GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts

Size: px
Start display at page:

Download "GWNMS NeDi. About NeDi. Configuring the NeDi Package. Managing User Access. Managing User Accounts"

Transcription

1 GWNMS NeDi This section reviews the GroundWork Monitor NMS NeDi. About NeDi NeDi is an open source toolkit for managing network infrastructure devices such as switches and routers, and is integrated into GroundWork Monitor as an optional component of the GroundWork Network Management Suite (NMS). When the GroundWork NMS NeDi package has been installed, a "NeDi" menu item will be present in the main drop-down menu. In simple terms, NeDi is an integrated toolkit for managing infrastructure devices like routers and switches. Whereas most of the components in GroundWork Monitor are designed for the purpose of monitoring the devices on a network (such as measuring the available resources on a host and then generating alarms when conditions require it), NeDi is designed to help administrators manage their infrastructure devices in particular (such as discovering and monitoring changes to the network topology, or manipulating the configuration of the network switches and routers). More specifically, NeDi uses a variety of discovery technologies to locate the infrastructure devices across a network, then uses another set of technologies to probe and query the discovered devices for additional details, and finally stores the discovery data in a set of dynamic databases. From there, administrators can use the NeDi web interface to display information about the network devices and their relationships with each other, perform some basic management tasks, and be alerted to unexpected changes on the network. In addition, NeDi also provides configuration backup and editing tools and inventory management features which further contribute to the device management feature set. This document discusses the basic configuration and operation of NeDi. For more detailed discussion, refer to the online NeDi setup documentation and the online NeDi GUI documentation. Configuring the NeDi Package The GroundWork NMS NeDi package is installed separately from GroundWork Monitor and other applications, and also has its own unique configuration process. Managing User Access The NeDi web pages are provided by a NMS-specific instance of Apache, although the NeDi web front-end is also integrated into GroundWork Monitor through the use of the JBoss Portal. As such, users who have been granted the appropriate role-based permission to access the NeDi object can do so by logging into GroundWork Monitor, and then choosing the "NeDi" entry from the main drop-down menu. However, NeDi also has its own separate user accounts and access controls, which are independent of the GroundWork Monitor controls. More specifically, NeDi only has a single predefined administrative user account, with the username of "admin" and the password of "admin". Furthermore, most of the built-in web pages are unrestricted, and do not require any authentication. If you want to restrict access to the NeDi web server or some of its web pages, you may need to create the appropriate user accounts and access controls within NeDi. This process is separate from the process of determining which users have access to the "NeDi" item in the GroundWork Monitor main menu. For information on configuring user access to the "NeDi" menu item, refer to the "Configuring Roles" section of the Administration documentation. Managing User Accounts The GroundWork NMS NeDi package includes technology that automatically creates a user account in NeDi whenever that user first accesses NeDi through GroundWork Monitor. As such, user accounts do not need to be explicitly created in NeDi in order for users to access those pages. However, it may sometimes be necessary to manage the user accounts directly. To manage the NeDi user accounts, login to NeDi with administrative credentials, then mouse-over the "User" menu at the top of the screen, and then click on the "Accounts" menu item. You will then be presented with a screen that lists the currently defined user accounts, similar to the following:

2 To add a new user account, type the desired username into the "User" edit box in the upper right corner, and click on the "Add" button next to it. The current screen will be reloaded, with the new user at the bottom of the list. Once a user account has been created, the account can be associated with any of the pre-defined NeDi groups by clicking on the small icons in the "Groups" column. Refer to the Managing Access Controls section below for more information about NeDi groups. You can also reset a user's password by clicking the key icon to the right of the desired account. This will delete the user's current password, leaving it empty until it is reset by the user account in question. If you wish to modify the user-specific details such as the password and full name, you must login to GroundWork Monitor with that user account, launch the NeDi application from the GroundWork main menu, mouse-over the "User" menu at the top of the screen, and then click on the "Profile" menu item. You will then be presented with a screen that shows the account details for the current user, similar to the following: The address and phone number fields are used for some alerting operations, and must be defined if this user will be receiving NeDi alerts. If you want this user to be excluded from these activities, they must be removed from the associated groups, or the contact data must be removed. To delete a user account, return to the main user account page and click the red "X" icon to the right of the desired account. You will be prompted to confirm the deletion. Managing Access Controls NeDi access controls are essentially group-based activity filters. Users who belong to a specified group are automatically granted access to the Web pages associated with that group, and may also be included in some automated tasks that are tied to a group. For example, NeDi provides a device monitoring script that will issue and SMS messages to members of the "Monitoring" group whenever a critical event is detected. The pre-defined NeDi groups are as follows: Admin - Members of this group can access the menu items and Web pages that modify settings and devices. This includes the ability to add and delete user accounts, modify device monitoring controls, issue raw commands to infrastructure devices, and perform other potentially-destructive tasks. Network - Members of this group can access the Devices and Topology menus and related Web pages. Helpdesk - Members of this group can access the Nodes menu and related Web pages. Monitoring - Members of this group can access the Monitoring menu and related Web pages, and be notified whenever a critical event has been detected by a monitoring process. Manager - Members of this group can access the Reports menu and related Web pages. Other - Members of this group can access the Other menu and related Web pages. To modify the group memberships of an account, mouse-over the "User" menu at the top of the screen, and then click on the "Accounts" menu item. Once the list of currently defined user accounts has been displayed, click on the appropriate small icons in the "Groups" column to enable

3 and disable membership in the affected group. You can hold your mouse cursor over the icons to get balloon help for that group. If you wish to change the group that is allowed to use a specific module, you can do so by editing the nedi.conf configuration file, as discussed further ahead. Configuring Discovery Methods As stated earlier, NeDi uses a variety of discovery technologies to locate the infrastructure devices across a network. In general terms, NeDi first attempts to locate one or more starting devices, and then uses one the specified discovery technologies to determine the neighboring devices. This approach allows NeDi to get up and running quickly, while also allowing it to build a fairly comprehensive map of the network. The discovery process itself is performed by the /usr/local/groundwork/nms/applications/nedi/nedi.pl Perl script, with the desired discovery technologies being specified as command-line parameters to that script. The discovery technologies that are supported by NeDi are as follows: Static Seedlists - If an administrator needs to manually specify one or more starting devices, they can be itemized in a seedlist file. The default seedlist file is /usr/local/groundwork/nms/applications/nedi/seedlist, although a different file can be specified as an argument to the -u command-line parameter if needed. Default Gateway - If a seedlist file is not defined or does not contain any entries, then NeDi attempts to locate the default gateway device for the current host, and uses that device's IP address as an implicit seedlist. Cisco Discovery Protocol (CDP) - CDP is a propriety discovery technology that was developed by Cisco to allow their devices to locate each other across a variety of layer-2 networks. As a result, CDP-enabled devices are aware of other CDP-enabled devices, and can provide a good initial map of the network if most or all of the devices on the network are CDP-enabled. CDP discovery is enabled with the "-c" command-line parameter. Link Layer Discovery Protocol (LLDP) - LLDP is a standardized layer-2 discovery technology that is managed by the IEEE. It is similar to CDP, but is implemented on a broader range of manufacturer's infrastructure devices. LLDP discovery is enabled with the "-l" command-line parameter. OUI Discovery - Once NeDi has located a device, it is able to use SNMP to query for the ARP table entries on that device. If the OUI discovery mechanism is enabled, NeDi will examine the ARP table for network hardware addresses that belong to some well-known networking equipment vendors, and then attempt to continue discovery with those systems. OUI discovery is enabled with the "-o" command-line parameter. Route Table Discovery - Once NeDi has located a device, it is able to use SNMP to query for the routing table on that device. If the route table discovery option is enabled, NeDi will attempt to continue discovery with the next-hop routers that are returned. Route table discovery is enabled with the "-r" command-line parameter. If a device cannot be discovered with one of the specified discovery technologies, then it will not be discovered unless it is listed in the seedlist file. For example, some small routers do not support CDP or LLDP, and will not match the default OUI discovery either, so they must be specified in a seedlist file if they need to be discovered. If you need to debug the discovery process, you can run the nedi.pl script directly and observe the results of different discovery technologies. However, the nedi.pl script should be executed under the nagios user account in order to ensure that the file and database permissions are not modified. Therefore, you must first login to the GroundWork server interactively, and then use the su nagios command to switch to the nagios user account before executing the script. You can also specify the "-d" and "-v" command-line parameters to the nedi.pl script in order to enable debug and verbose responses, if necessary. The GroundWork NMS NeDi package automatically adds the nedi.pl script to the nagios user account's private crontab file, and schedules it to run every four hours, with the CDP, LLDP and OUI discovery methods enabled (a separate crontab entry runs the script at midnight in order to create a backup of the running configurations, and is documented separately below). To modify this behavior, perform the following steps: 1. Login to the GroundWork server with root privileges. 2. From a command prompt, issue the crontab -u nagios -e command to edit the crontab file associated with the nagios account. 3. Locate the crontab entry for nedi.pl -clo, and modify it as necessary. If you change the scheduler time interval, you need to inform NeDi of the new interval so that the graphs show the correct time values. To do this, open the /usr/local/groundwork/nms/applications/nedi/nedi.conf file in a text editor, set the rrdstep value to the new value, and then save the file. 4. Save the crontab file and exit the editor. The cron daemon will automatically incorporate the new command-line parameters into its current schedule. If you wish to manually define a seed device, you may either use the default /usr/local/groundwork/nms/applications/nedi/seedlist file, or you may define your own seedlist file(s). If you define your own, you must tell the nedi.pl} discovery script about them by adding the {{-u parameter and a file path value to the crontab entry

4 described above. Entries in the seedlist must contain an IP address or hostname of the seed device, and may also contain an explicit SNMP community string. If the SNMP community is not explicitly defined, the default SNMP community string(s) from nedi.conf will be used instead. Setting the Default SNMP Community Strings The SNMP community strings that are used by NeDi to probe newly discovered devices are defined by the "comm" entry in the /usr/local/groundwork/nms/applications/nedi/nedi.conf configuration file. Multiple "comm" entries can be defined, with one entry and value per line, each of which will be tried in successive order with every discovered device. By default, the GroundWork NMS NeDi package defines the single community string value of "public". The nedi.conf file uses a precise syntax with entries and values separated by a single TAB character. You must use this syntax when editing the nedi.conf file. Setting the Default CLI Authentication Credentials As mentioned earlier, some kinds of infrastructure device configuration information is retrieved by logging into the device and issuing commands through TELNET or SSH. In order for NeDi to perform this task successfully, the login credentials to use for authenticating to the device must be provided. The authentication credentials to use are defined in the usr entry in /usr/local/groundwork/nms/applications/nedi/nedi.conf configuration file. Each usr entry contains between one and three fields: the first field specifies the username, the second field contains the access password, while the third field contains the "enable" password that is used with Cisco devices to grant additional access. Multiple "usr" entries can be defined, with one entry per line, each of which will be tried in successive order with every discovered device. By default, the GroundWork NMS NeDi package does not define any "usr" entries. The nedi.conf file uses a precise syntax with entries and values separated by a single TAB character. You must use this syntax when editing the nedi.conf file. Restricting Discovery by IP Address The technologies that NeDi uses for local discovery can also discover devices that are outside of your network, and unless NeDi in constrained to specific network blocks it may even try to discover the entire Internet. The primary method of restricting NeDi's address discovery scope is with the "netfilter" entry in the /usr/local/groundwork/nms/applications/nedi/nedi.conf configuration file. The value for this entry is a regular expression that will be compared against discovered IP addresses, with NeDi discarding any IP addresses that do not match the regular expression. For example, if you would like to restrict NeDi to IP addresses in the * network, you could define a netfilter entry with the value of "^192\.168\.1". Meanwhile, if you wanted to restrict NeDi to IP address in the * and 10...* networks, you could define a netfilter entry with the value of "^192\.168\.1 ^10\.". Whenever an IP address was discovered that did not match the netfilter value, it would simply be discarded. By default, the GroundWork NMS NeDi package defines the address filter of ".", which matches any IP address. The nedi.conf file uses a precise syntax with entries and values separated by a single TAB character. You must use this syntax when editing the nedi.conf file. Restricting Discovery by MAC Address If you are using the OUI discovery method, you can restrict the hardware addresses that NeDi will use by editing the ouidev entry in the /usr/local/groundwork/nms/applications/nedi/nedi.conf configuration file. The value for this entry is a regular expression that will be compared against the friendly name of discovered hardware addresses, with NeDi discarding any hardware addresses that do not match the regular expression. The friendly names for hardware addresses are listed in the /usr/local/groundwork/nms/applications/nedi/inc/oui.txt file. By default, the GroundWork NMS NeDi package defines the hardware filter of "bay nortel netics xylogics foundry XYLAN Netgear RUBY", which are some of the more common infrastructure platforms that may not otherwise be discovered.

5 The nedi.conf file uses a precise syntax with entries and values separated by a single TAB character. You must use this syntax when editing the nedi.conf file. Restricting Discovery by Device Type Sometimes the technologies that NeDi uses for discovering network devices can also discover devices that are not infrastructure related (such as printers), which you may wish to ignore. The primary method of restricting NeDi's platform discovery scope is with the "descfilter" entry in the /usr/local/groundwork/nms/applications/nedi/nedi.conf configuration file. The value for this entry is a regular expression that will be compared against the SNMP description string of discovered devices, with NeDi discarding any devices that match the regular expression. By default, the GroundWork NMS NeDi package defines the platform filter of "LaserJet JETDIRECT HP-UX Linux", which matches most of the printers and Unix platforms that may otherwise be detected as infrastructure equipment. Many modern small routers use Linux for their operating system, and the default filter string will automatically exclude those devices from discovery. If you have some of these devices and you wish to include them in your discovery process, you will need to remove the " Linux" portion of the string (you may also need to include those devices in your static seedlist file in order for them to be discovered). The nedi.conf file uses a precise syntax with entries and values separated by a single TAB character. You must use this syntax when editing the nedi.conf file. Managing Device Definitions Whenever NeDi has discovered an infrastructure device, it will use a variety of secondary queries to obtain additional information about that device (this includes information such as the modules that are installed, the VLANs in use, and so forth). However, each vendor stores this information in different places, and in order for NeDi to know how to retrieve this data it must fist be able to determine the device type. This is achieved by issuing an SNMP query for the device's "System Object ID", and then matching the result against a collection of device definition files. Essentially, the device definition files tell NeDi about the features that should be available on a specific device, and also provides the information that NeDi needs to query for that data. This includes high-level data such as the device icon and operating system, management data such as the SNMP OID to query for CPU and memory utilization, and discrete data such as the SNMP OID to query for interface descriptions and VLAN identifiers. With the GroundWork NMS NeDi package, the device definition files are stored in the /usr/local/groundwork/nms/applications/nedi/sysobj/ directory. Each device definition is managed in a separate file, with the file names being the known SNMP OID values. Over 150 device definition files are provided with NeDi, however this is not an exhaustive collection of every possible device, and you may need to create your own definition file in order to fully utilize an old or relatively obscure device. If you wish to create your own device definition file, you can either copy an existing definition that is similar to the desired device (such as copying a similar HP ProCurve switch definition file to another SNMP OID filename) and edit the resulting file, or you can use the Web-based "Defgen" tool to build a new file from scratch. To use the Defgen tool, mouse-over the "Other" menu at the top of the screen, and then click on the "Defgen" menu item. Once the form has been filled out to your satisfaction, click the "Write" button to automatically create a new device definition file. The files created by Defgen are automatically stored in the /usr/local/groundwork/nms/applications/nedi/html/log/ directory, and the file must be copied to the /usr/local/groundwork/nms/applications/nedi/sysobj/ directory before it will be used by the nedi.pl discovery script. Also note that the nedi.pl discovery script reads the device definition files on every discovery run, so any changes you make will be automatically incorporated the next time the device is discovered. The files in this directory must be readable by the nagios user account in order for this to work properly. Performing Common NeDi Tasks As was discussed in the introduction, NeDi uses a variety of discovery technologies to locate the infrastructure devices across a network, then uses another set of technologies to probe and query the discovered devices for additional details, and then stores the discovery data in a set of dynamic databases which are then made available to administrators through the NeDi web interface. A brief description of the most used web pages are provided in the remainder of this section. For more detailed discussion, refer to the online NeDi documentation.

6 Each NeDi web page also provides built-in help which is accessible by clicking on the life preserver icon in the top right corner of the page. Using the Search and Display Filters Every NeDi web page that provides a list view will initially present a search filter dialog that allows the user to limit the amount of data returned in the list results, and which also allows you to specify the fields that you want to include in the search output. The specific search filter will differ for each field, but generally looks similar to the following: The default search filters do not filter anything, so if you do not want to limit the search results you can simply click the "Show" button at the right of the dialog, and all of the known entries for the current resource type will be returned. If you do want to filter the results, the search filter dialog allows you to define two different filters (these are the "Condition A" and "Condition B" inputs shown above), which can also be combined in a number of ways (this is controlled by the "Combination" input). By default, the "Condition A" filter is empty (meaning that it matches all entries), and the "Condition B" filter is completely ignored (this is indicated by the "Combination" input which shows only "Condition A"). Apart from the search filter criteria, the dialog box also contains a listbox of the known database fields for the current resource type, which allows the user to determine the fields that are returned. The default set of fields will be different for each resource type (infrastructure device searches return different fields by default than the VLAN search, for example). Infrastructure Device List NeDi provides a simple table view of the discovered infrastructure devices, which allows you to quickly survey the network infrastructure. To view this data, mouse-over the "Devices" menu at the top of the screen, and then click on the "List" menu item. A search screen similar to the one described in the Using the Search and Display Filters section above will be displayed, which allows you to define any filters you may want to apply. If you want to view all of the discovered infrastructure devices, simply click on the "Show" button to the right, which will cause the screen to be reloaded with all of the known devices listed in a new table below the search filter, similar to the following: By default, NeDi displays the following data for each of the discovered infrastructure devices: Device name and icon - The device name is determined from various lookup techniques, while the device icon is controlled by the device definition file that was chosen during the discovery process.

7 that the device icon is a hyperlink that will redirect you to the detailed web page for that device, as described in the next section. Primary IP address - All routers and some switches typically have more than one IP address, and this field displays the device' primary address, as determined through a variety of algorithms. For some devices, the IP address will be a Telnet or SSH hyperlink that allows you to open an interactive terminal session with the primary address. The hyperlink is only available when the nedi.pl Perl script was able to successfully login to the device during discovery. However, the discovery script will only attempt to connect with the device if NeDi knows how to use the platform's command-line interface, so some devices will not have a hyperlink even though they support Telnet and/or SSH access. Device serial number - The serial number provides a unique tracking method for infrastructure devices, and allows you to determine if a device has been replaced with another similar unit. Some devices do not have unique serial numbers, and this field will be empty in that scenario. Platform description - This field typically shows the model number of the device, although some devices do not provide this information. SNMP contact - This field shows the SNMP contact information that was discovered when the device was probed. You can change the fields that are displayed by modifying the selected items in the "Display" filter input at the right of the search filter dialog box, if you wish. Infrastructure Device Detail Data NeDi provides a detailed view for each of the discovered infrastructure devices, which allows you to examine the configuration and operational aspects of the devices. To view this data, you can either click on a device' icon in the Device List web page (as was discussed in the preceding section), or you can mouse-over the "Devices" menu at the top of the screen, then click on the "Status" menu item, and then choose the desired device from the drop-down list that is presented. A screen similar to the following will then be presented, with detailed information about the selected device: The NeDi device status page displays a set of tables, each of which contain different types of data about the selected device. The contents of each table will vary according to the capabilities of the device and the associated definition file. The tables that are presented are as follows: Summary - This table contains information about the device itself, such as its main IP address, the operating system in use, the SNMP version in use, and so forth. If the device definition describes how to gather the relevant data, this table will also contain thumbnail charts

8 for CPU and memory utilization, as well as the operating temperature, with the thumbnail charts being hyperlinked to full-sized versions of those same charts. The very top row in this table contains a set of icons, each of which are hyperlinked to specific functions. You can hold the mouse cursor over each of the icons to get balloon help for what the icon represents. Meanwhile, the IP address is a hyperlink that opens a Telnet or SSH terminal session with the target IP address (assuming that your Web browser is able to use the URLs). Also note that the SNMP and CLI fields may have clickable icons on the right, both of which allow you to retest the SNMP version and terminal emulation protocols that may be available on the device. Modules - This table lists the hardware modules that were discovered on the device via SNMP queries, using an OID that is specified in the device definition file. Some high-end devices may have multiple hardware components, while some smaller devices may not show any modules. To view the full list of all known modules, click on the "Devices" menu at the top of the screen, and then click on the "Modules" menu item. You will then be presented with a search filter dialog screen, similar to the one described in the "Using the Search and Display Filters" section above. Links - This table lists all of the known connections between this device and other infrastructure devices. These connections are automatically determined by NeDi during the discovery process, but static connections can also be created if needed (such as when a remote network is connected to the local network via PPP, and is not discoverable with the usual techniques). To browse through all of the known connections or to manage your own static connections, click on the "Topology" menu at the top of the screen, and then click on the "Linked" menu item. You will then be presented with a "Link Editor" which allows you to view, create, and manage links between the known infrastructure devices. VLANs - If the selected device implements support for virtual LANs, and if the device definition file describes a way to retrieve VLAN configuration data via SNMP, then NeDi will report the configured VLANs and their friendly names. Interfaces - This table lists the interfaces that were discovered on the device, along with the supporting data was able to be retrieved. Most of this data is read from the standard SNMP OIDs for interfaces, but some of it is sourced from platform-specific SNMP OIDs that are listed in the device definition file. The interface icon background color indicates whether or not a specific interface is active (green), inactive (yellow), or disabled (red). Also note that the network addresses in the right-most column are hyperlinked, and redirect to a dynamic mapping page that allows the administrator to manipulate a visual representation of that network. To view the full list of all known interfaces, click on the "Devices" menu at the top of the screen, and then click on the "Interfaces" menu item. You will then be presented with a search filter dialog screen, similar to the one described in the "Using the Search and Display Filters" section above. As stated above, the data that is used to populate these tables mostly comes from SNMP queries, and depends on the capabilities of the selected device, as well as the completeness of the device definition file. In some cases, a device may not implement a specific technology (such as a low-end switch that does not implement VLANs), or there may not be any known method for retrieving the data via SNMP. Node List NeDi provides a simple table view of the network nodes that have been discovered, which allows you to quickly survey the network as a whole. This data is also provided for the infrastructure devices as well, thereby allowing you to view those devices' operational characteristics in the same way as other nodes. To view this data, mouse-over the "Nodes" menu at the top of the screen, and then click on the "List" menu item. A search screen similar to the one described in the Using the Search and Display Filters section above will be displayed, which allows you to define any filters you may want to

9 apply. If you want to view all of the discovered network nodes, simply click on the "Show" button to the right, which will cause the screen to be reloaded with all of the known nodes listed in a new table below the search filter, similar to the following: By default, NeDi displays the following data for each of the discovered nodes: Node name and icon - The name of the node is determined from various lookup techniques, while the node icon is determined by a hardware address mapping table that indicates the manufacturer who has been assigned that address. The node icon is a hyperlink that will redirect you to the detailed web page for that node, as described in the next section. Primary IP address - The IP address associated with the hardware address. The IP address is a hyperlink that will reload the node list with the selected IP address as a search filter, which allows the administrator to search for devices with duplicate addresses. Device name and interface name - The name and interface of the infrastructure device that the node is attached to. The device name is a hyperlink that will reload the node list with the selected device as a search filter, while the interface name is a hyperlink that will reload the node list with the selected interface as a search filter. VLAN - The VLAN identifier for the target device. The VLAN ID is a hyperlink that will reload the node list with the selected VLAN ID as a search filter. First Seen and Last Seen - The date and time when the device was first added to the database without having since been expired from the database, and the date and time when traffic from the device was last detected. The brightness of the green background behind the First Seen field reflects the amount of time since the device was first added. You can change the fields that are displayed by modifying the selected items in the "Display" filter input at the right of the search filter dialog box. Node Detail Data NeDi provides a detailed view for each of the discovered network nodes that allows an administrator to examine the operational aspects of the nodes.

10 This data is also provided for the infrastructure devices as well, thereby allowing you to view those devices' operational characteristics in the same way as other nodes. To view this data, you can either click on a device' icon in the Device List web page (as was discussed in the preceding section), or you can mouse-over the "Nodes" menu at the top of the screen, then click on the "Status" menu item, and then enter the hardware address into the edit field that is presented. A screen similar to the following will then be presented, with detailed information about the selected node: The NeDi node status page displays a set of tables, each of which contain different types of data about the selected node. This data is mostly collected from the infrastructure devices, although some parts of it are collected from the node itself. The tables that are presented are as follows: Summary - Overview information about the node itself, such as its hardware address, the hardware manufacturer that was assigned with that address, the primary IP address that corresponds with the hardware address, and so forth. Most of these fields are identical to the fields that are available in the node list page, as described in the preceding section. The very top row in this table contains a set of icons, each of which are hyperlinked to specific functions. You can hold the mouse cursor over each of the icons to get balloon help for what the icon represents. Also note that the NIC vendor field is a hyperlink that will query Google for the full business name and then redirect the Web browser to the first response. Service - These entries indicate whether or not the node is running a variety of common network services. The data in this table is populated by tests that are executed whenever the page is loaded. To view the full list of all known modules, click on the "Devices" menu at the top of the screen, and then click on the "Modules" menu item. You will then be presented with a search filter dialog screen, similar to the one described in the "Using the Search and Display Filters" section above. Interface Traffic and Errors - The first graph shows the network utilization of the node, while the second graph shows the number of errors that were recorded. These values are retrieved from the upstream infrastructure device with SNMP queries IP Address Changes - If the node has changed to a different IP address since it was first seen, the recorded change(s) will be displayed in this table. Interface Changes - If the node has been moved to a different port or a different upstream infrastructure device since it was first seen, the recorded change(s) will be displayed in this table. As stated earlier, this data is also available for the infrastructure devices that have been discovered. As such, you can use the node detail page to view the information about the switches and routers too. Integrating NeDi Data with GroundWork Monitor The GroundWork NMS NeDi package provides scripts and automation schema definitions that allow administrators to export the host definition data out of NeDi and import that data into the GroundWork Monitor Configuration database. This process can be performed manually or automatically, as the administrator sees fit.

11 Exporting Host Definitions from NeDi Administrators have two options for exporting data out of NeDi. First, you can use the NeDi "Export" web page to manually create text files containing all of the data from a specific table. If you wish to use this method, mouse-over the "Other" menu at the top of the screen, and then click on the "Export" menu item. For more information on using this tool, click the life-preserver icon in the top right corner of the screen. The second method for exporting data, and the one that is preferred, is to use the /usr/local/groundwork/nms/tools/automation/scripts/extract_nedi.pl Perl script included with the GroundWork NMS NeDi package, which exports data from the NeDi devices and nodes tables, and dumps the output into the /usr/local/groundwork/core/monarch/automation/data/nedi_data.txt text file. This script generates a file with the following fields, each of which are separated from their neighbors by a pair of semi-colon characters: Some fields are overloaded with multiple meanings, based on which NeDi table was used to populate the current row Field Name Field Data Notes Name Device or node name The friendly name for the infrastructure device or node. IP Device or node IP address The primary IP address associated for the infrastructure device or node. Description Device description The description string for the infrastructure device. OS/OUI Device OS or Node OUI The operating system in use on the infrastructure device, or the vendor name associated with the hardware address of the node. Location Device location The SNMP location string for the infrastructure device. Type Device type The model name of the infrastructure device. Contact Device contact The SNMP contact string for the infrastructure device. Device Node parent device The parent device for the current node. The extract_nedi.pl Perl script is automatically executed as part of the nagios user's crontab file immediately after the nedi.pl discovery script is executed (once every four hours, by default), which ensures that the output file always contains the most recent version of the discovery data. Importing Host Definitions into GroundWork Monitor The GroundWork NMS NeDi package provides two different models for importing the contents of the nedi_data.txt text file into GroundWork Monitor's configuration subsystem, both of which are defined as schema templates for GroundWork Monitor's Auto-Discovery subsystem. The first model is defined in the /usr/local/groundwork/core/monarch/automation/templates/schema-template-nedi-host-import.xml schema template, and integrates NeDi devices and nodes into the configuration subsystem by either adding new host entries or modifying existing host entries, depending on whether or not a host entry already exists in the configuration database for the device or node in question. If you wish to use this schema template, you must create an appropriate schema definition using the following steps: Open the Auto Discovery application from the main GroundWork Monitor menu. Click the Automation menu item in the top menu bar to manage the automation schema definitions. Click the New Schema button to create a new schema definition. Give the new schema definition the exact name of "NeDi-host-import". Choose the "NeDi-host-import" template from the bottom drop-down box. Click the "Add" button to finish creating the new schema definition. From the schema editor screen, verify that the data file contains the output from the NeDi database tables by clicking the "View" button in the "Data source" row, and then close the pop-up window when you are finished. If you wish to process the records now, click the "Process Records" button at the top of the schema editor screen, otherwise click the "Close" button to return to the schema definition window. The GroundWork NMS NeDi package also provides the /usr/local/groundwork/nms/tools/automation/scripts/auto_import_nedi_host.pl Perl script, which can be used to automate the import process. This script looks for a schema definition entry with the name of "NeDi-host-import" and then executes that schema definition automatically. However, this script does not automatically commit the changes to the configuration database, so the changes will not be recognized until they are manually committed. The second import model in the GroundWork NMS NeDi package is defined in the /usr/local/groundwork/core/monarch/automation/templates/ schema-template-nedi-parent-child-sync.xml schema template,

12 which is designed to simply update the existing host entries with information about the host's parent device. If you wish to use this schema template, you must create an appropriate schema definition using the following steps: Open the Auto-Discovery application from the main GroundWork menu. Click the Automation menu item in the top menu bar to manage the automation schema definitions. Click the New Schema button to create a new schema definition. Give the new schema definition the exact name of "NeDi-parent-child-sync". Choose the "NeDi-parent-child-sync" template from the bottom drop-down box. Click the "Add" button to finish creating the new schema definition. From the schema editor screen, verify that the data file contains the output from the NeDi database tables by clicking the "View" button in the "Data source" row, and then close the pop-up window when you are finished. If you wish to process the records now, click the "Process Records" button at the top of the schema editor screen, otherwise click the "Close" button to return to the schema definition window. The GroundWork NMS NeDi package also provides the /usr/local/groundwork/nms/tools/automation/scripts/auto_import_nedi_sync.pl Perl script which can be used to automate the synchronization process. This script looks for a schema definition entry with the name of "NeDi-parent-child-sync" and then executes that schema definition automatically. However, this script does not automatically commit the changes to the configuration database, so the changes will not be recognized until they are manually committed.

Domain Setup Guide. NetBrain Integrated Edition 7.1. All-in-One Appliance

Domain Setup Guide. NetBrain Integrated Edition 7.1. All-in-One Appliance NetBrain Integrated Edition 7.1 Domain Setup Guide All-in-One Appliance Version 7.1a Last Updated 2018-09-27 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Contents 1. Setting Up

More information

NetBrain Technologies Inc. NetBrain Consultant Edition. Quick Start Guide

NetBrain Technologies Inc. NetBrain Consultant Edition. Quick Start Guide NetBrain Technologies Inc. NetBrain Consultant Edition Quick Start Guide Content 1. Install NetBrain Workstation CE System... 3 1.1 Install and Activate NetBrain Gateway Server... 5 1.2 Install Workstation...

More information

Configure Controller and AP Settings

Configure Controller and AP Settings Configure SNMP Credentials for Rogue AP Tracing, on page 1 Configure Protocols for CLI Sessions, on page 2 Enable Unified AP Ping Reachability Settings on the Prime Infrastructure, on page 2 Refresh Controllers

More information

NetBrain OE System Quick Start Guide

NetBrain OE System Quick Start Guide NetBrain Technologies Inc. NetBrain OE System Quick Start Guide For Operator Edition Administrators Table of Contents 1. Install NetBrain OE System... 3 1.1 Install Gateway Server... 4 1.2 Install Network

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

WhatsConnected v3.5 User Guide

WhatsConnected v3.5 User Guide WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation

More information

Setting up. Discovering the Network. Planning Discovery Runs CHAPTER

Setting up. Discovering the Network. Planning Discovery Runs CHAPTER CHAPTER 3 After you install Prime NCS (WAN) and launch the browser, read the following sections to learn how to get started using Prime NCS (WAN): Discovering the Network, page 3-1 Setting Up Site Profiles,

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Managing Configurations

Managing Configurations CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Add and Organize Devices

Add and Organize Devices This chapter contains the following topics: Add Devices to Prime Infrastructure, on page 1 Import Devices from Another Source, on page 7 Create Device Import CSV Files, on page 7 Add Devices Manually (New

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based

More information

WhatsConfigured for WhatsUp Gold 2016 User Guide

WhatsConfigured for WhatsUp Gold 2016 User Guide WhatsConfigured for WhatsUp Gold 2016 User Guide Contents Welcome to WhatsConfigured 1 What is WhatsConfigured? 1 Finding more information and updates 1 Sending feedback 2 Deploying WhatsConfigured 3 STEP

More information

Locating Users in the Network with User Tracking

Locating Users in the Network with User Tracking CHAPTER 3 Locating Users in the Network with User Tracking User Tracking allows you to locate end-user hosts and IP phones in the network. It uses information gathered from network devices to display data

More information

CounterACT Switch Plugin

CounterACT Switch Plugin CounterACT Switch Plugin Version 8.9.5 Table of Contents About the Switch Plugin... 5 Plugin Architecture... 5 Communication between the Switch Plugin and Switches... 6 Multi-Process Switch Plugin Architecture...

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Getting Started with Locator

Getting Started with Locator Getting Started with Locator The Locator application is a search tool within OmniVista. Locator's Search tab enables you to locate the switch and slot/port that is directly connected to a user-specified

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

Manage Your Device Inventory

Manage Your Device Inventory About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

Please review the Infoblox CCS Scripting Guide for more information on the above optional statements

Please review the Infoblox CCS Scripting Guide for more information on the above optional statements Overview Network engineers are always looking for ways to automate the tasks of maintaining network devices. Logging into network devices to make changes or to upgrade software is tedious, time consuming,

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.7 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Document the CCIE Lab

Document the CCIE Lab NetBrain Technologies Inc. Document the CCIE Lab With NetBrain Personal Edition Plus 1. Install and activate NetBrain Workstation... 3 1.1 Setup NetBrain Workstation Personal Edition Plus... 3 1.2 Activate

More information

CounterACT Wireless Plugin

CounterACT Wireless Plugin CounterACT Wireless Plugin Version 1.7.0 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 5 How It Works... 6 About WLAN Controller/Lightweight Access Points...

More information

Working with Prime Network Vision Maps

Working with Prime Network Vision Maps CHAPTER 5 The topological map is the main tool used by Cisco Prime Network Vision (Prime Network Vision) to display the links and relationships between the network elements and aggregations. The following

More information

Discovering Network Devices

Discovering Network Devices CHAPTER 5 To generate reports, Prime Performance Manager must discover your network devices. This is accomplished by importing the device inventory from Cisco Prime Network, running device discovery from

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

MIDAS Inventory Networking Add-On

MIDAS Inventory Networking Add-On MIDAS Inventory Networking Add-On Version 3.2 User Guide BLUE ELEPHANT SYSTEMS GmbH Legal Notice blue elephant systems GmbH shall not be liable for errors contained herein or for incidental or consequential

More information

NetBrain Quick Start Guide For End Users

NetBrain Quick Start Guide For End Users NetBrain Quick Start Guide For End Users Dynamic Documentation Network Analysis Visual Troubleshooting Automation Qapp Network Change Management Thin Client NetBrain Technologies, Inc. 2004-2016. All rights

More information

NERC Compliance Use Cases

NERC Compliance Use Cases NERC Compliance Use Cases Overview For network and IT teams who work in the Energy sector, the North American Energy Reliability Corporation Critical Infrastructure Protection (NERC-CIP) standards provide

More information

NetBrain Quick Start Guide For End Users

NetBrain Quick Start Guide For End Users NetBrain Quick Start Guide For End Users Dynamic Documentation Network Analysis Visual Troubleshooting Automation Qapp Network Change Management Thin Client NetBrain Technologies, Inc. 2004-2015. All rights

More information

IPMI Configuration Guide

IPMI Configuration Guide IPMI Configuration Guide 1. Introduction of IPMI Server Manager... 2 2. IPMI Server Manager GUI Overview... 3 1 1. Introduction of IPMI Server Manager IPMI Server Manager allows remote access of computers

More information

CSPC OVA Getting Started Guide

CSPC OVA Getting Started Guide S M A R T N E T T O T A L C A R E S U P P O R T T E A M CSPC 2.6.1 OVA Getting Started Guide Copyright 2016 Cisco Systems, Inc. Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 IIS Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

User s Manual. Version 5

User s Manual. Version 5 User s Manual Version 5 Copyright 2017 Safeway. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language,

More information

Getting Started Using Cisco License Manager

Getting Started Using Cisco License Manager CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter

More information

Smart Install in LMS CHAPTER

Smart Install in LMS CHAPTER CHAPTER 6 Smart Install (SI) is a plug-and-play configuration and image management feature that provides zero-touch deployment for new switches. You can configure SI on a switch which will then be the

More information

Initial Setup. Cisco APIC Documentation Roadmap. This chapter contains the following sections:

Initial Setup. Cisco APIC Documentation Roadmap. This chapter contains the following sections: This chapter contains the following sections: Cisco APIC Documentation Roadmap, page 1 Simplified Approach to Configuring in Cisco APIC, page 2 Changing the BIOS Default Password, page 2 About the APIC,

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Using the Prime Performance Manager Web Interface

Using the Prime Performance Manager Web Interface 3 CHAPTER Using the Prime Performance Manager Web Interface The following topics provide information about using the Cisco Prime Performance Manager web interface: Accessing the Prime Performance Manager

More information

Cisco Unity Express Windows and Menus

Cisco Unity Express Windows and Menus Last updated: June 21, 2007 This chapter describes the windows, menus, and icons available in the Cisco Unity Express voice-mail system and contains the following sections: Navigating Through the Cisco

More information

Introduction to Change and Configuration Management

Introduction to Change and Configuration Management CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes

More information

BASIC USER TRAINING PROGRAM Module 5: Test Case Development

BASIC USER TRAINING PROGRAM Module 5: Test Case Development BASIC USER TRAINING PROGRAM Module 5: Test Case Development Objective Student will have an understanding of how to create, edit and execute a Test Case from Develop a Test Case Activity Page. Student will

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Administration Utilities

Administration Utilities NN47226-600 Document status: Standard Document version: 0301 Document date: 27 April 2010 All Rights Reserved Sourced in Canada and the United States of America The information in this document is subject

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Visualize the Network Topology

Visualize the Network Topology Network Topology Overview, page 1 Datacenter Topology, page 3 View Detailed Tables of Alarms and Links in a Network Topology Map, page 3 Determine What is Displayed in the Topology Map, page 4 Get More

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

User Guide. Version R9. English

User Guide. Version R9. English Discovery User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Getting Started with Prime Network

Getting Started with Prime Network CHAPTER 1 These topics provide some basic steps for getting started with Prime Network, such as how to set up the system and the basic parts of the Prime Network Administration GUI client. Basic Steps

More information

Getting Started with the Web Client

Getting Started with the Web Client Getting Started with the Web Client Getting Started with the Web Client The OmniVista Web Client for OmniVista 3.3 provides users access to basic versions of the OmniVista Locator, Notifications, and Topology

More information

Using the Cisco NAC Profiler Endpoint Console

Using the Cisco NAC Profiler Endpoint Console CHAPTER 15 Topics in this chapter include: Overview, page 15-1 Display Endpoints by Profile, page 15-4 Display Endpoints by Device Port, page 15-9 Unauthorized Endpoints, page 15-12 Endpoint Directory

More information

ForeScout CounterACT. Configuration Guide. Version 1.8

ForeScout CounterACT. Configuration Guide. Version 1.8 ForeScout CounterACT Network Module: Wireless Plugin Version 1.8 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 6 How It Works... 6 About WLAN Controller/Lightweight

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Overview. ACE Appliance Device Manager Overview CHAPTER

Overview. ACE Appliance Device Manager Overview CHAPTER 1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager

More information

Using Integration Utility

Using Integration Utility CHAPTER 3 CiscoWorks Integration Utility downloads Network Management Integration Data Bundle (NMIDB) and integrates LAN Management Solutions (LMS) applications, icons, MIBs, and traps with third-party

More information

Troubleshooting Cisco DCNM

Troubleshooting Cisco DCNM 18 CHAPTER This chapter describes some common issues you might experience while using Cisco Data Center Network Manager (DCNM), and provides solutions. Note For troubleshooting Cisco DCNM server installation

More information

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE 22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Device and Subdevice Manager

Device and Subdevice Manager CHAPTER 3 To access Device tasks, log into the system (see Logging In section on page 2-1). Then, from the Home page, click the Devices tab. The Device Functional Overview page appears showing: View Device

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

NetBrain OE 4.0. Release Notes July NetBrain Technologies, Inc

NetBrain OE 4.0. Release Notes July NetBrain Technologies, Inc NetBrain OE 4.0 Release Notes July 2011 NetBrain Technologies, Inc. 2004-2011. All rights reserved +1.800.605.7964 info@netbraintech.com www.netbraintech.com NetBrain OE 4.0 Improvements New Features Site

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

User Guide. Version R95. English

User Guide. Version R95. English Audit User Guide Version R95 English November 28, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018 ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Manage Your Inventory

Manage Your Inventory About Inventory About Inventory, on page 1 Inventory and Cisco ISE Authentication, on page 2 Display Information About Your Inventory, on page 2 Types of Devices in the DNA Center Inventory, on page 6

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Change and Configuration Management Administration

Change and Configuration Management Administration CHAPTER 7 Change and Configuration Management Administration These topics provide administrative information on Change and Configuration Management: Configuring Global Settings for Configuration Management,

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

Kerio Control. User Guide. Kerio Technologies

Kerio Control. User Guide. Kerio Technologies Kerio Control User Guide Kerio Technologies 2017 Kerio Technologies s.r.o. Contents Viewing activity reports in Kerio Control Statistics......................... 5 Overview..................................................................

More information

NetBrain Workstation AE Quick Start

NetBrain Workstation AE Quick Start NetBrain Workstation AE Quick Start For Architect Edition Must-See Features Walk-through Ready-to-use Internet Lab for Test Run Link to Download Software and In-Depth Training Look for: Test Run over Intermet

More information

User Guide For Universal Devices Administrative Console (ISY)

User Guide For Universal Devices Administrative Console (ISY) User Guide For Universal Devices Administrative Console (ISY) - 1 - Table of Contents 1. PURPOSE 6 2. THEORY OF OPERATION 6 3. INSTALLATION 7 4. CONFIGURATION 8 4.1 Prerequisites 8 4.1.1 Host Computer

More information

WhatsUp Gold. Evaluation Guide

WhatsUp Gold. Evaluation Guide WhatsUp Gold Evaluation Guide Table of Contents This guide provides and overview of WhatsUp Gold. Refer to our Online Help for more details. Section Step 1: Getting Started Description Installation requirements

More information

Proofpoint Threat Response

Proofpoint Threat Response Proofpoint Threat Response Threat Response Auto Pull (TRAP) - Installation Guide Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 United States Tel +1 408 517 4710 www.proofpoint.com Copyright Notice

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Secret Server User Guide

Secret Server User Guide Secret Server User Guide I. GETTING STARTED... 6 1. INSTALLATION GUIDE SEE SEPARATE DOCUMENT... 6 2. TERMINOLOGY... 6 II. SECRET SECTION... 7 1. SECRETS... 7 a. Creating a Secret... 7 b. Viewing a Secret...

More information

Configuring SAP Targets and Runtime Users

Configuring SAP Targets and Runtime Users CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,

More information

Understanding the Relationship with Domain Managers

Understanding the Relationship with Domain Managers 4 CHAPTER Understanding the Relationship with Domain Managers Prime Central for HCS reports the events generated by underlying domain managers. Domain managers may also discover topology and relationships

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Active Directory as a Probe and a Provider

Active Directory as a Probe and a Provider Active Directory (AD) is a highly secure and precise source from which to receive user identity information, including user name, IP address and domain name. The AD probe, a Passive Identity service, collects

More information

NetBrain POC Walk-Through

NetBrain POC Walk-Through NetBrain POC Walk-Through For OE 4.1 Dynamic Documentation Visual Troubleshooting NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Open SDN Controller Applications

Open SDN Controller Applications The following topics describe the five applications that Open SDN Controller provides to facilitate the day-to-day administration of your network: BGPLS Manager, page 1 Inventory Manager, page 3 Model

More information

Monitoring Windows Systems with WMI

Monitoring Windows Systems with WMI Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

NetBrain Workstation Live Network Access Guide How NetBrain Accesses the Live Network

NetBrain Workstation Live Network Access Guide How NetBrain Accesses the Live Network Live Network Access Guide How NetBrain Accesses the Live Network Summary Many NetBrain functions such as live network discovery, benchmarking, path discovery and monitoring require access to the live network.

More information

Cisco NAC Profiler UI User Administration

Cisco NAC Profiler UI User Administration CHAPTER 14 Topics in this chapter include: Overview, page 14-1 Managing Cisco NAC Profiler Web User Accounts, page 14-2 Enabling RADIUS Authentication for Cisco NAC Profiler User Accounts, page 14-7 Changing

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 250-530 Title : Administration of Symantec Network Access Control 12.1 Vendors : Symantec

More information

AVWorks. Installer/User Guide

AVWorks. Installer/User Guide AVWorks Installer/User Guide INSTRUCTIONS This symbol is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the appliance.

More information

Release Notes. NetBrain Integrated Edition 7.0

Release Notes. NetBrain Integrated Edition 7.0 NetBrain Integrated Edition 7.0 Release Notes Version 7.0b1 Last Updated 2017-11-22 Copyright 2004-2017 NetBrain Technologies, Inc. All rights reserved. Contents 1. Highlights... 3 2. Feature Summary...

More information