysis Center page, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 5

13 Complete the settings and then click Connect to establish the connection between nchronos Server and UPM Center. Here described are the setting items: nchronos Server name: name of the nchronos Server, i.e., frontend name. Center address: IP address of UPM Center. Center port: the port number for the communication between UPM Center and frontend. It is by default. Username and password: frontend account added via Configuration ->Frontend Configuration on UPM View frontend information Once a frontend is successfully added, you can view the detail information of that frontend, including frontend name, frontend version, connection status, link, interaction logs etc., as the screenshot below: You can click to view frontend information, including connection status, link, and interaction log. You can click to view frontend privilege for users. You can also modify user's frontend privilege. For more information about user privilege, please refer to User Configuration Network Device Configuration You can add network devices onto UPM system, including switches, routers, firewalls, etc., then you can add the network devices upon configuring network paths. Please note that network device configuration is not a must for UPM initialization, but only network devices are configured onto UPM first and then added to network paths. To add network devices, go to Configuration -> Network Device Configuration. Click the Add button to open the Add Network Device box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 6

14 Complete the box to add a network device. The network device could be router, switch, firewall, load balance, gateway and other possible network devices Network Path Configuration Network path configuration is for setting up the relationship among probes and network nodes. Go to Intelligence -> Network Paths to enter the Network Paths page, as the screenshot below: To configure network paths, you can follow the steps: 1. Settings 2. Probe Configuration Copyright 2016 Colasoft. All rights reserved. 7

15 3. Network Segment Configuration 4. Path diagram Settings Probes collect lots of service access data. To help users focus on the interested network nodes and simplify the display of network paths and nodes, it is better to do some settings before configuring network paths. Click the button to open the Settings box, as the screenshot below: The option Update Data is turned on by default. UPM system will not automatically update network nodes data via collected data when it is turned off. The option Data Update Rule is for defining the IP address range of network nodes which will be automatically updated. It provides three default rules as the screenshot above. You can click the Add button to add new rules Probe Configuration All analysis results on UPM are based on the data collected by probes. One probe indicates one data collection site. UPM probe corresponds to the network link on frontend. On the right part of the Network Paths page, go to the Probe Configuration tab, and click the button to open the Add Probe box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 8

16 On the Add Probe box, UPM system automatically lists all the network links of the frontend that are connected to UPM Center. You can map the new probe to any network link. One network link can only be mapped to one probe. You can also specify the probe privilege for users. For more information about user privilege, please refer to User Configuration. After adding a probe, you can click the buttons following the probe to modify or delete it You can also configure probes via Configuration -> Probe Configuration. Network Segment Configuration On the right part of the Network Paths page, go to the Network Segment Configuration tab. Then you can configure network segments. All network segments configured on UPM will be forwarded to frontend links which are mapped to probes. You can login nchronos Console, right-click the network link -> Properties -> Network Segments to view the network segments forwarded by UPM. Add network segment UPM system provides two methods to add network segment, Automatic and Manual: Automatic: according to the Data Update Rule in Settings, UPM system automatically sorts the IP addresses collected by probes as network segments. Manual: click the Add button to open the Add Network Segment box, enter the segment name and segment rule to define a network segment, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 9

17 You can add more than one rule for one network segment, with one entry per line, but the rules cannot conflict. Add to network segment If it is required to merge some added network segments, you can select the added network segments, then click the button, choose a desired network segment on the popup box, and click OK. UPM system will automatically merge the selected network segments to the desired network segment You can also add network segment via Configuration -> Network Segment Configuration. Path Diagram When the option Data Update turns on, UPM system automatically draws a network path diagram according to the data collected from probes. Path diagram components A path diagram includes: node, probe and network path. Node: indicates Internet client and indicates IP node. Probe: the probes added via Probe Configuration, indicated by. Network path: The connection line between probes, as well as between probe and node. Path diagram filter There are two methods to filter path diagram, search filter and click filter: Copyright 2016 Colasoft. All rights reserved. 10

18 Search filter: in the search box, enter the segment/ip keyword, the path diagram will automatically filters based on the keyword, only showing data matching the keyword. Meanwhile, the Network Segment Configuration list auto-filters. Click filter: on the path diagram, click a probe/node, the path diagram will automatically filters, only showing a path diagram related to the selected probe/node, and greying the unrelated components. You can click the blank area to show the entire path diagram. Path diagram display There are four ways to display the path diagram: Ring, Tree, Matrix, and Random. You can click corresponding button to switch the display. Node operation Add path node To add a node onto the path diagram, click the button as the screenshot below: to open the Add Node box, When adding a path node, you can choose the node type as IP address or Internet client. Once a node is successfully added, you cannot change node type. IP address: it could be an IP address or a network segment. You can also select an added network segment. Internet client: all clients. Once a path node is successfully added, it will display on the path diagram. Merge nodes Merging nodes is for merging several nodes as one node to display, not affecting network segment rules. Copyright 2016 Colasoft. All rights reserved. 11

19 If your network environment includes nodes having exactly same network access relationship but belonging different network segments, then you cannot merge network segment rule but you can merge the nodes to simplify the configuration for network path. To merge nodes, press CTRL, click the nodes to be merged, right-click and then click Merge Nodes, enter a name for the merged node and click OK. After merging, only the path relationship of the last selected node will be reserved, paths of other merged nodes will be deleted. Add network path To add a network path, select a node and right-click, and then click Add Network Path to open the Add Network Path box, as the screenshot below: When adding network path, you can choose any probe as the path connection point. When a network path is successfully added, a line is connected between the node and the probe. Edit node To edit a node, right-click it and choose Edit. Delete node To delete a node, right-click it and choose Delete. Probe operation Right-click a probe and follow menus display: To add a network path for a probe, you can choose other probes or nodes as path connection point. Once a network path is successfully added, a line is connected between the probe and connection point. You can right-click a probe to edit or delete it. Path operation Right-click a network path, i.e., right-click a connection line, and follow menus display: Copyright 2016 Colasoft. All rights reserved. 12

20 Communication Path Setting Right-click a network path and click Communication Path Setting to open the Communication Path Setting box, as the screenshot below: You can add network devices onto the communication path. Click and choose the network devices added in Network Device Configuration. When network devices are successfully added, they are displayed on the communication path, as the screenshot below: On the communication path, you can drag the network device to desired position, and then click Save to complete the setting. Delete network path To delete a network path, right-click it and then click Delete Network Path Application Configuration Click the menu Intelligence -> Applications and you will go to the Applications page, which shows the application access relationships among nodes, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 13

21 Application Data Update Settings Probes collect lots of service access data. To help users focus on the interested applications and simplify the display of access relationships, it is better to do some settings before configuring applications. Click the button screenshot below: and then click the Application Data Update Settings tab, as the The option Update Data is turned on by default. UPM system will not automatically update IP address data when it is turned off, but this feature will consume much system resource if it turns on all the time. The option Application IP address is for defining the IP address range which will be defined as applications. You can enter new IP address range in the box Diagram Options Diagram Options are for configuring the nodes displayed on the access relationship diagram, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 14

22 Number of displayed clients for one server node: for a server node, the number of clients to be displayed. By default, only the first 15 clients of a server are displayed, and you can enter a number between 1 and 50. Number of displayed servers for one client node: for a client node, the number of servers to be displayed. By default, only the first 15 servers of a client are displayed, and you can enter a number between 1 and 50. Maximum connection lines: the number of lines displayed on the diagram. By default, only 200 lines are displayed, and you can enter a number between 1 and 500. Display node as: the node can be displayed as IP address, node name, and IP address and node name. Port filter rule: by default, there are no port rules, and all access relationships are displayed on the diagram. When you set up a port rule, only port access relationships matching the rule are displayed. IP filter rule: this option is for configuring the IP filter rule of server node. By default, there are no IP rules, and all access relationships are displayed on the diagram. When you set up an IP rule, only access relationships of the server nodes matching the rule are displayed Node filter settings When there are too many nodes on the access relationship diagram, you can set up a filter to only display interested access relationships. Time filter, probe filter, type filter, and keyword filter are supported, as the screenshot below: Time filter: only access relationships during that time range are displayed on the diagram. You can specify any time range, or yesterday, last week, last month, etc. Probe filter: all data on the diagram is collected by probes. By default, access relationships Copyright 2016 Colasoft. All rights reserved. 15

23 collected by all probes are displayed on the diagram, and you can click to specify a probe or several probes to only display access relationships from that probe(s). Type filter: there are two types of access relationships: TCP and UDP. By default, both TCP and UDP connections are displayed, and you can click to display one of them. Keyword filter: you can enter an application or host keyword to only display access relationships related to that application or host. You can combine the filters to display interested nodes Access relationship diagram There are two types of access relationship diagram: relationship diagram and matrix diagram. You can click the buttons and to make a switch. On the access relationship diagram, one node indicates one IP address. If it is a server node, it may provide more than one application service. There are connections and nodes of different colors. You can click the help button to view the explaination, as the screenshot below: Node operation On the access relationship diagram, you can modify node name, view node information, define application, add node to existing application, hide and show a node. Right-click a node and you will get menus as screenshot below: Copyright 2016 Colasoft. All rights reserved. 16

24 Different types of nodes have different right-click menu. Edit Node Name By default, nodes are displayed as IP addresses. You can add a name for the node by editing it. View Node Information For a client node, a Client Node box shows node details and accessed server list, as the screenshot below: For a server node, a Server Node box shows all the port access information of that node, as the screenshot below: For a node that works as both client and server, a Server/Client Node box shows port access information when it works as a server and also shows node information and accessed server list when it works as a client, as the screenshot below: Add Application Add Application means you can define an application based on the node. Click the menu Add Application to open the box as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 17

25 Select an application type and then the Add Application box pops up. UPM system automatically fills the box with selected node and its port. Just enter the application name, description and response time, and you can define an application very fast. Add to Application Add to Application means to add the service node to an existing application. Click the menu Add to Application to open a box, and then choose an existing application to add the nod as a new rule to that application. Show You can set up to only show nodes related to the selected node on the diagram, as the screenshot below: Hide You can set up to hide nodes related to the selected node from the diagram, as the screenshot below: For hidden nodes, you can click the button to view or show the hidden nodes Node management On the right part of the Applications page, the Node tab displays the service access information displayed on the diagram, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 18

26 IP Address: the IP address of server node. Port: the service port number. One server node may provide more than one service port. Application: during initialization, it is identified as "Unknown", and when a service access is defined as application, it will display as application name. Action: for added application, you can add it to business, modify the application rule, or delete the application based on that node. When one service access record is selected, you can do following operations: Add Application: for the node not defined as an application, you can click the button to define it as a new application. Add to Application: for the node not defined as an application, you can click the button to add it an existing application. View Client: click the button to view all clients connected to the node. Delete Node: click to delete the service access from both the list and the diagram. Copyright 2016 Colasoft. All rights reserved. 19

27 Application management On the right part of the Applications page, the All Applications tab displays all customized applications, as the screenshot below: All applications customized on UPM will forward to frontend links which are mapped to probes. You can login nchronos Console, right-click the network link -> Properties -> Analysis Settings to view the applications forwarded by UPM. You can click the button to define a new application, as the screenshot below: There are three categories of applications that you can customize. Add Standard Application Follow steps below to add a standard application: 1. Enter application and description. 2. Choose the category as Standard Application. 3. Choose an application type, which could be Short Connection, Asynchronous Duplex Long Copyright 2016 Colasoft. All rights reserved. 20

28 Connection, and Persistent Connection. When you choose Asynchronous Duplex Long Connection, the box shows related application alarm settings. 4. Click to add an application rule. For applications of Short Connection and Persistent Connection, you can only set up server information; for applications of Asynchronous Duplex Long Connection, you have to configure both server and client information. 5. Configure application response time. You can click the numbers to set one by one, or you can also just set the good response time, and the system will calculate both normal and bad response time automatically. 6. Click OK to successfully add a standard application. Add Web Application Follow steps below to add a web application: 1. Enter application and description. 2. Choose the category as Web Application, as the screenshot below: 3. Enter the host name, server IP address and port number. 4. Configure application response time. You can click the numbers to set one by one, or you can also just set the good response time, and the system will calculate both normal and bad response time automatically. 5. Click OK to successfully add a standard application. Add Signature Application Follow steps below to add a signature application: 1. Enter application and description. 2. Choose the category as Signature Application, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 21

29 3. Enter the server IP address, port number, and signature content. You can add more than one piece of signature content for one application. 4. Configure application response time. You can click the numbers to set one by one, or you can also just set the good response time, and the system will calculate both normal and bad response time automatically. 5. Click OK to successfully add a standard application. Besides above method for configuring applications, you can also click application and modify the rule to define a new application. to copy the You can click the button You can click the button added to businesses. to edit application rule. to delete an application. Applications cannot be deleted If they are 3.5. Business Configuration To configure a business, click the menu Configuration -> Business Configuration to open the Business Configuration page, and then click the button to set up a new business, including 4 steps: Business Definition, Business Logic Diagram, Business Transaction Path, and Alarm Settings Business Definition In this step, you need to do some basic settings, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 22

30 Name: name of the business. Operational Level: the operation and maintenance level of the business. Description: description information of the business. Business Group: group that the business belongs to. If no group is chosen, the business will be grouped to All Groups. Business Privilege: the operation privilege for normal users. After the basic settings, click Next to go to the Business Logic Diagram page Business Logic Diagram The Business Logic Diagram page shows as the screenshot below: Add Application Relationship Applications are the basic unit for a business, therefore you first need to add applications to logic diagram to then define a business. Click the button to pop up a box and choose an application. Then the Business Logic Diagram shows the application node, and the right part of the page lists the added application, application server and client nodes, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 23

31 Node operation Merge node Automatic merge: one business comprises several applications. When server and client nodes have addresses overlapped, the logic diagram will automatically merge the nodes. Manual merge: on the logic diagram, you can drag any nodes to change node location. When dragging a node to overlap another node, a box pops up to merge the two nodes. For manually merged nodes, the logic diagram shows them as. Split node For manually merged nodes, you can right-click it to split it as original nodes. Node configuration There are three types of nodes on the node list: application node, server node and client node, as the screenshot below: Application node Application nodes are displayed in two colors. By default, applications are displayed in black. When an application is added to a business and then the application rule is modified, in this scenario, the application will be displayed in red, which reminds you to update the application to ensure the accuracy of business data. For an application node, you can do following operations: Application performance evaluation Copyright 2016 Colasoft. All rights reserved. 24

32 By default, application performance evaluation is enabled for all application nodes. You can also disable it by unchecking the Application checkbox. When application performance evaluation is enabled, UPM system automatically evaluates application performance based on application transaction response status and triggers alarms when there are application performance issues. Correlate business When hover mouse over an application, click the button after the application to open the Correlate Business box. You can choose more than one business, as the screenshot below: Update application When hover mouse over an application in red characters, click the button after the applicatoin to open the renew notice box. Once the application is renewed, all nodes and path information will be deleted to obtain new application node. Delete application When hover mouse over an application, click the button after the application to delete the application. Once an application is deleted, all nodes and path information will be deleted. Server node Server node is extracted by UPM system from application configuration. Here you can enable/disable its application performance evaluation and host performance evaluation. Application performance evaluation It is same as the application performance evaluation of application node. When application performance evaluation is enabled, UPM system automatically evaluates application performance based on application transaction response status and triggers alarms when there are application performance issues. Host performance evaluation By default, host performance evaluation is enabled for all server nodes. You can also disable it by unchecking the Host checkbox. When host performance evaluation is enabled, UPM system automatically evaluates server performance based on TCP SYN packets, TCP RST packets, TCP SYNACK packets, and TCP window size related parameters, and triggers alarms when there are host performance issues. Copyright 2016 Colasoft. All rights reserved. 25

33 Client node There are two types of client node: added IP node and customized IP node. Added IP node is the client node extracted by UPM system from application configuration. Customized IP node is the client node manually added. Add client node To add a client node, hover mouse over the Client root node and click the button and then enter client information to successfully add a client node. to pop up a box, For client node, you can enable/disable its host performance evaluation and network performance evaluation: Host performance evaluation By default, host performance evaluation is enabled for all client nodes. You can also disable it by unchecking the Host checkbox. When host performance evaluation is enabled, UPM system automatically evaluates server performance based on TCP SYN packets, TCP RST packets, TCP SYNACK packets, and TCP window size related parameters, and triggers alarms when there are host performance issues. Network performance evaluation By default, network performance evaluation is enabled for all client nodes. You can also disable it by unchecking the Host checkbox. When network performance evaluation is enabled, UPM system automatically evaluates client performance based on retransmission packets and segment lost packets, and triggers alarms when there are network performance issues. Edit client node When hover mouse over a customized node, you can click the button to edit the node. If a client node is already added to logic diagram, the node will be removed from the logic diagram after editing, and you need to add it to the logic diagram again if required. Delete client node When hover mouse over a client node, click the button after the client node to delete it. Once a client node is deleted, related path information will be deleted. Add client node to logic diagram By default, all client nodes are not added to business logic diagram. To add a client node to business logic diagram, just check the checkbox in front of it. If there is network path between the client and server, then the client node cannot be added to the logic diagram. You need to first go to the Intelligence -> Network Paths and add a network path for the client, and then add it to business logic diagram. Copyright 2016 Colasoft. All rights reserved. 26

34 Communication Path Settings Hover mouse over a client node and click the button after the node to open the Communication Path Settings box. By default, system displays the shortest path to server, as the screenshot below: If there are more than one network path between the server and the client, you can click the button to choose another one. If the chosen path includes two or more probes, you can enable the intelligence alarm and set up the alarm condition. When the alarm condition is triggered, system will generate an alarm. You can also click the button to go to the Network Paths page to add network paths. After setting up the business logic diagram, as the screenshot below, click Next to go to the Business Transaction Path settings page Business Transaction Path Click the button Add Business Transaction Path to configure business transaction path settings, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 27

35 Follow steps below to add a business transaction path: 1. Enter transaction path name and set up the color. 2. Click the button Transaction Settings to open the Transaction Settings box to configure transaction, as the screenshot below: 3. In the business logic diagram, click the server nodes and client nodes one by one that the transaction passes by. UPM system will connect the clicked server nodes and clients as a transaction path based on the click sequence, as the screenshot below: 4. Click the button Save to complete the transaction path settings. On the business transaction path list, you can view the added transaction paths, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 28

36 You can check Show to show the transaction path on the logic diagram, and you can modify or delete it by clicking the action buttons Alarm Settings The Alarm Settings step is for setting up alarms for the business, as the screenshot below: The left part of this page displays in a tree-like structure, meaning application > application/server/client. Each node lists the number of enabled alarms and total alarms. For example, 120 (1/3) means the node name is 120, 3 alarms are defined for this node, and 1 alarm is enabled. Add alarm Alarms added on UPM will be forwarded to frontend links which are mapped to probes. You can login nchronos Console, right-click the network link -> Properties -> Alarms to view the alarms forwarded by UPM. There are three methods to add an alarm: Method 1: via the button Select a node and click the button below: to open the Add Alarm box, as the screenshot Copyright 2016 Colasoft. All rights reserved. 29

37 1. Enter alarm name and description, and specify an alarm level. 2. Enter alarm category or select a previously configured alarm. 3. Choose an alarm type. Alarm type is related to the chosen node. When an application node is chosen, the alarm type is Application Monitor Alarm. When the Server root node is chosen, the alarm type is Any Server Alarm. When a specific server node is chosen, the alarm type is Single Server Alarm. When an IP client node is chosen, the alarm type is Single Client Alarm. When the all-client node is chosen, the alarm type is Any Client Alarm. When a segment client node is chosen, you can configure Segment Client Alarm if no NAT is configured for the segment client, and you can configure Segment Client Alarm and Single Client Alarm if NAT is configured for the segment client. 4. Enter the creator's name. 5. Choose a time bucket. By default, it is 1 second. 6. Specify the valid period. By default, the alarm takes effect all the time. You can click the option Specified time period to specify a time period to enable the alarm. The option Disable Alarm is for specifying a time period when the alarm will not take effect. 7. Configure trigger condition. You can click And/Or to add more than one trigger condition. 8. Set up alarm sending options. Before enable alarm sending, please make sure that SMTP server and syslog server setting are configured successfully. 9. Specify whether to save packets and the time period for saving packets. If this option is enabled, alarm related packets will be downloaded to UPM and saved at /data/var/packet. Copyright 2016 Colasoft. All rights reserved. 30

38 Method 2: via the button Click the button to open the Alarm Template box to choose an alarm template. Alarm template is previously added in Predefined Alarm Configuration. Method 3: via the button Select an alarm and click the button to copy the selected alarm to another node of same type. Alarm assessment Alarm assessment stimulates alarm trigger based on the configured alarm condition, to thereby help users configure alarm condition more accurately. There are two methods to perform alarm assessment: On the Add Alarm box, after configuring alarm, click the Assess button. On the alarm list, click the Alarm Assessment icon. The Alarm Assessment box shows as the screenshot below: Follow steps below to perform alarm assessment: 1. On the Alarm Assessment box, set a time range for assessing alarm, and choose a probe. 2. Enter the IP address. If the alarm is a single client alarm, single server alarm or segment alarm, there is no need to enter IP address or segment. 3. Make sure the alarm condition is OK, and you can add new alarm condition. 4. Click Assess to start assessment. The assessment results are displayed therebelow. 5. If the assessment results are not reasonable, you can modify alarm condition and assess Copyright 2016 Colasoft. All rights reserved. 31

39 them again. If the assessment results are reasonable, you can click the button Apply Parameters to apply the alarm conditions to the alarm. Alarm status You can select one or more alarms and click corresponding icon buttons to enable/disable and turn them on/off Edit business You can click the button to modify business configurations. When editing a business, you can click the business configuration step to skip to any step, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 32

40 4. System Configuration System Configuration is for helping you have good experience on using UPM. You can configure it before using UPM or configure it when some features are required User Configuration UPM Center provides user management feature. You can add new users and allocate different privileges for them. You can further view users' login time, login IP and login times. Please note that only administrator users can configure user settings. Go to the menu Configuration -> User Configuration to open the User Configuration page, as the screenshot below: Add a user Click the button to open the Add User box, as the screenshot below: Login Authentication Method: UPM Center provides two types of authentication methods: UPM and Radius. UPM authentication: when login UPM, UPM Center authenticates the login. For this method, it is required to set login password. Radius authentication: when login UPM, Radius server authenticates the login. For this method, it is required to configure Radius server information. For more related information, please refer to Radius Server Configuration. Copyright 2016 Colasoft. All rights reserved. 33

41 User role There are two types of user roles: administrator and user. Administrator has all the privileges. There are two types of users: users having configure privilege, and users not having configure privilege. Users having configure privilege have all privilege besides System Management and User Configuration. For users not having configure privilege, it is required to allocate business privilege and probe privilege for them. Business privilege There are four types of business privileges: Monitor, Analysis, Alarm and SLA Report. Monitor privilege: Business Centralized Monitor privilege, Business Group Performance Monitor privilege, Business Global Performance Monitor privilege Analysis privilege: Business Performance Analysis privilege, Business Index Analysis privilege, Business Multi-Segment Analysis privilege Alarm privilege: Business Alarm privilege SLA Report privilege: business SLA report privilege Probe privilege There are five types of probe privileges: Monitor, Analysis, Alarm, Report, and Download. Monitor privilege: Probe Traffic Monitor, Probe Index Monitor Analysis privilege: Probe Traffic Analysis Alarm privilege: Probe Traffic Alarm Report privilege: Probe Traffic Report Download privilege: Download Probe Packets When allocate probe privilege, you can allocate privileges based on probe or based on frontend. Based on probe means authorization for each probe. Based on frontend means authorization for all the network links on the frontend, including later added links. View user privilege You can click the button to open the View User Privilege page, which displays business and probe privileges for all normal users. Copyright 2016 Colasoft. All rights reserved. 34

42 4.2. Event Configuration The Event Configuration page is for managing the added events. Events are much like fault handling memo, recording fault handing details and related business, application and alarm information. Click the menu Configuration -> Event Configuration to open the Event Configuration page, as the screenshot below: Click the button to open the Add Event box, as the screenshot below: Enter the event related information and you will add an event Application Configuration Click the menu Configuration -> Application Configuration to open the Application Configuration page, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 35

43 Applications added here from Configuration -> Application Configuration are exactly the same to applications added via Intelligence -> Applications. The two pages will be synchronously updated when applications are added or modified. You can refer to Application Configuration for more related information. Furthermore, here UPM provides an application import function. You can click the button import applications that are added via the standard template. The standard template can be obtained on the Import box, as the screenshot below: to Other features on this Application Configuration page are exactly the same to those on Application management Probe Configuration Click the menu Configuration -> Probe Configuration to open the Probe Configuration page, as the screenshot below: Probe Configuration Probes added here from Configuration -> Probe Configuration are exactly the same to probes added on the Probe Configuration tab via Intelligence -> Network Paths. The two pages will be synchronously updated when probes are added or modified. You can refer to Probe Configuration for more related information. Copyright 2016 Colasoft. All rights reserved. 36

44 Aggregation Probe Configuration On the Probe Configuration page, click the Aggregation Probe Configuration tab to configure aggregation probe. Click the button to open the Add Aggregation Probe box, as the screenshot below: When adding an aggregation probe, it is required to allocate probe privilege for normal users, or else normal users cannot use the functions of the aggregation probe Network Segment Configuration Network segments added here from Configuration -> Network Segment Configuration are exactly the same to network segments added on the Network Segment Configuration tab via Intelligence -> Network Paths. The two pages will be synchronously updated when network segments are added or modified. You can refer to Network Segment Configuration for more related information Predefined Alarm Configuration Click the menu Configurations -> Predefined Alarm Configuration to open the Predefined Alarm Configuration page, as the screenshot below: UPM Center provides predefined alarm template feature. When defining a business, you can select predefined alarm template. By default, system provides six alarm types: Application Monitor Alarm, Single Server Alarm, Any Server Alarm, Segment Client Alarm, Any Client Alarm, and Single Client Alarm. For each alarm type, you can define more than one alarm template Add alarm template Follow the steps below to add an alarm template: 1. Click the alarm type to be added with an alarm template, and then click the button to Copyright 2016 Colasoft. All rights reserved. 37

45 open the Add Alarm Template box, as the screenshot below: 2. Enter the template name and description. 3. Choose the alarms that will be included in the alarm template. If no alarms are included, the alarm template will include no alarms. You can first add an alarm template and then add alarms to the alarm template. 4. Click OK to save the settings. You can also click an alarm template and then click the buttons and to edit and delete the template Add alarm Select the template to be added with alarms, and then click the button more information on how to add an alarm, please refer to Add alarm. to add an alarm. For 4.7. Business Alarm Configuration Click the menu Configurations -> Business Alarm Configuration to open the Business Alarm Configuration page, as the screenshot below: On the Business Alarm Configuration page, you can manage and configure all business alarms. There are three types of business alarms: Customized Alarm, Intelligent Alarm, and Asynchronous Duplex Long Connection Alarm Customized Alarm The Customized Alarm tab shows all businesses in a tree-like structure, meaning business > application >application/server/client. Each node lists the number of enabled alarms and total alarms. For example, Test Business (1/1) means the node name is Test Business, 1 alarm is defined for this node, and 1 alarm is enabled. Copyright 2016 Colasoft. All rights reserved. 38

46 The method to add a customized alarm is exactly same to Alarm Settings in Business Configuration Intelligent Alarm The Intelligent Alarm tab lists the nodes eligible to configure intelligent alarm, as the screenshot below: One node can configure only one intelligent alarm. If the node is already configured an intelligent alarm when configuring Business Logic Diagram in Business Configuration, here you can view and edit it Asynchronous Duplex Long Connection Alarm The Asynchronous Duplex Long Connection Alarm tab displays nodes of Asynchronous Duplex Long Connection application. As the screenshot below, one node can be configured with only one alarm. If the application is configured with alarm, you can view and edit it here Performance Alarm Configuration Click the menu Configuration -> Performance Alarm Configuration to open the Performance Alarm Configuration page, as the screenshot below: Performance Alarm Configuration is for categorizing business performance alarms and network performance alarms that are automatically evaluated by UPM Center. Only when performance alarms are categorized, their alarm logs can be sent to or syslog. Copyright 2016 Colasoft. All rights reserved. 39

47 To add performance alarm configuration, click the button Alarm Configuration box, as the screenshot below: to open the Add Performance There are business performance alarm and network performance alarm that are automatically evaluated: For business performance alarm, UPM Center evaluates business related parameters. When adding business performance alarm configuration, it is required to select business name in the Alarm Range box, and to select one or more alarm names. For network performance alarm, UPM Center evaluates the network paths in Network Performance Monitor. When adding network performance alarm configuration, it is required to select network path in the Alarm Range box, and to select one or more alarm names Probe Traffic Alarm Configuration Click the menu Configurations -> Probe Traffic Alarm Configuration to open the Probe Traffic Alarm Configuration page, as the screenshot below: The Probe List displays all frontends connected UPM Center and the probes for each frontend. Select a node and then click the button to add an alarm. Copyright 2016 Colasoft. All rights reserved. 40

48 If the selected node is a frontend, then the added alarm will be forwarded to all probes on that frontend; if the selected node is a probe, then the added alarm will be only forwarded to that probe. The Add Alarm box shows as the screenshot below: SMTP/Radius Configuration Click the menu Configuration -> SMTP/Radius Configuration to open the SMTP/Radius Configuration page, including SMTP Server Configuration tab and Radius Server Configuration tab, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 41

49 SMTP Server Configuration To successfully send alarm logs and SLA reports to inbox, you have to configure SMTP server settings correctly. The setting options are described as below: Name: The name of the sender. Address: The address of the sender. Server: The address of the server. Encryption: The encryption connection type of server. Port: The port number for the encryption connection. Username: The user name of the sender to logon the server. Password: The password for the sender address. After the configuration, you can click Test to check it Radius Server Configuration Radius server configuration provides the connection parameter settings between UPM and Radius authentication server. To enable Radius authentication method successfully, you have to configure Radius server configuration correctly. The Radius Server Configuration tab shows as the following screenshot: Copyright 2016 Colasoft. All rights reserved. 42

50 The setting options are described as below: Radius Server IP: IP address of Radius server. Retry Count: the number of connecting to the Radius server after the first connection to Radius server times out. Authentication Port: the authentication port of Radius server. Billing Port: the billing port of Radius server. Key: the share key between UPM and Radius server. Encryption Type: the encryption type for communicating key between UPM and Radius server. Time-out: timeout time of connecting to Radius server Send Configuration Click the menu Configuration -> Send Configuration to open the Send Configuration page, which includes Alarm Send Configuration tab, Syslog Send Configuration tab, and Scheduled SLA Report Configuration tab, as the screenshot below: Alarm Send Configuration The Alarm Send Configuration tab is for setting the recipient and send time interval. The alarm send rule is related to alarm category, you can set one send rule for multiple categories, and you can also set one send rule for one category. To add a send rule, click the button to open the Add Send Rule box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 43

51 Syslog Send Configuration The Syslog Send Configuration tab is for setting syslog server address, send method and syslog format. The syslog send rule is related to alarm category, you can set one send rule for multiple categories, and you can also set one send rule for one category. When setting syslog format, it is required to configure send format based on the alarm type (business alarm, network alarm, probe alarm) that the alarm category belongs to. If you don't configure send format for an alarm type, alarm logs of that alarm type will not be sent via syslog. To configure a syslog send rule, click the button screenshot below: to open the Add Send Rule box, as the Copyright 2016 Colasoft. All rights reserved. 44

52 Scheduled SLA Report Configuration The Scheduled SLA Report Configuration page displays as the screenshot below: The Scheduled SLA Report Configuration is for managing the scheduled send tasks configured for Business SLA Report. On the Scheduled SLA Report Configuration page, you can extend or delete scheduled tasks. Select one task and click the button extendable period is 12 months. to extend the task by one month. The maximum You can also delete a task by clicking the button. Copyright 2016 Colasoft. All rights reserved. 45

53 5. System Management System Management is for viewing and managing some basic information of UPM Center, including Audit Logs, Configurations Import/Export, System Information, and License Information Audit Logs Click the menu System Management -> Audit Logs to open the Audit Logs page. The Audit Logs page lists detailed operation log information. You can view the operation logs of a specific user in a specified time range, as the screenshot below: You can click the Export button to export the filtered logs Configurations Import/Export Click the menu Management -> Configurations Import/Export to open the Configurations Import/Export page. You can export UPM configurations to local machine and import the configurations to UPM again Configurations Import The Configurations Import page shows as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 46

54 To import configurations: 1. Select the file to be imported. For Google Chrome, you can drag the file to the box. 2. Click Start Uploading to upload it. 3. When the configurations conflict, you can choose to skip, overlap or cancel the import only file of UPM specific format (.csu) can be imported. Configurations Export The Configurations Export page shows as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 47

55 To export configurations, check the configurations to be exported and click the button Configurations Export to export configurations System Information Click the menu Management -> System Information to open the System Information page. On the System Information page, you can check the product information and server information, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 48

56 5.4. License Information Click the menu Management -> License Information to open the License Information page. On the License Information page, you can check the license information, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 49

57 When the license changes, you can click the button Reactivate to renew the license. For information on how to activate UPM, please refer to Colasoft UPM Installation Manual. Copyright 2016 Colasoft. All rights reserved. 50

58 6. Home Page Home Page is the default page that when you successfully login UPM Center via browser, as the screenshot below: Home Page shows you alarm, business monitor, network performance monitor, probe traffic monitor and application related information. You can click each box to jump to corresponding page Business Alarm The Business Alarm box shows the number of unhandled business alarms. You can click it to open the Business Alarm page to view the details Network Alarm The Network Alarm box shows the number of unhandled network alarms. You can click it to open the Network Performance Alarm page to view the details Probe Alarm The Probe Alarm box shows the number of unhandled probe alarms. You can click it to open the Probe Traffic Alarm page to view the details Network Performance Monitor The Network Performance Monitor box shows the path status of the default group. Green line indicates normal network communication, while path of other color indicates abnormal network communication. You can click a specific path to open the Path Analysis page of that path, and click the box to open the Network Performance Monitor page Applications The Applications box shows the number of defined applications and undefined applications. Copyright 2016 Colasoft. All rights reserved. 51

59 Defined application means the application that is added to UPM system. Undefined application means the applications to be added to UPM system. You can click the box to open the Applications page to perform Application Configuration. The Applications box is unavailable for normal users Probe Traffic Monitor The Probe Traffic Monitor page shows the utilization of all probes. You can click a probe to open the Probe Traffic Analysis page of that probe, or click the box to open the Probe Traffic Monitor page to view the utilization of all probes Business Monitor The Business Monitor box shows the overall business monitor status in recent 10 minutes. Green color indicates that the businesses are normal and other colors indicate that the businesses are abnormal. You can click a time slice to open the Business Monitor page. Copyright 2016 Colasoft. All rights reserved. 52

60 7. Business Monitor UPM Center provides three types of business monitor, Centralized Business Monitor, Business Group Performance Monitor, and Business Global Performance Monitor. Both Centralized Business Monitor and Business Group Performance Monitor include real-time monitor and history monitor. Real-time monitor: click the menu to open the real-time monitor page, for example, Monitor -> Centralized Business Monitor, Monitor -> Business Group Performance Monitor. History monitor: click the time slice on real-time monitor page to open the history monitor page, which displays the historical running status for each business Timeline On most business monitor and analysis pages, UPM Center uses timeline to display the status of monitored businesses, as the figure below: Timeline components The timeline consists of following components: Timeline: consisting of multiple time slices, with one time slice indicating one status. On realtime monitor page, you can click one time slice to open the corresponding history monitor page. On history monitor and analysis pages, you can click one time slice to filter data based on that time slice. The time slices can be shown in four colors: Green: no alarms are triggered. Red: there are severe alarms triggered. Orange: there are major alarms triggered. Yellow: there are minor alarms triggered. Time Range: the start and end time of the timeline. On history monitor and analysis pages, you can click it to choose any interested time range. Time Slice: the time range of a time slice. Selected Time: the time range that is currently selected. Auto-Refresh: only available for monitor and analysis pages. ON indicates to refresh every one minute while OFF indicates not refresh Time slice operation The following list describes the operations on time slices: : click to select the previous time slice. : click to select the next time slice. Copyright 2016 Colasoft. All rights reserved. 53

61 : click to select the previous time slice that has alarms triggered. : click to select the next time slice that has alarms triggered. : click to zoom in the selected time slice. For example, current time slice is 1 hour, clicking the zoom-in button will zoom in the 1-hour slice, show sixty 1-minutes slices, and auto-select the last 1-minute slice in that hour. : click to zoom out the selected time slice. For example, current time slice is 1 minute, clicking the zoom-out button will zoom out the 1-minute slice, show and auto-select a 1-hour slice that includes the 1 minute. : click to skip to previous time range. : click to skip to next time range Fullscreen monitor On some monitor pages, you can click the button to show current page in fullscreen mode, and click to exit fullscreen Centralized Business Monitor The Centralized Business Monitor page is for centrally monitoring all businesses. Click the menu Monitor -> Centralized Business Monitor to open the Centralized Business Monitor page, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 54

62 Group By default, there is only an "All Groups" displaying all businesses and business groups. You can click the button to add a new group, as the screenshot below: Enter a group name and group description, and then choose the businesses that are included in the group. One business can be added to more than one group. After adding a group, you can click the button Edit Group to modify group settings, and click the button Delete Group to delete the group. When a group is deleted, the businesses in that group will not be deleted Application Alternation The icon in front of business name indicates the application configuration is altered. You can click the icon to open the business logic diagram to update the application Business sorting Where there are a lot of businesses or business groups, you can sort them based on following fields: Name: sort businesses or business groups based on name, in an order figure->letter (A-Z). Alarms: sort based on alarm count of each business. Unhandled Alarms: sort based unhandled alarm count of each business. Alarm Level: sort based on alarm level, from sever to minor. Operational Level: sort based on operation level of each business. Customize: manually drag business or business group to sort. Copyright 2016 Colasoft. All rights reserved. 55

63 Business filter You can click the drop-down list Operational Level and select a level to only display businesses of that operational level. To cancel the filter, just click the drop-down list and select Operational Level (All) Monitor period You can click to display the businesses in a selected period, which could be latest 1 minute, latest 5 minutes, latest 15 minutes, latest 1 hour and today Business search Enter a keyword in the search box and it will display businesses only related to that keyword Business details The Centralized Business Monitor page displays the details of all businesses, including business name, operational level, unhandled alarms, triggered alarms, and business status in latest 30 minutes, as the screenshot below: Triggered alarms: the number of alarms of each severity triggered in monitor period. Unhandled alarms: the alarms that are not handled. When the number is greater than 999, it displays as Business status in latest 30 minutes: the status of business in latest 30 minutes, with one scale indicating 1 minute Alarm logs The right part of the Centralized Business Monitor page includes two tabs: Alarm Logs tab and Alarm Statistics tab. The Alarm Logs tab displays the latest 20 triggered alarms of currently selected business. Click alarm name, you will open the Business Alarm page to view alarm log details. Click the button Query, you will open the Business Index Analysis page. Copyright 2016 Colasoft. All rights reserved. 56

64 Click the button Analyze, you will open the Business Performance Analysis page. The Alarm Statistics tab displays alarm trigger information based on alarm name. Click one item, and you will view the detailed trigger information of that alarm Business Group Performance Monitor Business group performance monitor is for grouping business according to actual business running status. Click the menu Monitor -> Business Group Performance Monitor to open the Business Group Performance Monitor page, which shows no data if no group is added Group There is a Default Group on the Business Group Performance Monitor page, and you can click the button to add a new group, as the following screenshot: When the option Default Group is checked, the group will be displayed by default when you open the Business Group Performance Monitor page. Hovering the group name, you can edit or delete the group by clicking the corresponding buttons. Click the button to edit the group, and you can add business groups Business group and connecting business groups Business group Click the button screenshot below: to open the Add Business Group box, as the Copyright 2016 Colasoft. All rights reserved. 57

65 Enter group name and choose the businesses to be included, and then click OK. The added business group shows as the following screenshot: Connecting business groups You can click the connectors of each business group one by one to connect the business groups to display their relationship. Before connecting, you can set the connector shape and arrow direction. After connecting the business groups, click the button Save to successfully define a business group view, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 58

66 Business group status monitor Application alternation The icon in front of business name indicates the application configuration is altered. You can click the icon to open the business logic diagram to update the application. Business status monitor Business group displays the performance evaluation status in latest 10 minutes, including application status, host status, and network status, as the following screenshot: One little box indicates 1 time slice, which is 1 minute. The time slices can be shown in four colors: Green: no alarms are triggered. Red: there are severe alarms triggered. Orange: there are major alarms triggered. Yellow: there are minor alarms triggered. If the performance evaluation is not enabled for a node when configuring business, then the status of that node will not affect the business status evaluation result. Click a time slice, and clicking corresponding button will help you open the Business Performance Analysis page or the Business Index Analysis page. Copyright 2016 Colasoft. All rights reserved. 59

67 Alarm logs The bottom right part of the Business Group Performance Monitor page displays the top 50 alarm logs of the high severity. You can click an alarm log to open the Business Alarm page Business Global Performance Monitor Business Global Performance Monitor displays all business nodes' status and alarm information. Click the menu Monitor -> Business Global Performance Monitor to open the Business Global Performance Monitor page, as the screenshot below: Node explanation The Business Global Performance Monitor includes application node and host node: : Application node. : Unmerged host node. : Merged host node. For global performance monitor, UPM system automatically merges host nodes of same rules Relationship diagram operation Hover When hovering over a node, a box shows up to display the performance evaluation status of the application that the node belongs to. If the node belongs to more than one application, then it displays performance evaluation status of those applications, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 60

68 It displays the performance evaluation status in latest 10 minutes, including application status, host status, and network status, as the screenshot above. One little box indicates 1 time slice, which is 1 minute. The time slices can be shown in four colors: Green: no alarms are triggered. Red: there are severe alarms triggered. Orange: there are major alarms triggered. Yellow: there are minor alarms triggered. If the performance evaluation is not enabled for a node when configuring business, then the status of that node will not affect the business status evaluation result. Click a time slice, and clicking corresponding button will help you open the Business Performance Analysis page or the Business Index Analysis page. Click node Clicking a node will display application relationship related to the node and grey the unrelated components. You can click the blank area to show the entire diagram. Drag node You can drag a node to any place. Right-click node Right-clicking a node will display the business lists that the node belongs to. Clicking the business name will open the Business Performance Analysis page of that business. Right-click connector Right-clicking the connecting line between two nodes will bring up a context menu, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 61

69 You can download packets, or open the Multi-Segment Analysis page and the Business Index Analysis page. Click alarm number Select an alarm and then click it, you can view the alarm count of that application for each business, as the screenshot below: Alarm logs The bottom right part of the Business Global Performance Monitor page displays the top 50 alarm logs of the high severity. You can click an alarm log to open the Business Alarm page. Copyright 2016 Colasoft. All rights reserved. 62

70 8. Network Performance Monitor Network Performance Monitor is a customized monitor view. You can customize multiple network nodes and network paths among the nodes to thereby monitor the communication among the nodes in real-time. Click the menu Monitor -> Network Performance Monitor to open the Network Performance Monitor page, which shows no data if no nodes or paths are defined Group There is a Default Group on the Network Performance Monitor page, and you can click the button to add a new group, as the following screenshot: When the option Default Group is checked, the group will be displayed by default when you open the Business Group Performance Monitor page. Hovering the group name, you can edit or delete the group by clicking the corresponding buttons Add node and path Click the button to enter the edit mode, in which you can add nodes and add network paths Add node Click the button screenshot below: and then click any place on the diagram to open the Add Node box, as the Copyright 2016 Colasoft. All rights reserved. 63

71 When adding a node, you can add one or multiple IP addresses as one node, or add one or multiple network segments as one node. If the added node is IP address, the node must be on the Path Diagram on Network Path Configuration. If the added node is segment, UPM system automatically lists all network segments on Network Path Configuration. You can choose one or more segments. When a node is successfully added, you can drag it to any desired place, as the screenshot below: Add network path Click the nodes to be added with network path, and UPM will automatically display all the path relationships between the nodes, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 64

72 Select a network path and click OK to successfully add a network path. After adding a network path, you can right-click to edit or delete it. When monitoring network performance, UPM system automatically identifies the path as uplink path and downlink path Network Performance Monitor After adding nodes and network paths, the Network Performance Monitor page shows as the following screenshot: Monitor settings Switch background You can click the button image or upload new image. to change a background image. You can choose a default background Copyright 2016 Colasoft. All rights reserved. 65

73 Application filter You can click the button to open the Application Filter box. When selecting application filters, UPM system evaluates the network path performance based on selected applications. Network path filter Click the button to open the Network Path Filter box. When selecting network path filters, UPM system only monitors the selected network paths. When monitoring network performance, you can click a network path to do a display filter. Copyright 2016 Colasoft. All rights reserved. 66

74 Network status monitor After adding network nodes and network paths, UPM system automatically evaluates each network path status. The evaluation results are listed as below: X: network interruption Grey: no traffic Green: there is traffic and the network performance is good. Red: there is traffic and the network performance is bad. Orange: there is traffic and the network performance is not good. You can select one network path and right-click to open the Path Analysis page Probe utilization The Probe Utilization section displays the probe utilization of monitored paths. You can click one probe to open the Probe Traffic Analysis page. One bubble indicates one probe. Bubble color indicates probe utilization status: Green: the link is very idle. Yellow: the link is idle. Orange: the link is not that idle. Red: the link is very congested. Bubble size indicates the traffic volume of the probe Path Analysis The Path Analysis section shows network path status in latest 10 minutes, with one time slice indicating one minute. Clicking a time slice will open the Path Analysis page of that path, as the screenshot below: The Path Analysis page includes following information: Copyright 2016 Colasoft. All rights reserved. 67

75 Path details: probes and network devices on the path. Probe data: probe traffic, packets and other communication data. Alarm logs: the alarm logs triggered when UPM evaluates network performance of that path Alarm log The Alarm Log section displays the alarm logs triggered for each monitored path. You can click an alarm log to open the Network Performance Alarm page. Copyright 2016 Colasoft. All rights reserved. 68

76 9. Probe Monitor UPM Center provides two ways of probe monitor: Probe Traffic Monitor and Probe Index Monitor Probe Traffic Monitor Click the menu Monitor -> Probe Traffic Monitor to open the Probe Traffic Monitor page, which shows the traffic data for each probe in real-time, as the screenshot below: Probe group There is a Default Group to display the traffic data of all probes. You can click the button to add a new group, as the screenshot below: Enter group name and choose the probes to be included. One probe can be added to more than one group. Copyright 2016 Colasoft. All rights reserved. 69

77 After adding a group, you can click the button to edit the group or click the button to delete the group. When a group is deleted, the probes will not be affected Monitor view settings Sort probes Name: sort based on probe name, in an order figure->letter (A-Z). Alarms: sort based on alarm count of each probe. Operational Level: sort based on operation level of each business. Customize: manually drag probes to sort. Time scale Choose a desired time scale to view probe traffic. It could be 1-second scale, 1-minute scale, 1-hour scale, and 1-day scale. Chart display You can choose the method display the charts, one row containing one chart or one row containing two charts. Chart type You can choose a desired chart type to display. It could be area chart, stack chart, bar chart, and line chart Monitor information On the probe traffic trend charts, the index types include packets, utilization, traffic, packet distribution, alarms and TCP packets. You can click the drop-down list to choose a desired index. Clicking the button will open the Probe Traffic Analysis page of that probe. Clicking the button will launch nchronos Console to view the detailed communication of that probe Probe Index Monitor Click the menu Monitor -> Probe Index Monitor to open the Probe Index Monitor page, on which you can customize the monitor parameters for each probe. If no monitor parameters are defined, the page will display no data Group There is a Default Group to display the traffic data of all probes. You can click the button to add a new group, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 70

78 When the option Default Group is checked, the group will be displayed by default when you open the Probe Index Monitor page. After adding a group, you can click the button to edit the group or click the button to delete the group. When a group is deleted, the probes will not be affected Add Chart Click the button to open the Add Chart box, as the screenshot below: UPM system provides following index types: Index Trend Chart, Top Internal Hosts, Top External Hosts, Top Applications, Top Segments, Top IP Conversations, and Top Segment-Betweens. Index items change along with index type. When it is Index Trend Chart, you can choose multiple indexes and multiple probes, so that you can compare same parameters from different probes or compare different parameters of one probe. When it is top-kind chart, you can choose one index item and one probe to monitor. Copyright 2016 Colasoft. All rights reserved. 71

79 After adding monitor indexes, the page shows as the following screenshot: Chart operation The following list describes corresponding chart operations: : launch nchronos Console to view the detailed communication of that probe. For top-kind charts, you can also click the chart to launch nchronos Console. : open the Download Packets page. : modify chart. : zoom in the chart. : zoom out the chart. : delete the chart. Copyright 2016 Colasoft. All rights reserved. 72

80 10. Business Analysis UPM Center provides Business Performance Analysis and Business Index Analysis Business Performance Analysis Click the menu Analysis -> Business Performance Analysis to open the Business Performance analysis page, as the screenshot below: By default, the page displays the performance analysis results of the first business in alphabetical order. You can click the drop-down list on the top left to choose an interested business Business logic diagram analysis Application status The left section of the Business Performance Analysis page displays the status of all applications included by the selected business, in two ways: Application Performance Status and Application Critical Indexes. You can click the button to open the Business Index Analysis page, or click the button to open the Download Packets page. Performance status The Application Performance Status tab displays the performance evaluation status of each application in latest 10 minutes, including application status, host status, and network status, as the following screenshot: Copyright 2016 Colasoft. All rights reserved. 73

81 One little box indicates 1 time slice, which is 1 minute. The time slices can be shown in four colors: Green: no alarms are triggered. Red: there are severe alarms triggered. Orange: there are major alarms triggered. Yellow: there are minor alarms triggered. If the performance evaluation is not enabled for a node when configuring business, then the status of that node will not affect the business status evaluation result. Application Critical Indexes The Application Critical Indexes tab displays the indexes of each application in the selected time slice, as the screenshot below: You can click the button Settings to choose desired indexes. Business logic diagram The business logic diagram displays the running status of the business in the selected time slice. The network path and nodes both display the number of triggered alarms, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 74

82 You can drag the view to change the position of the logic diagram. You can also zoom the view by rolling mouse wheel. Click the button Full-view to display all nodes on the logic diagram. When the logic diagram contains too many nodes, UPM system will zoom the nodes automatically. Click the button Center-view to display the logic diagram in the center of the view. View node information On the logic diagram, clicking a node will open a Node Information box. For client nodes, the box shows as the screenshot below: For server nodes, the box shows as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 75

83 On the Node Information box, you can click the alarm number to open the Business Alarm page. Transaction path display Clicking the drop-down list on the top-left corner of the view, you can choose one or more transactions paths to display it or them on the logic diagram. By viewing the business transaction path, you can identify if the transaction is affected by the fault node. Network path operation Right-clicking the network path on the logic diagram will bring up a context menu, as the screenshot below: You can download packets, or open the Multi-Segment Analysis page and the Business Index Analysis page. Alarm logs The bottom right part of the Business Performance Analysis page displays the alarm logs of the business. You can click an alarm log to open the Business Alarm page Business index analysis On the Business Performance Analysis page, click the button index analysis view, as the screenshot below: to add a business Copyright 2016 Colasoft. All rights reserved. 76

84 Add chart On business index analysis view, click the button screenshot below: to open the Add Chart box, as the Choose the application, probe and index items. UPM system provides following index types: Top Host Performance Monitor, Application Client Performance Monitor, Application Server Performance Monitor, Alarm Monitor, Top Client Performance Monitor, and Application Performance Monitor. Index items change along with index type. When it is top-kind index type, you can choose one index item and one probe to monitor. When it is other index type than top-kind index, you can choose multiple indexes and multiple probes to monitor. After adding monitor indexes, the page shows as the following screenshot: Copyright 2016 Colasoft. All rights reserved. 77

85 Chart operation The following list describes corresponding chart operations: : open the Download Packets page. : modify chart. : zoom in the chart. : zoom out the chart. : delete the chart Generate SLA report UPM Center provides SLA report, which displays business related data, including running time, fault time, faultless time, fault rate and faultlessness rate. On the top right section of the Business Performance Analysis page, click the button Generate SLA Report to open the SLA Report Settings box, as the screenshot below: Click the Time textbox to choose a desired time range and then click OK to generate an SLA report. For more related details, please refer to Business SLA Report History monitor On the top right section of the Business Performance Analysis page, click the button History Monitor to open the History Monitor page, on which you can view the historical running status of all businesses. Copyright 2016 Colasoft. All rights reserved. 78

86 Multi-segment analysis Multi-segment analysis is for comparing and analyzing the data of one application from different probes to identify the segment loss or retransmission issues and the time delay issue. On the Business Performance Analysis page, click a path and then click Multi-Segment Analysis to open the Multi-Segment Analysis page, as the screenshot below: Analysis settings Before multi-segment analysis, you need to choose an application, and a client. One client corresponds to one application path. When choosing a client, UPM system automatically chooses the corresponding path. UPM system provides around 90 analysis indexes. You can group the analysis indexes. Click the button Index Group to open the Index Group box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 79

87 On the Index Group box, you can set the index deviation range between two probes. When the actual deviation value is greater than the threshold, indexes will be highlighted. Application communication path Application communication path displays the network devices between the client and the server. The network devices could be probes, switches, routers, firewalls, etc., and should be added when defining a business. Index compare Multi-segment analysis displays index values from different probes. By comparing the index values, you may find where the packet loss or time delay happens. You can click the drop-down list to display the indexes of an index group You can click the button to set deviation value for a specific index. You can click the button to open the Business Index Analysis page. You can click the button to reset the selection. You can click the button to open the Download Packets page. You can click the button to collapse the index compare section. Index trend chart When selecting an index on the list, a trend chart of that index is generated automatically. On the trend chart, if only one index is chosen, then you can compare index values on different probes; if more than one index is chosen, you can the indexes at one probe. You can save the trend chart as PNG, JPG, PDF, SVG or CSV format Business Index Analysis Click the menu Analysis -> Business Index Analysis to open the Business Index Analysis page, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 80

88 Business index analysis is for querying and displaying application monitor indexes, application server indexes and application client indexes. By default, the page displays the index analysis results of the first business in alphabetical order. You can click the drop-down list on the top left to choose an interested business Index group UPM system provides around 90 indexes, which are included in various index groups, as the table below: Index Group Traffic statistics Transmission performance statistics TCP statistics Index Item Packets, Uplink Packets, Downlink Packets, Bytes, Uplink Bytes, Downlink Bytes, Bps, pps, Alarms Packets (Payload), Uplink Packets (Payload), Downlink Packets (Payload), Bytes (Payload), Uplink Bytes (Payload), Downlink Bytes (Payload), Segment Loss Rate, Uplink Segment Loss Rate, Downlink Segment Loss Rate, Retransmission Rate, Uplink Retransmission Rate, Downlink Retransmission Rate, Transmission Efficiency, Uplink Transmission Efficiency, Downlink Transmission Efficiency TCP SYN Packets, TCP SYNACK Packets, TCP RST Packets, Uplink TCP RST Packets, Downlink TCP RST Packets, TCP Retransmission Packets, Uplink TCP Retransmission Packets, Downlink TCP Retransmission Packets, TCP Segment Loss Packets, Uplink TCP Segment Loss Packets, Downlink TCP Segment Loss Packets, TCP DUP ACK Packets, Uplink TCP DUP ACK Packets, Downlink TCP DUP ACK Packets, TCP FIN Packets, Uplink TCP FIN Packets, Downlink TCP FIN Packets, TCP Transactions, TCP Requests, TCP Responses, Client TCP Zero Window Count, Average Client TCP Window Size, Server TCP Zero Window Count, Average Server TCP Window Size, Copyright 2016 Colasoft. All rights reserved. 81

89 Index Group Index Item Reset Connection Requests, Unresponsive Connection Requests, Average Server ACK Delay Conversation statistics Active conversations, created conversations, closed conversations Three-way handshake statistics 3-way Handshake Avg. Client RTT, 3-way Handshake Average RTT, 3-way Handshake Avg. Server RTT, Avg. 3-way Handshake Time, 3-way Handshake Times, 3-way Handshake Max. Client RTT, 3-way Handshake Max. Server RTT, Max. 3- way Handshake Time, 3-way Handshake Min. Client RTT, 3- way Handshake Min. Server RTT, Min. 3-way Handshake Time, 3-way Handshake Total RTT, 3-way Handshake Total Client RTT, 3-way Handshake Total Server RTT, Total Threeway Handshake Time Network time delay statistics Maximum Response Time, Minimum Response Time, Avg. Response Time, Maximum Client ACK Delay, Minimum Client ACK Delay, Average Client ACK Delay, Maximum Server ACK Delay, Minimum Server ACK Delay, Average Server ACK Delay, Total Client Idle Time, Maximum Client Idle Time, Minimum Client Idle Time, Average Client Idle Time Transaction response statistics Good TCP Transactions, Normal TCP Transactions, Bad TCP Transactions, TCP Transaction Response Timeout Count, Good TCP Transaction Proportion, TCP Transaction Response Timeout Proportion, Response Rate Click the button Index Group to open the Index Group box to modify index group, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 82

90 Add group On the Index Group box, click the button Add Group to add a new group. Edit group On the Index Group box, select a group, select an index item, and then click the button the index to the selected group. One index can be added to more than one index group. to add To remove an index from a group, select the index and then click the button to remove it. Show/hide group Clicking the button list. in front of each group name will show the index group on the index query Clicking the button will hide the index group from the index query list. Reset group On the Index Group box, click the button Reset Group to delete all customized groups and reset it back to the default status Index query Index query results are displayed in list or in tree-like. You can click the buttons and to make a switch. By default, the results are displayed in tree-like, as the screenshot below: When the results are displayed in list, performance parameters of server and client related to that business are displayed, and are displayed based on probe. You can further sort the performance parameters, as the screenshot below: On the query list, you can choose nodes of same type to compare the parameters. An index chart is generated to display the compare results Index chart UPM system provides default chart group, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 83

91 Add chart group One chart group includes one or more charts. You can click the button Add Chart Group to open the Add Chart Group box, as the screenshot below: If the option Set as default chart group is checked, the chart group will display next time when you open this page. Reset chart group Click the button Reset Chart Group will delete all user-defined chart groups and only the default chart group is kept. Add chart Click the button Add Chart to open the Add Chart box to add a chart to current chart group, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 84

92 Chart operation The following list describes corresponding chart operations: : launch nchronos Console. : open the Download Packets page. : move the time axis of chart forwards by 30 seconds/30 minutes/ 12 hours. The moved time range depends on the time range that is currently displayed. : move the time axis of chart backwards by 30 seconds/30 minutes/ 12 hours. The moved time range depends on the time range that is currently displayed. : modify the index in the chart. : zoom in the chart. : zoom out the chart. : delete the chart. : Save the chart in PNG, JPG, PDF, SVG and CSV format. Query data of specified time range By deafult, you can query data of any time range, and the button is turned off. If you turn on the button and specify the working hours and working days, then only data of that specified time range can be queried. Copyright 2016 Colasoft. All rights reserved. 85

93 11. Probe Traffic Analysis UPM Center provides probe traffic analysis, baseline analysis, comparison analysis and trend analysis Group By default, there are two groups: All Probes and Default Group. If there are other groups added on Probe Traffic Monitor, they will also be displayed here. The All Probes tab displays all probes Traffic Analysis The Traffic Analysis tab includes a trend chart pane, a Top Hosts pane and a Top Applications pane, as the screenshot below: On the trend chart pane, you can click the drop-down list Traffic to select an index to display on the trend chart. And, you can click the drop-down list Area Chart to select a desired chart type to display the trend chart. The Top Hosts pane lists the top 10 hosts based on traffic. The Top Applications pane lists the top 10 applications based on traffic. On the Top Hosts and Top Applications panes, you can click the button to launch nchronos Console to perform further analysis, and you can click the button page. to open the Download Packets Baseline Analysis UPM Center is capable of generating baseline based on historical data. When the trend chart data is Traffic, Packets, Utilization, IP Broadcast Traffic, IP Multicast Traffic, you can check the Baseline box to perform baseline analysis. The trend chart displays actual data and baseline data, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 86

94 UPM Center must run for at least one week to generate baseline Comparison Analysis On the Comparison Analysis tab, you can compare the index value of different time. Follow steps below to perform comparison analysis: 1. Select a base time range. 2. Select a comparison time range, which should be same on the time length. 3. Select an index type to be compared, which could be Total Traffic, Inbound Bytes, Outbound Bytes, Total Packets, Inbound Packets, Outbound Packets, Total Utilization, Inbound Utilization, Outbound Utilization, IP Broadcast Traffic, and IP Multicast Traffic. 4. Select a time scale. 5. Click Analyze to view the analysis results, as the screenshot below: Trend Analysis Trend analysis forecasts the probe traffic trend in future time range based on selected index. Follow steps below to perform trend analysis: 1. Select an index type, which could be Total Traffic, Inbound Bytes, Outbound Bytes, Total Packets, Inbound Packets, Outbound Packets, IP Broadcast Traffic, and IP Multicast Traffic. 2. Select a time slice. 3. Select a day. 4. Set hour and minute if the selected time slice is hour or minute. 5. Specify history data range that the forecast is based on. 6. Enter the trend time length. 7. Click Analyze to view result, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 87

95 Copyright 2016 Colasoft. All rights reserved. 88

96 12. Alarm The Alarm page is for displaying all alarm logs, including Business Alarm, Probe Traffic Alarm, and Network Performance Alarm Business Alarm Click the menu Alarm -> Business Alarm to open the Business Alarm page, which shows all triggered business alarm logs, as the screenshot below: Specify query time Click the time box to specify a time range to show alarm logs of that time range Business Tree Structure The Business Tree Structure shows all businesses and included applications in a tree-like structure, meaning All businesses > business > application. Each node lists the number of unhandled alarms and total triggered alarms. For example, Test Business (15/100) means the node name is Test Business, 15 alarms are not handled, and 100 alarms are triggered in total. Clicking a node, the alarm statistical chart and alarm list on the right will update for the selected node Alarm statistical chart Alarm statistical chart includes two parts: Alarm Level Distribution chart and Alarm Statistics chart, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 89

97 Alarm Level Distribution chart The Alarm Level Distribution chart is generated based on alarm status and alarm level. The outer doughnut indicates alarm status distribution chart while the inner doughnut indicates alarm level distribution chart. Clicking a legend on outer doughnut, the data on inner doughnut, on Alarm Statistics chart and on alarm list will be filtered based on the clicked legend. Clicking a legend on inner doughnut, the data on Alarm Statistics chart and on alarm list will be filtered based on the clicked legend. Alarm Statistics chart The Alarm Statistics chart displays the number of each triggered alarm. Clicking a legend, the alarm list data will be filtered based on the clicked legend Alarm list Alarm list lists the details of triggered alarms of the selected node, as the following screenshot: You can filter out the alarm logs on the list by probe, alarm handle status, alarm level and keyword. Just click the corresponding drop-down list to filter. Handle alarm To handle alarm, click the button Handle to open the Handle Alarm box, as the screenshot below: Copyright 2016 Colasoft. All rights reserved. 90

98 Enter the name of handler and handling description. You can also check more than one alarm log and then click the button Handle to handle the selected alarms. And, you can click the button Handle All Alarms to handle alarms on the list. Save alarm Click the button Export to save all alarm logs on the list in a.csv format. Disable alarm Click the button Disable Alarm to open the alarm disable management page, as the following screenshot: The alarm disable management page displays customized business alarms that are triggered for the selected business. Check an alarm and then click the button below: to open the Disable Alarm box, as the screenshot When an alarm is disabled, it cannot be triggered. To can the disable operation, click the button to cancel the disable operation. Copyright 2016 Colasoft. All rights reserved. 91

99 When an alarm status is changed, it will be automatically updated to Configuration -> Business Alarm Configuration. Shortcuts The alarm list provides following shortcuts: : open the Business Index Analysis page. : launches nchronos Console. : open the Download Packets page. : Download packet automatically. This shortcut is available only when the option Auto- Save Packets is checked for defining an alarm Probe Traffic Alarm Click the menu Alarm -> Probe Traffic Alarm to open the Probe Traffic Alarm page, which shows all triggered probe traffic alarm logs, as the screenshot below: Specify query time Click the time box to specify a time range to show alarm logs of that time range Probe List The Probe List shows all frontends and included probes in a tree-like structure, meaning Frontend List > frontend > probe. Each node lists the number of unhandled alarms and total triggered alarms. For example, 141server (15/100) means the node name is 141server, 15 alarms are not handled, and 100 alarms are triggered in total. Copyright 2016 Colasoft. All rights reserved. 92

100 Clicking a node, the alarm statistical chart and alarm list on the right will update for the selected node Alarm statistical chart The alarm statistical chart has same operations with the Alarm statistical chart in Business Alarm Alarm list Alarm list lists the details of triggered alarms of the selected node, as the following screenshot: You can filter out the alarm logs on the list by probe, alarm handle status, alarm level and keyword. Just click the corresponding drop-down list to filter. Handle alarm To handle alarm, click the button Handle to open the Handle Alarm box, as the screenshot below: Enter the name of handler and handling description. You can also check more than one alarm log and then click the button Handle to handle the selected alarms. And, you can click the button Handle All Alarms to handle alarms on the list. Save alarm Click the button Export to save all alarm logs on the list in a.csv format. Copyright 2016 Colasoft. All rights reserved. 93

101 Shortcuts The alarm list provides following shortcuts: : launches nchronos Console. : open the Download Packets page. : Download packet automatically. This shortcut is available only when the option Auto- Save Packets is checked for defining an alarm Network Performance Alarm Click the menu Alarm -> Network Performance Alarm to open the Network Performance Alarm page, which shows all triggered network performance alarm logs, as the screenshot below: Network performance alarm is for monitoring the alarms triggered by network paths Specify query time Click the time box to specify a time range to show alarm logs of that time range Group List The Group List shows all groups and included paths in a tree-like structure, meaning group > path. Each node lists the number of unhandled alarms and total triggered alarms. For example, group3 (15/100) means the node name is group3, 15 alarms are not handled, and 100 alarms are triggered in total. Clicking a node, the alarm statistical chart and alarm list on the right will update for the selected node Alarm statistical chart The alarm statistical chart has same operations with the Alarm statistical chart in Business Alarm. Copyright 2016 Colasoft. All rights reserved. 94

102 Alarm list Alarm list lists the details of triggered alarms of the selected node. You can filter out the alarm logs on the list by probe, alarm handle status, alarm level and keyword. Just click the corresponding drop-down list to filter. Handle alarm To handle alarm, click the button Handle to open the Handle Alarm box, as the screenshot below: Enter the name of handler and handling description. You can also check more than one alarm log and then click the button Handle to handle the selected alarms. And, you can click the button Handle All Alarms to handle alarms on the list. Save alarm Click the button Export to save all alarm logs on the list in a.csv format. Shortcuts On the alarm list, you can click to launch nchronos Console. nchronos is capable of capturing all network packets without packet loss, and storing all data to disk. Copyright 2016 Colasoft. All rights reserved. 95

103 13. Report UPM provides two kinds of report, Business SLA Report and Probe Traffic Report Business SLA Report On the Business SLA Report page, you can generate Business SLA Report for all the businesses in the system. Click the menu Report -> Business SLA Report", to open the Business SLA Report page, as the screenshot below: Business List The Business List displays all businesses that you have configured. After clicking a business, the system will generate the SLA report for this business on the right section. Copyright 2016 Colasoft. All rights reserved. 96

104 SLA report By default, the report time is that day, from 00:00 to the time when the report is generated. You can click on the time range textbox to modify it. A business SLA report contains following information: Business name and the application count of the business. Total running duration, fault time, faultless time, fault rate, and faultlessness rate of the business. Total running duration, fault time, faultless time, fault rate, and faultlessness rate of each application. You can: Click the button to open the SLA report printing preview page. Click the button to save the SLA report to local disk as a PDF file. Click the button to open the SLA Report Send Configuration box to send the SLA report to inbox, as the screenshot below: Enter the subject and recipients' address for the report , and then set the send frequency, as described below: One time: the option means the report will be sent right now. Daily: the option means the report will be sent once a day. Weekly: the option means the report will be sent once a week. You can set which day of the week to send the report. Copyright 2016 Colasoft. All rights reserved. 97

105 Monthly: the option means the report will be sent once a month. You can set which day of the month to send the report. For daily/weekly/monthly report, you can set the validity of the report. for daily/weekly/monthly report, if you want to extend the validity, please refer to Scheduled SLA Report Configuration for details Probe Traffic Report On the Probe Traffic Report page, you can generate Probe Traffic Report for all probes in the system. Click the menu Report -> Probe Traffic Report, to enter Probe Traffic Report page, as the following screenshot: Probe List The Probe List displays all the probes in the current system. Clicking a probe will automatically generate corresponding probe traffic report Traffic report By default, the report time is that day, from 00:00 to the time when the report is generated. You can click on the time range textbox to modify it. A traffic report includes trend chart, traffic, packet size distribution, packet type distribution, TCP packets, IP traffic, top IPs, and top applications information. You can: Click the button Print Report to open the traffic report printing preview page. Click the button Download Report to save the report to local disk as an xls file. Copyright 2016 Colasoft. All rights reserved. 98

106 14. Download UPM Center provides packet retrieval and packet download functions Retrieve Packets Retrieve Packets allows user to use the applications and IP address as the entry, to retrieve and download the packet. Click the menu Download ->Retrieve Packets to open the Retrieve Packets page, as the screenshot below: You can retrieve packets based on application and IP address and download the retrieved packets Retrieval settings Before retrieving packets, you can set retrieval time and probe range. Click the time textbox to choose the desired time period. By default, it is the latest 1 minute. To set probe range, click the button to choose one or more probes Retrieve based on application Retrieval step UPM Center supports retrieving packets based on application in four-level, application > IP address > IP conversation > TCP/UDP conversation, as following steps: 1. In the search box, input application name, and then click Application. UPM system displays related applications. If you don't input application name, all applications will be listed. 2. On the application list, check one or more applications, and in the search box input keyword, and then click the button IP Address, IP Conversation, TCP Conversation, or UDP Conversation. 3. If retrieve packets based on IP address, you can further retrieve IP/TCP/UDP conversation based on the chosen IP address. 4. If retrieve packets based on IP conversation, you can further retrieve TCP/UDP conversation based on chosen IP conversation. 1. UPM only supports exact match. If you input keyword in the search textbox, you need to input the whole keyword. 2. For retrieval, UPM system only displays the top 12 records based on total traffic of each probe. Copyright 2016 Colasoft. All rights reserved. 99

107 For each retrieval result, you can click the button analysis. to launch nchronos Console for further Download packets For retrieval results, you can click the button or to open the Download Packets box. UPM system automatically applies the retrieval time range, probe, application, IP or conversation conditions to the box, as the following screenshot: Copyright 2016 Colasoft. All rights reserved. 100

Network Performance Analysis System. White Paper

Network Performance Analysis System. White Paper Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Network Performance Analysis System. User Guide

Network Performance Analysis System. User Guide Network Performance Analysis System User Guide Copyrig ht Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be

More information

Network Performance Analysis Solution. User Guide

Network Performance Analysis Solution. User Guide Network Performance Analysis Solution User Guide Copyr ight Copyright 2017 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Peplink SD Switch User Manual. Published on October 25th, 2018

Peplink SD Switch User Manual. Published on October 25th, 2018 Peplink SD Switch User Manual Published on October 25th, 2018 1 Table of Contents Switch Layout 4 Specifications 5 Hardware Overview 6 Quick Start Functions 7 Reset Switch 7 Connect Ethernet 7 Connect

More information

HPE Intelligent Management Center v7.3

HPE Intelligent Management Center v7.3 HPE Intelligent Management Center v7.3 Service Operation Manager Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Layout and display. STILOG IST, all rights reserved

Layout and display. STILOG IST, all rights reserved 2 Table of Contents I. Main Window... 1 1. DEFINITION... 1 2. LIST OF WINDOW ELEMENTS... 1 Quick Access Bar... 1 Menu Bar... 1 Windows... 2 Status bar... 2 Pop-up menu... 4 II. Menu Bar... 5 1. DEFINITION...

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

User Manual. (Professional Edition)

User Manual. (Professional Edition) User Manual (Professional Edition) Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted

More information

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help, please contact Hangzhou

More information

SMS Reminder Settings Setting Up Reminders in Demographics Custom Text Reminders... 38

SMS Reminder Settings Setting Up Reminders in Demographics Custom Text Reminders... 38 Table of Contents Activating Patient Portal... 1 Patient Portal... 3 Premium Patient Portal Admin Function... 3 Set Up... 3 How to Make Changes to the Portal Landing Page... 5 Premium Patient Portal Features...

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

This section contains context-sensitive Online Help content for the Web Client > Monitor tab.

This section contains context-sensitive Online Help content for the Web Client > Monitor tab. This section contains context-sensitive Online Help content for the Web Client > tab. Viewing Switch CPU Information, page 2 Viewing Switch Memory Information, page 2 Viewing Switch Traffic and Errors

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

ivms-4200 Access Control Client User Manual UD00895N

ivms-4200 Access Control Client User Manual UD00895N ivms-4200 Access Control Client User Manual UD00895N User Manual About this Manual This Manual is applicable to ivms-4200 Access Control Client. The Manual includes instructions for using and managing

More information

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide Abstract This guide contains basic information for network administrators, engineers, and operators who use the Branch

More information

HP Intelligent Management Center Remote Site Manager

HP Intelligent Management Center Remote Site Manager HP Intelligent Management Center Remote Site Manager Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators who manage the IMC Remote

More information

Qualtrics Survey Software

Qualtrics Survey Software Qualtrics Survey Software GETTING STARTED WITH QUALTRICS Qualtrics Survey Software 0 Contents Qualtrics Survey Software... 2 Welcome to Qualtrics!... 2 Getting Started... 2 Creating a New Survey... 5 Homepage

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Core Extensions Module: NetFlow Plugin Version 1.2 Table of Contents About NetFlow Integration... 3 How it Works... 3 Supported NetFlow Versions... 3 What to Do... 3 Requirements...

More information

V-CUBE Sales & Support. User Manual

V-CUBE Sales & Support. User Manual V-CUBE Sales & Support User Manual V-cube, Inc. 2013/12/20 This document is the user manual for V-CUBE Sales & Support. 2013 V-cube, Inc. All Rights Reserved. Revision history Revision date Details 2013/12/20

More information

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd.

Web Portal User Guide Leap GIO Public. Leap GIO Public. New Generation - Web Portal User Guide. Copyright 2017 by Leap Solutions Asia Co., Ltd. New Generation - Web Portal User Guide 1 Page Contents 1 General... 3 1.1 Overview... 3 1.2 Definition... 3 1.3 Access the Web Portal... 3 2 Sign-Up... 4 2.1 Personal Account... 4 2.2 Corporate Account...

More information

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide Abstract This document describes how to administer the HP IMC Branch Intelligent Management System. HP Part

More information

GFI EventsManager 8 ReportPack. Manual. By GFI Software Ltd.

GFI EventsManager 8 ReportPack. Manual. By GFI Software Ltd. GFI EventsManager 8 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-Mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Outlook Web App User s Guide

Outlook Web App User s Guide Outlook Web App User s Guide The new Outlook Web App will be replacing your old Outlook Web Access. This upgrade includes many new features that were only previously available through Microsoft Outlook.

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

NetBrain POC Walk-Through

NetBrain POC Walk-Through NetBrain POC Walk-Through For OE 4.1 Dynamic Documentation Visual Troubleshooting NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

User s Manual. Version 5

User s Manual. Version 5 User s Manual Version 5 Copyright 2017 Safeway. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language,

More information

WinScribe Client User Guide

WinScribe Client User Guide WinScribe Client User Guide Version 4.0 WinScribe Inc Ltd P.O Box 33-178 Level 5, 129 Hurstmere Road Takapuna, Auckland, New Zealand. Phone +64 (09) 486-9010 Fax +64 (09) 486-9001 www.winscribe.com Publication

More information

Precise for BW. User Guide. Version x

Precise for BW. User Guide. Version x Precise for BW User Guide Version 9.8.0.x 2 Precise for BW User Guide Copyright 2018 Precise Software Solutions, Inc. All rights reserved. Precise for BW User Guide version 9.8.0.x Document release version

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

InfraSuite Device Master

InfraSuite Device Master Delta Electronics, Inc. InfraSuite Device Master User s Manual Model: EMS4000 Doc. Version: v1.0 Content 1. Introduction... 5 1.1 System Architecture... 5 2. Software Installation... 7 2.1 Presentation

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

SharePoint General Instructions

SharePoint General Instructions SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...

More information

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide IPVideoTalk Portal User Guide Index INTRODUCTION... 4 OVERVIEW... 5 SIGN UP... 5 SIGN IN... 6 DEFINITIONS...

More information

Site Manager. Helpdesk/Ticketing

Site Manager. Helpdesk/Ticketing Site Manager Helpdesk/Ticketing Ticketing Screen The Ticket Summary provides a breakdown of all tickets allocated to the user. By default, tickets are listed in order by ticket ID. Click column headings

More information

SEP Evaluation Expert Quick Guide

SEP Evaluation Expert Quick Guide SEP Evaluation Expert Quick Guide SEP Evaluation September 7 th, 2018 Copyright Notice European Union, 1995-2018 Reproduction of this document and its content, in part or in whole, is authorized, provided

More information

VNNOX Cloud-Based Publishing Service XI'AN NOVASTAR TECH CO.,L User Guide (Pro) Product Version: Document Number: V6.5.0 NS

VNNOX Cloud-Based Publishing Service XI'AN NOVASTAR TECH CO.,L User Guide (Pro) Product Version: Document Number: V6.5.0 NS VNNOX Cloud-Based Publishing Service XI'AN NOVASTAR TECH CO.,L (Pro) Product Version: Document Number: V6.5.0 NS170100148 Copyright 2018 Xi an NovaStar Tech Co., Ltd. All Rights Reserved. No part of this

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

StarWind iscsi SAN Software: Using StarWind Tape Redirector and CA ARCserve Backup

StarWind iscsi SAN Software: Using StarWind Tape Redirector and CA ARCserve Backup StarWind iscsi SAN Software: Using StarWind Tape Redirector and CA ARCserve Backup www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

BIG-IP Analytics: Implementations. Version 13.1

BIG-IP Analytics: Implementations. Version 13.1 BIG-IP Analytics: Implementations Version 13.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles... 5 Overview:

More information

CloudFM Viewer. User guide version /2013. Web viewer of measured data FIEDLER-MÁGR ELEKTRONIKA PRO EKOLOGII

CloudFM Viewer. User guide version /2013. Web viewer of measured data FIEDLER-MÁGR ELEKTRONIKA PRO EKOLOGII CloudFM Viewer User guide version 1.04 09/2013 Web viewer of measured data FIEDLER-MÁGR ELEKTRONIKA PRO EKOLOGII Web viewer of measured data User Guide 2 elektronika pro ekologii FIEDLER-MÁGR Web viewer

More information

Vantage Ultimate 2.2 Quick Start Tutorial

Vantage Ultimate 2.2 Quick Start Tutorial Vantage Ultimate 2.2 Quick Start Tutorial This document is intended to help you to start using WebSpy Vantage Ultimate. For more detailed information, please see the Vantage Ultimate help guide. This can

More information

Systrome Next Gen Firewalls

Systrome Next Gen Firewalls N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security

More information

Applications. View All Applications. People. Contact Details

Applications. View All Applications. People. Contact Details View All, page 1 People, page 1 Email, page 7 Jabber, page 13 Meetings, page 17 WebEx, page 20 More, page 24 View All Tap to display all installed applications. People Use the People application to store,

More information

Task Management User Guide

Task Management User Guide Task Management User Guide Version 18 April 2018 Contents About This Guide... 5 Tasks Overview... 5 Create a Project for Task Management... 5 Project Templates Overview... 5 Add a Project Template...

More information

Applications. View All Applications. . Inbox

Applications. View All Applications.  . Inbox View All, page 1 Email, page 1 Jabber, page 7 Meetings, page 11 People, page 14 WebEx, page 20 More, page 23 View All Tap to display all installed applications. Email The Email application allows you to

More information

LumInsight Web Portal User s Guide

LumInsight Web Portal User s Guide LumInsight Web Portal User s Guide This guide introduces the LumInsight Web Portal dashboard. Use this guide to set up Geozones, update and delete devices, manage alarms, manage group controllers, manage

More information

Synway SIMCLOUD System SIMCLOUD. Version Synway Information Engineering Co., Ltd

Synway SIMCLOUD System SIMCLOUD. Version Synway Information Engineering Co., Ltd Synway SIMCLOUD System SIMCLOUD Version 1.0.0 Synway Information Engineering Co., Ltd www.synway.net Content Content... i Copyright Declaration... ii Revision History... iii Chapter 1 Product Introduction...

More information

EQUELLA Workflow Moderation Guide

EQUELLA Workflow Moderation Guide Helping put innovation into education EQUELLA Workflow Moderation Guide Version 6.5 MELBOURNE - CANBERRA - HOBART 1800 EDALEX - www. edalexsolutions.com ABN 56 611 448 394 Document History Date Change

More information

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ)

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ) Blazer Express V1.4 Frequently Asked s (FAQ) Frequently Asked s COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

Peplink SD Switch User Manual

Peplink SD Switch User Manual Peplink SD Switch User Manual Peplink Products: Peplink SD Switch 8-ports/24-ports/48-ports Peplink SD Switch Firmware 1.2.0 Published on December 10, 2018 Copyright & Trademarks Copyright & trademark

More information

User Guide For Universal Devices Administrative Console (ISY)

User Guide For Universal Devices Administrative Console (ISY) User Guide For Universal Devices Administrative Console (ISY) - 1 - Table of Contents 1. PURPOSE 6 2. THEORY OF OPERATION 6 3. INSTALLATION 7 4. CONFIGURATION 8 4.1 Prerequisites 8 4.1.1 Host Computer

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Wedora-help.

Wedora-help. www.hongdian.com Contents Contents...2 1 Help Center...4 1.1 Login...4 1.1.1 How to login?...4 1.1.2 How to modify the password?...4 1.2 System Management...5 1.2.1 How to upload the upgrade package?...5

More information

Network Security: Firewall, VPN, IDS/IPS, SIEM

Network Security: Firewall, VPN, IDS/IPS, SIEM Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Performance Management Reporting User Guide for EPMR

Performance Management Reporting User Guide for EPMR Performance Management Reporting User Guide for EPMR January, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means,

More information

User Guide. Customer Self Service (CSS) Web Application Progress Software Corporation. All rights reserved.

User Guide. Customer Self Service (CSS) Web Application Progress Software Corporation. All rights reserved. User Guide Customer Self Service (CSS) Web Application 1993-2017 Progress Software Corporation. Version 2.1 March 2017 Table of Contents Welcome... 3 Accessing the Customer Self Service (CSS) Web Application...

More information

ivms-5260 Mobile Client User Manual (Android) UD.6L0202D2077A01

ivms-5260 Mobile Client User Manual (Android) UD.6L0202D2077A01 ivms-5260 Mobile Client User Manual (Android) UD.6L0202D2077A01 User Manual COPYRIGHT 2015 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Getting Started Guide. Sage MAS Intelligence 500

Getting Started Guide. Sage MAS Intelligence 500 Getting Started Guide Sage MAS Intelligence 500 Table of Contents Getting Started Guide... 1 Login Properties... 1 Standard Reports Available... 2 Financial Report... 2 Financial Trend Analysis... 3 Dashboard

More information

Sage 500 ERP Business Intelligence

Sage 500 ERP Business Intelligence Sage 500 ERP Business Intelligence Getting Started Guide Sage 500 Intelligence (7.4) Getting Started Guide The software described in this document is protected by copyright, And may not be copied on any

More information

Windows System. Cannot connect the Internet or open the website

Windows System. Cannot connect the Internet or open the website Cannot connect the Internet or open the website 0 1 Check Proxy... 2 2 Check IP address... 6 3 Renew IP address... 10 4 Check Network Card Driver... 12 5 Setting DNS... 20 1 Check Proxy 1 Check Proxy 1.

More information

Manual Version: V1.15. Video Management Software Guard Station User Manual

Manual Version: V1.15. Video Management Software Guard Station User Manual Manual Version: V1.15 Video Management Software Guard Station User Manual Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. Disclaimer

More information

BT One Phone SIP Softphone PC Guide

BT One Phone SIP Softphone PC Guide BT One Phone SIP Softphone PC Guide 1 Contents Page 1 Introduction 3 2 System Requirements 3 3 Installation 4 4 Standard Softphone features 9 5 The On Screen Phone 9 6 Placing a call 10 7 Multiple calls

More information

Media Path Analysis. Analyzing Media Paths Using IP SLA. Before You Begin. This section contains the following:

Media Path Analysis. Analyzing Media Paths Using IP SLA. Before You Begin. This section contains the following: This section contains the following: Analyzing Media Paths Using IP SLA, page 1 Analyzing Media Paths Using VSAA, page 3 Managing a Video Test Call, page 6 Analyzing Media Paths Using IP SLA To start a

More information

Colasoft reserves the right to make changes in the product design without reservation and without notification to its users.

Colasoft reserves the right to make changes in the product design without reservation and without notification to its users. Cover User Guide Copyr ight Copyright 2017 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in

More information

Centerity Monitor User Guide

Centerity Monitor User Guide Centerity Monitor 4.10 User Guide July 2018 Page 2 End-User License Agreement (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of

More information

EMC Voyence Payment Card Industry Advisor. User s Guide. Version P/N REV A01

EMC Voyence Payment Card Industry Advisor. User s Guide. Version P/N REV A01 EMC Voyence Payment Card Industry Advisor Version 1.1.1 User s Guide P/N 300-007-495 REV A01 EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com COPYRIGHT Copyright

More information

Client Typist User Guide

Client Typist User Guide Powered by Version 4 Client Typist User Guide SA Professional Typing Services Online cc Telephone: 011 023 2323 011 887 1056 Cellular: 083 375 0312 Facsimile: 086 570 9651 E-mail: info@saprotype.co.za

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Solution Composer. User's Guide

Solution Composer. User's Guide Solution Composer User's Guide January 2014 www.lexmark.com Contents 2 Contents Overview...4 Understanding the basics...4 System recommendations...5 Building custom solutions...6 Getting started...6 Step

More information

EMCO Ping Monitor Enterprise 6. Copyright EMCO. All rights reserved.

EMCO Ping Monitor Enterprise 6. Copyright EMCO. All rights reserved. Copyright 2001-2017 EMCO. All rights reserved. Company web site: emcosoftware.com Support e-mail: support@emcosoftware.com Table of Contents Chapter... 1: Introduction 4 Chapter... 2: Getting Started 6

More information

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD.

Advanced Anti-DDoS. User Guide. Issue 17 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 17 Date 2018-08-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Cisco Prime Network Client Overview

Cisco Prime Network Client Overview CHAPTER 1 Cisco Prime Network (Prime Network) provides a suite of GUI tools that offer an intuitive interface for managing the network and services, and for performing required system administration activities.

More information

High Availability on the SonicWALL TZ 210

High Availability on the SonicWALL TZ 210 High Availability on the SonicWALL TZ 210 Document Scope This document describes how to configure and manage the High Availability feature for the SonicWALL TZ 210 security appliance. This document contains

More information

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...

More information

F.A.Q for TW100-S4W1CA

F.A.Q for TW100-S4W1CA F.A.Q for TW100-S4W1CA Q: How do I configure the TW100-S4W1CA for a DSL, PPPoE connection? A: Step 1 Open your web browser and type the IP address of the TW100-S4W1CA in the address bar. The default IP

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

COREN. User Manual.

COREN. User Manual. COREN User Manual www.tecnosicurezza.it Rev. A 10/2015 Page 2 of 40 v. 1.2.4 IU_Coren_00_eng Table of contents 1 - COREN overview... 4 2 - Software installation... 5 3 - First launch of Coren... 10 4 Software

More information

Creating Dashboard Widgets. Version: 16.0

Creating Dashboard Widgets. Version: 16.0 Creating Dashboard Widgets Version: 16.0 Copyright 2017 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived

More information

Moxa Remote Connect Server Software User s Manual

Moxa Remote Connect Server Software User s Manual User s Manual Edition 1.0, April 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Basic Steps for Autotask Endpoint Management. Updated Wednesday, January 31, Autotask Corporation

Basic Steps for Autotask Endpoint Management. Updated Wednesday, January 31, Autotask Corporation Basic Steps for Autotask Endpoint Management Updated Wednesday, January 31, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 Basic Steps 3 Step 1 - Log in 4 Step 2 - Create a New Site

More information

Bpm online customer service. User guide

Bpm online customer service. User guide Bpm online customer service User guide User guide Contents 1. Bpm online customer service overview... 6 2. Bpm online interface... 8 2.1. Bpm'online interface overview... 9 2.2. The command line... 12

More information

Helpdesk. Features. Module Configuration 1/49. On - October 14, 2015

Helpdesk. Features. Module Configuration 1/49. On - October 14, 2015 Helpdesk webkul.com/blog/magento-helpdesk/ On - October 14, 2015 Helpdesk module provides the support to their customers. It is a software suite that enables customer support to receive, process, and respond

More information

iview (v2.0) User Guide Version 1.0

iview (v2.0) User Guide Version 1.0 iview (v2.0) User Guide Version 1.0 Updated 5/1/2008 Overview This user guide provides an overview of setting up, configuring and running the iview Operator Console (v2.0). General Support If you have

More information

Business Insight Authoring

Business Insight Authoring Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

Security Manager Policy Table Lookup from a MARS Event

Security Manager Policy Table Lookup from a MARS Event CHAPTER 17 Security Manager Policy Table Lookup from a MARS Event This chapter describes how to configure and use Security Manager and MARS so as to enable bi-directional lookup between events recieved

More information

Dell SonicWALL Aventail Connect Tunnel User s Guide

Dell SonicWALL Aventail Connect Tunnel User s Guide Dell SonicWALL Aventail 10.6.2 Connect Tunnel User s Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information