Using the SSM Administration Console

Size: px
Start display at page:

Download "Using the SSM Administration Console"

Transcription

1 CHAPTER 6 Your user role controls whether you can access the SSM Administration Console. The following information is included in this section: SSM Administration Console Overview, page 6-1 Launching the SSM Administration Console, page 6-2 Managing Groups, page 6-3 Managing Users, page 6-6 Managing User Roles and Privileges, page 6-8 Managing Remote Agents, page 6-12 SSM Administration Console Overview The SSM Administration Console is a user interface that is launched separately from Service Statistics Manager. The SSM Administration Console is used to configure: Users Service Statistics Manager supports two classes of user: Administrator (users in this class access Service Statistics Manager and SSM Administration Console); and User (users in this class can access Service Statistics Manager only). Roles Permissions. Groups Used in reporting and in access control. SSM Agents Perform data collection functions on remote systems where they are installed. The SSM Administration Console is automatically installed on the system where Service Statistics Manager resides. You can also install the SSM Administration Console on another Windows system. For more information, see Installing the SSM Administration Console on Another System, page The SSM Administration Console connects with and updates the Service Statistics Manager database. Only a user with a role in the Administration user class can log in to the SSM Administration Console. Such a user can also access all functions in Service Statistics Manager. After initial installation: You must change the password for the default admin user from admin. You can do so from the Administration tab (see Changing Your Password, page 7-1) or from the SSM Administration Console (see Editing a User, page 6-7.) You must log into the SSM Administration Console to create additional users with appropriate roles. 6-1

2 Launching the SSM Administration Console Chapter 6 Launching the SSM Administration Console Only a user in the Administrator role in Service Statistics Manager can log into the SSM Administration Console. Log in directly or by using VNC to the system where the SSM Administration Console is installed. On the Windows desktop, select one of the following: Start > All Programs > Cisco Unified Service Statistics Manager > Cisco Unified Service Statistics Manager Admin Start > All Programs > Cisco Unified Service Statistics Manager Admin 1.1 > Cisco Unified Service Statistics Manager Admin A Command Prompt window is displayed briefly and the SSM Administration Console login window appears momentarily. Enter information in the following fields: Host DNS name or IP address of the Service Statistics Manager system that you want to administer. User Username with access rights to the Service Statistics Manager system. Password Password for the username. Click Log in. Status information is displayed during login. On successful validation, the SSM Administration Console is displayed. If you have an evaluation license for Service Statistics Manager, a reminder message displays the number of days remaining in the evaluation period. For more information, see Using an Evaluation License, page SSM Administration Console Folders The SSM Administration Console is organized into folders: Root The container or top-level folder. Group Groups for reporting purposes. See Managing Groups, page 6-3. User User management. See Managing Users, page 6-6. Advanced Options: Role Access control for each role to Service Statistics Manager reports. See Managing User Roles and Privileges, page 6-8. Agent SSM Agents from which this Service Statistics Manager obtains data. See Managing Remote Agents, page Expand each folder to view its contents; right-click the folder entries for menu options. 6-2

3 Chapter 6 Managing Groups Managing Groups A group is a collection of monitored resources. To create a group, you select individual Unified Communications Managers, call clusters, and other instances and provide a unique name for the group. Use groups to organize instances; for example, by location, department, or resource type. You can then select groups to: Create custom graphs for a selected group. Grant or deny user access to information for a selected group. Before creating a group, add all corresponding instances to the Service Statistics Manager database by invoking the discovery feature. (See Triggering Discovery, page 7-9 and Retriggering Discovery, page 7-11.) There is no limit on the number of groups that you can define. However, you should avoid creating a single group with hundreds or thousands of monitors. (One or more monitors exists for each device. For more information, see Devices and Associated Monitor Types, page A-1.) When creating a group that encompasses a large number of instances, it is best to create it from smaller groups that have real meaning in terms of function, dependency, or topological relationships and add these smaller groups to a top-level group. You can create a group using either of these methods: Adding a Group by Selecting Each Instance, page 6-3 Adding a Group by Selecting Groups, page 6-5 Adding a Group by Selecting Each Instance Right-click the Group folder and select Add Group. The Add Group window is displayed. Enter data in these fields: Group Name Unique name with a maximum length of 30 characters and no spaces. Group Description (Optional) Meaningful description. If you create a group that includes, for example, managed instances from a specific location, provide a name or description indicative of the location. Step 4 Select the Group made by selecting each Managed Object radio button and click Next. The Monitored Resources/Group Members window is displayed. Populate the Group Members table using any combination of the following methods: Expand folders in the Monitored Resources panel, select one or more devices (Ctrl plus click), and select Add. Enter a device name or IP address in the Search for Devices field and click Go. Select one or more devices and select Add. Select Search. The Search for Members window is displayed. For more information, see Searching for Group Members, page 6-4. Remove any objects by selecting them and clicking Remove. 6-3

4 Managing Groups Chapter 6 Step 5 Step 6 Select the Auto Create Reports check box to automatically generate appropriate reports for this group during the daily report generation cycle. Selecting this check box enables Service Statistics Manager to generate a new set of reports that includes data only for the managed instances that you selected in Step 4. The set of reports depends on the type of managed instances selected. For more information on monitor types and their auto-created reports, see Table 6-1. Click Finish. Table 6-1 Monitor Types and Reports that Are Automatically Created for a Group Monitor Type Call Quality Call Volume By Cluster IPSLA Data Jitter IPSLA Gatekeeper RD IPSLA Ping Echo IPSLA Ping Path Echo IPSLA UDP Echo Unified CM Performance Default Reports that Service Statistics Manager Creates Automatically Percentage Distribution of Service Quality Clusters by Time Weekly Distribution of Service Quality Across Clusters by Time Monthly Service Quality Distribution Across Clusters Monthly Service Quality Percentage Distribution Across Clusters Monthly Average Call Duration Across Clusters Monthly Average Call Duration versus Volume Across Clusters Monthly Average Duration of Calls Across Clusters Monthly Call Completion Rate Across Clusters Monthly Call Duration Across Clusters Monthly Call Traffic and Duration Across Clusters Daily Call Volume Across Clusters Monthly Call Volume Report on H.323 Gateways Daily Failed Calls Across Clusters Monthly Service Availability Across Clusters Weekly Top N Service Availability Across Clusters by Time Monthly Total Duration Across Clusters Monthly IPSLA Data Jitter Statistics IPSLA Gatekeeper Reg Delay Statistics IPSLA Ping Echo Statistics IPSLA Ping Path Echo Statistics IPSLA UDP Echo Statistics Detailed Performance Daily Searching for Group Members When you add or edit a group (see Editing a Group, page 6-6) and click Search, the Search for Members window appears. You can use it to specify filters, find matching monitors, and add the monitors to the group that you are working with. Select one radio button and select a filter from the associated list: 6-4

5 Chapter 6 Managing Groups Group If you have defined groups, select one group to obtain a list of all monitors in it. Source Agent Select an SSM Agent from those installed on Operations Manager or Service Monitor systems to obtain a list of all monitor types and devices on the selected system. For more information, see Service Monitor Database Monitor Types, page A-2 and Operations Manager File-Based Monitor Types, page A-18. Target Device Select a device from those associated with Service Statistics Manager to obtain a list of monitors for the selected device. For more information, see Devices and Associated Monitor Types, page A-1. Monitor Type Select one to find all monitors of this type. If you select Monitor Type, you can further refine your search by using the Attribute, Operator, and Attribute Value fields. Step 4 Click OK. The Search Results window displays a table with the following: Type Monitor type. Path Name The system and the device or IPSLA test name in this format: System name\device IP or IPSLA test name. To remove entries from the Search Results window, select them and click Remove. The Search Results window displays the remaining entries. Select the entries that you want to move from the Search Results window to the Search Members window and click Add. The Search Results window closes and the Search Members window is displayed. Adding a Group by Selecting Groups Choose from other groups (child groups) to create a parent group. You can display parent and child groups hierarchically on the SSM Administration Console; for more information, see Defining Group Display, page 6-6. Step 4 Step 5 Right-click the Group folder and select Add Group. The Add Group window is displayed. Enter data in these fields: Group Name Unique name with a maximum length of 30 characters and no spaces. Group Description (Optional) Meaningful description. Select the Group made by grouping existing groups radio button and click Next. The Add Group window is displayed. To populate the Child Groups list, click Add. The Group Chooser dialog box appears. Select the Auto Create Reports check box to automatically generate appropriate reports for this group during the daily report generation cycle. Selecting this check box enables Service Statistics Manager to generate a new set of reports that includes data only for the managed instances that you selected in Step 4. The set of reports will depend on the type of managed instances selected. For more information on monitor types and their auto-created reports, see Table 6-1. You can select Auto Create Reports only when you add a group. 6-5

6 Managing Users Chapter 6 Step 6 Step 7 Select groups and click OK. The Group Chooser dialog box closes. Click Finish. Defining Group Display By default, groups are displayed in a flat list. You can alternatively display groups as a hierarchy. In a hierarchical display, you must expand parent group folders to view child groups. Right-click the Group folder; select Display Group and select one of the following: Flat To display all groups in a list. Hierarchical To display a hierarchy of parent and child groups. Editing a Group You can select or deselect the Auto Create Reports check box only when you add a group, not when you edit one. However, you can change anything else about the group, including the group name and whether the group is composed of groups or individually selected managed instances. Right-click the group and click Edit Group. The Edit Group window is displayed. Editing a group is similar to adding a group. For more information, see one of these topics: Adding a Group by Selecting Each Instance, page 6-3 Adding a Group by Selecting Groups, page 6-5 Deleting a Group If you delete a parent group, the child groups remain. Right-click the group and select Delete. The Confirm Deletion window is displayed. Click OK. Managing Users The User folder contains Service Statistics Manager administrator and user accounts, enabling you to control and identify who has access to the system. From this folder, you can add, edit, and delete administrator and user accounts and you can edit roles. When you add or edit a user, you must assign a role or access control for the user. Roles control: Which groups and views a user can access. Whether a user can access the SSM Administration Console. 6-6

7 Chapter 6 Managing Users For more information, see Managing User Roles and Privileges, page 6-8. User activity on Service Statistics Manager is recorded in the access log file, access.log, which is available in this directory: Installation Directory/pronto/logs/ Adding a User Right-click the User folder and select Add User. The Add User window is displayed. Enter data: Login Username for logging into Service Statistics Manager; enter at least 5 characters. The default login name and password for Administrators is admin. Step 4 Step 5 Password Password for the username. Re-enter Password Password again for verification. Address User s address. Force Change Password Select to force the user to change the password at first login. Select the role that should govern this user account. System-defined roles are: Administrator Capacity Planner Executive Operations To add more roles, click Add (adjacent to the Role field). For more information, see Adding a Role, page To view or edit an existing role, click View/Edit (adjacent to the Role field). For more information, see Editing a Role, page Users obtain access rights from the selected role. Therefore, select the role appropriately. Select Administrator to assign access to the SSM Administration Console and full configuration privileges to the Service Statistics Manager system and SSM Agents. Click Add to add the new user. A confirmation message is displayed. Click Done to exit the Add User window after adding all required users. Editing a User Use this procedure to reset the user password or to change the user role. You can change any user information except the username. 6-7

8 Managing User Roles and Privileges Chapter 6 Expand the User folder. Right-click the user to edit, and click Edit. The Edit User window is displayed. The procedure to edit a user is similar to that of adding a new user. After making the required changes, click OK. For more information, see Adding a User, page 6-7. Deleting a User After you delete a user, SLAs and reports created by the user remain. However, the owner for these SLAs and reports is displayed as None. Expand the User folder. Right-click the user to delete, and click Delete. A confirmation window appears. Click OK. Managing User Roles and Privileges Every user is assigned a role. Roles control user access to views, groups, reports, and SLAs in Service Statistics Manager. Roles also control user access to the SSM Administration Console. There are two classes of roles: Administrator Class A role in the Administrator class enables access to both the SSM Administration Console and Service Statistics Manager. Service Statistics Manager provides one default: Role in the Administrator class The default role is also named Administrator. User in the Administrator role The default username is admin. The default user admin and any other user with a role in the Administrator class can create additional users and additional roles (as well as use all features of the SSM Administration Console.) User Class A role in the User class does not provide access to the SSM Administration Console, but does enable some access to Service Statistics Manager. Service Statistics Manager provides three default roles in the User class: Capacity Planner Executive Operations Table 6-2 lists default roles by class, Service Statistics Manager tasks and components, and default access granted to each role. 6-8

9 Chapter 6 Managing User Roles and Privileges Table 6-2 Default Roles and Privileges for Service Statistics Manager Tasks and Components Task or Component SSM Administrator Console A user in a role in the Administrator Class can access this component and all of its features. This is the only component or task that is exclusive to a user role in the Administrator class. Administrator Class Administrator Role User Class Capacity Planner Role Executive Role Operations Role X Service Statistics Manager Administration Tab Selected Advanced Administration Tasks If you want to configure a role in the User class with the privilege to perform these tasks, you can do so. Allow Auto Discovery Allow Configure Call Quality Ranges X Allow Configure Phone Based Groups A user who has privileges to manage either SLAs or Reports can also manage attribute sets and schedules. Service Statistics Manager Views Tab Manage Views (Add, Edit, Delete) X X X X Access All Views or Selected Views All All Selected: Selected: The selected views listed in this Call Duration Call Analysis table are those that are selected Call Volume Operations Home by default when you first install Service Statistics Manager. Executive Home Performance Service Availability Service Quality Top N Service Statistics Manager Groups Groups are user-defined; users with access to the SSM Administration Console can create groups. Service Statistics Manager does not provide default groups. Access All Groups or Selected Groups All All All All Service Statistics Manager SLAs Tab Users on a system with a Standard license cannot access the SLA tab and cannot manage or access SLAs. SLAs are user-defined; Service Statistics Manager does not provide default SLAs. Manage SLAs (Add, Edit, Delete) X Access All SLAs or Selected SLAs. All All All All 6-9

10 Managing User Roles and Privileges Chapter 6 Table 6-2 Default Roles and Privileges for Service Statistics Manager Tasks and Components (continued) Task or Component Service Statistics Manager Reports Tab Manage Reports (Add, Edit, Delete) X Access Available Reports or Selected Reports Administrator Class Administrator Role Available Reports Service Statistics Manager provides default reports; for a list, see Default Reports, page 3-3. User Class Capacity Planner Role Executive Role Operations Role A report defined in Service Statistics Manager can be private (accessible only to the creator of the report) or shared with the user group that is, users in the same role or shared with everyone. A user in a role with access to selected reports cannot access shared reports unless they have been added to the list of selected reports for the role. Adding a Role Service Statistics Manager provides these default roles Administrator, Executive, Capacity Planner, and Operations. For more information, see Managing User Roles and Privileges, page 6-8. Step 4 Step 5 Expand the Advanced Options folder. Right-click the Role folder and select Add Role. The Add Role window opens to the General tab. Enter a unique name for the role. Update selections on the General Tab: User Class Select one of these: Administrator A role in this user class provides access to both the SSM Administration Console and Service Statistics Manager. User A role in this user class enables a user to access Service Statistics Manager only. Allow Auto Discovery For more information, see Integrating with Operations Manager and Service Monitor, page 7-8. Allow Configure Call Quality Ranges. Allow Configure Phone Based Groups For more information, see Configuring Phone-Based Groups, page 7-7. Select the Views tab: Select or deselect Allow View Management Enables users in this role to create, edit, and delete views in Service Statistics Manager. Select one of these: All Views Provide users in this role with access to all views. Selected Views Provide users in this role with access to those on the Allowed Views list only. Move views between All Views and Allowed Views using the Add >> and Remove << buttons. 6-10

11 Chapter 6 Managing User Roles and Privileges Step 6 Step 7 Step 8 Select the Groups tab and select one of these: All Groups Provide users in this role with access to all groups. Selected Groups Provide users in this role with access to groups on the Allowed Groups list. Move groups between the All Groups and Allowed Groups lists using the Add >> and Remove << buttons. Select the SLAs tab: Manage SLAs Select or deselect. Enables users in this role to create, edit, and delete: SLAs For more information, see Using SLA Administration to Manage SLAs, page 5-9. Schedules For more information, see Configuring Schedules, page 7-5. Attribute Sets For more information, see Configuring Attribute Sets, page 7-3. Select one of these: All SLAs Provide users in this role with access to all SLAs. Selected SLAs Select to provide user access to selected SLAs in the system. Move SLAs between the All SLAs and Allowed SLAs lists using the Add >> and Remove << buttons. Select the Reports tab: Manage Reports (create, edit, delete) Select or deselect. Enables users in this role to create, edit, and delete: Reports specified on this tab For more information, see Managing Reports, page Schedules For more information, see Configuring Schedules, page 7-5. Attribute Sets For more information, see Configuring Attribute Sets, page 7-3. Select one of these to specify reports: Available Reports Provides access for users in this role to all reports created with either the Share this report with everybody or Share this report with my user group option, available to users with this access control. Private reports are available only to the report owner (the user who created the report). Report access (private/public/user group) can be specified while configuring the report. For more information, see Managing Reports, page My user group refers to all users that have the same user role. For more information, see Managing Users, page 6-6. Step 9 Selected Reports Click to choose reports that must be available to users with this access control. Users with this access control can view or manage only those reports that are selected here. A report created with the Share this report with everybody option can be viewed by users only if the report is made available to them. Move reports between the All Reports and Allowed Reports lists using the Add >> and Remove << buttons. Click Add to save the settings and finish defining the role. 6-11

12 Managing Remote Agents Chapter 6 Editing a Role Caution It is highly recommended that you do not change the default roles Administrator, Capacity Planner, Executive, and Operations. Expand the Advanced Options folder and expand the Role folder. Right-click the role that you want to edit and select Edit. The Edit Role window is displayed. For a description of each tab and the options on each, see Adding a Role, page Deleting a Role Service Statistics Manager will not permit you to delete the Administrator role. Caution Do not delete the default roles Capacity Planner, Executive, and Operations. If you delete a role, users assigned to that role are also deleted. Expand the Advanced Options folder and expand the Role folder. Right-click the role that you want to delete and select Delete. A confirmation window appears. Click OK. Managing Remote Agents SSM Agents spawn the creation of monitors, collect data, and deliver it to Service Statistics Manager for storage in the database. Remote SSM Agents are those agents that reside on systems outside the Service Statistics Manager server. An SSM Agent cannot be connected to more than one Service Statistics Manager server simultaneously. After an SSM Agent is disconnected from a Service Statistics Manager server, the SSM Agent can be connected to any other Service Statistics Manager server. If a server with Service Statistics Manager or SSM Agent is rebooted or shut down for any reason, or if the network goes down, the server and SSM agents reconnect automatically on restart. Local Agents versus Remote Agents Generally, all monitors that require direct access to Operations Manager or Service Monitor local resources require an agent on that same system. For example, to parse a log file, the agent must reside on the system where the log file exists in order to access it. 6-12

13 Chapter 6 Managing Remote Agents The SSM Agent that resides on the Service Statistics Manager server is named SSMServer and must retain this name. Adding a Remote SSM Agent The normal procedure for adding a remote SSM Agent is: 1. Install the SSM agent software on the remote system. For more information, see Installing SSM Agent on Another System, page Run discovery. For more information, see Triggering Discovery, page 7-9 or Retriggering Discovery, page If discovery fails to add a remote SSM Agent: 1. Ensure that a valid username and password for Operations Manager is provided during discovery. If necessary, supply another username and password and run discovery again; see Retriggering Discovery, page If discovery continues to fail, perform the tasks in SSM Agent Troubleshooting Tips, page Use the following procedure to add the remote SSM Agent. Expand the Advanced Options folder, right-click the SSM Agents folder, and select Add SSM Agent. The Add Device and Agent window appears, opened to the Configuration tab. Enter the following required information: Device Type Select Server. Device Name Enter a descriptive name for the agent. Do not give the name SSMServer to a remote SSM Agent. SSMServer is reserved for use only as the name of the local SSM Agent on the Service Statistics Manager server. Step 4 Step 5 Step 6 IP Address Enter the IP address or hostname (if using DNS) of the Operations Manager or Service Monitor server with the SSM Agent that you want to add to Service Statistics Manager. Click Next. (Optional) Select a group on the Groups Tab. (Groups are user-defined in the SSM Administration Console; see Managing Groups, page 6-3.) If you select a group, the monitors that the SSM Agent creates will also be added to this group. Click Next. The Add Device and Agent window displays fields listed in the next step. Provide data in these fields: Control Port The default control port (TCP connection port) is It is highly recommended that you use the default control port unless there is no other alternative. If you must change the port, click Close, complete the task Changing the TCP Connection Port for a Remote SSM Agent, page 6-14, and return to. Agent Name The default value is the device name specified on the previous screen. Agent IP Address The default value is the IP address (or name of the agent if using DNS) entered in the IP Address field. 6-13

14 Managing Remote Agents Chapter 6 Step 7 Step 8 Step Associated Device Lists devices with the same IP address as the IP address entered in, which is selected by default. Connection to Server Select Direct Access using TCP/IP. (The SSM agent does not use SSL TCP/IP.) Click Next to create the agent. After the agent is created, a second Add Agent window is displayed to allow selection of monitors for the system. Select the monitors. For a list of the monitor types that are associated with the devices in Operations Manager and Service Monitor, see Devices and Associated Monitor Types, page A-1. To view the new agent, close the SSM Agents folder and expand it again. Click Finish. Service Statistics Manager registers the new agent and creates the specified monitors. The status of each action is listed on the screen. Click OK. Changing the TCP Connection Port for a Remote SSM Agent You must specify the control port for each remote SSM Agent that you add or edit. It is highly recommended that you use the default control port, 12124, unless there is no other alternative. If you must change the control port, use the following procedure. Log in as a Windows system administrator to the system where the SSM Agent resides. Open the pronet.conf file in this folder: Installation Directory\agent\pronto\conf\ Change the port number in this property: pronet.apps.agent.port=number Step 4 Close the pronet.conf file and restart the SSM Agent; see Restarting an SSM Agent, page SSM Agent Troubleshooting Tips If you have more than one NIC enabled on your system, see Recovering from Discovery Failure, page If an error message is displayed while discovery is running or while you are trying to connect SSM agent with the Service Statistics Manager server, see Recovering from Agent Not Active Error, page If your system is not correctly configured, various problems can occur: SSM Agent status can be inactive Discovery can fail Login can fail Use the following procedure to determine the problem and resolve it. 6-14

15 Chapter 6 Managing Remote Agents From the Service Statistics Manager system, ping the SSM Agent machine. If the SSM Agent machine does not respond, continue to. As a Windows administrator, log into the SSM Agent system and check the port number used by the pronet_agent process (the SSM Agent): a. Open the pronet.conf file in this folder: Install Directory\agent\pronto\conf\ b. Look for this property: pronet.apps.agent.port=number c. Verify that the pronet.apps.agent.port number matches the port number in the SSM Agent object instance (displayed in the SSM Administration Console folder under Advanced Options > SSM Agent). If the port number is the same, proceed to. d. Do one of the following: Change the pronet.apps.agent.port number in the pronet.conf file and restart the SSM Agent (see Restarting an SSM Agent, page 6-18). Change the SSM Agent object by deleting and recreating it. See Deleting an SSM Agent, page 6-17 and Adding a Remote SSM Agent, page Check whether another licensed Service Statistics Manager server has already connected to this agent; on the agent machine, issue this command: netstat -an The connection is OK if the port number matches the port number listed in the cntlmod.ini file and the port is in the listen state. In the example below, port number is in the listen state; the connection is OK. * *.* LISTEN If the connection is OK, proceed to Step 4. A conflict exists if the netstat command shows a connection with another Service Statistics Manager. In the example below, the second IP address is a second Service Statistics Manager ESTABLISHED Step 4 Step 5 Disable the connection from one of the Service Statistics Managers. See Disconnecting an SSM Agent, page Check whether the SSM Agent is behind a firewall. If so, check whether the port that the SSM Agent is using is disabled on the firewall. Check whether the port is being used by another application on the SSM Agent machine. Service Statistics Manager supports SSM Agent installation only on systems with applications from the Cisco Unified Communications Management Suite, such as Operations Manager and Service Monitor. 6-15

16 Managing Remote Agents Chapter 6 Recovering from Discovery Failure If discovery fails, confirm that only one NIC is enabled on your system. If more than one NIC is enabled, do this: 1. Disable all but one NIC. 2. From the SSM Administration Console, delete the SSM Agent. (See Deleting an SSM Agent, page 6-17.) 3. Start discovery again; see Retriggering Discovery, page Recovering from Agent Not Active Error The following error might be displayed when running discovery or connecting an SSM Agent to the Service Statistics Manager server: The Agent has been created but is not active. Monitors will not be added. This can be caused by (1) Agent slow in initializing (2) Agent not properly installed on device (3) Agent Version being higher than Server Version. If (1), you can click on the Next button to re-connect so that you can add monitors. Or If (2), you can re-type the correct information and click Next. Or, hit the Close button and add the monitors at a later time. If you continue without correcting the information, the SSM Agent is added to the SSM Agents folder, but the SSM Agent is not connected. You should: 1. Delete the inactive SSM Agent: a. In the SSM Administration Console, right-click the SSM Agent. b. Select Delete. 2. Correct problems (see troubleshooting information). 3. Retry making the connection (retrigger discovery or add the agent again). Understanding Communication Between an SSM Agent and the Service Statistics Manager Server SSM Agent connection and communication occur over TCP. A TCP agent passively waits for a connection from the server by listening on a TCP port (port by default). When adding an SSM Agent, the Service Statistics Manager server tries to contact the agent and establish a connection with it. Editing an SSM Remote Agent To resume data collection after the system date and time has been changed on the system where an SSM Agent is installed, you must restart the SSM Agent; see Restarting an SSM Agent, page Expand the Advanced Options and SSM Agents folders. Right-click the SSM Agent to be edited and select Edit. The Edit SSM Agent window is displayed. Update data in any of these fields: Control Port The default control port (TCP connection port) is It is highly recommended that you use the default control port unless there is no other alternative. If you must change the port, click Close, complete the task Changing the TCP Connection Port for a Remote SSM Agent, page 6-14, and return to. 6-16

17 Chapter 6 Managing Remote Agents Agent Name Enter a descriptive name. Do not change the name of the local SSM Agent; it must retain the name SSMServer. Step 4 Agent IP Address Enter the IP address of the system where the SSM Agent is installed. Associated Device Device associated with this agent. Click OK. If you have changed any values, click OK. If you do not click OK, changes will not be saved. Deleting an SSM Agent When you delete an SSM Agent, the monitors that the agent created and for which the agent coordinated data collection are also deleted. When you delete an SSM Agent, the SSM Administration Console displays the following confirmation message: All monitors associated with this SSM Agent will be deleted. To completely and permanently remove an SSM Agent, you should also uninstall the SSM Agent software; see Uninstalling a Remote SSM Agent, page Expand the Advanced options and the SSM Agents folder. Right-click the agent to delete, and select Delete. If the SSM Agent is currently monitoring applications, a warning message is displayed. Caution Step 4 Do not delete SSMServer. This is the local SSM Agent on the Service Statistics Manager server; it must always appear in the SSM Agents folder. A confirmation window is displayed. Click OK. To confirm that the agent has been deleted, close and then expand the SSM Agents folder. Connecting an SSM Agent Expand the Advanced Options and SSM Agents folders. 6-17

18 Managing Remote Agents Chapter 6 Right-click the SSM Agent and select Connect Agent. If an error is displayed, see Recovering from Agent Not Active Error, page 6-16 Disconnecting an SSM Agent Expand the Advanced Options and SSM Agents folders. Right-click the SSM Agent and select Disconnect Agent. If Disconnect Agent is dimmed, the agent is already disconnected. After you disconnect an SSM Agent from one Service Statistics Manager server, you can connect the SSM Agent to another Service Statistics Manager server. Restarting an SSM Agent Expand the Advanced Options and SSM Agents folders. Verify that the agent status is Connection Active: a. Right-click the SSM Agent and select Edit. The Edit SSM Agent window appears. b. See Agent Status at the top of the window. If Agent Status is Connection Active, continue to. You cannot restart the agent until Agent Status is Connection Active; see SSM Agent Troubleshooting Tips, page Right-click the SSM Agent and select Restart Agent. 6-18

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

QUICK START GUIDE Cisco Unified Service Statistics Manager, 9.0

QUICK START GUIDE Cisco Unified Service Statistics Manager, 9.0 QUICK START GUIDE Cisco Unified Service Statistics Manager, 9.0 1 Cisco Unified Service Statistics Manager Overview 2 Server and Client System Requirements 3 Installation and Upgrade Paths 4 Installing

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1)

Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1) Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1) Cisco Unified CallManager uses a Lightweight Directory Access Protocol (LDAP) directory to store data as well as authentication

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Cisco CTL Client Setup

Cisco CTL Client Setup This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove

More information

Features - SRM Windows File System Agent

Features - SRM Windows File System Agent Page 1 of 53 Features - SRM Windows File System Agent Table of Contents Overview System Requirements - SRM Windows File System Agent Installation Install the SRM Windows File System Agent Install the SRM

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

Configuring Vulnerability Assessment Devices

Configuring Vulnerability Assessment Devices CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful

More information

Microsoft SQL Installation and Setup

Microsoft SQL Installation and Setup This chapter provides information about installing and setting up Microsoft SQL. Encrypted Database Not Supported, page 1 Install and Setup Microsoft SQL Server, page 1 Database Migration Required for

More information

Defining IPsec Networks and Customers

Defining IPsec Networks and Customers CHAPTER 4 Defining the IPsec Network Elements In this product, a VPN network is a unique group of targets; a target can be a member of only one network. Thus, a VPN network allows a provider to partition

More information

Cisco IMC Smart Plugin 1.0 For HP Operations Manager - Windows

Cisco IMC Smart Plugin 1.0 For HP Operations Manager - Windows Cisco IMC Smart Plugin 1.0 For HP Operations Manager - Windows Operations Guide Mar 12 th, 2014 Table of Contents 1 INTRODUCTION... 1 1.1 VIEWING FAULTS IN HPOM... 1 2 PLUGIN FEATURES... 7 2.1 EDITING

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

MassTransit Server Installation Guide for Windows

MassTransit Server Installation Guide for Windows MassTransit 6.1.1 Server Installation Guide for Windows November 24, 2009 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail: info@grouplogic.com

More information

Using CSC SSM with Trend Micro Damage Cleanup Services

Using CSC SSM with Trend Micro Damage Cleanup Services APPENDIXD Using CSC SSM with Trend Micro Damage Cleanup Services Trend Micro InterScan for CSC SSM works with Trend Micro Damage Cleanup Services (DCS) as part of an enterprise protection strategy. The

More information

Installing Double-Take

Installing Double-Take Installing Double-Take Overview For Double-Take Replication to take place, you must have the following requirements: Double-Take Availability installed on the Source Server Double-Take Availability installed

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

1 Installing the integration server

1 Installing the integration server 1 Installing the integration server This document contains information about how to install the Rational DOORS for HP Quality Center Interface integration server. Installing the integration server also

More information

Device Manager. Managing Devices CHAPTER

Device Manager. Managing Devices CHAPTER 2 CHAPTER This chapter describes how to perform routine device management tasks using the Administrator Console. It provides information on managing the devices within your Cisco VXC Manager environment.

More information

Web Console Setup & User Guide. Version 7.1

Web Console Setup & User Guide. Version 7.1 Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

User Guide for Cisco Unified Service Statistics Manager

User Guide for Cisco Unified Service Statistics Manager User Guide for Cisco Unified Service Statistics Manager Cisco Unified Communications Management Suite Software Release 1.3 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install the TS Agent Before You Begin Confirm that the

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices

More information

Real-Time Monitoring Configuration

Real-Time Monitoring Configuration CHAPTER 7 This chapter contains the following information for configuring the Cisco Unified Presence Server Real-Time Monitoring Tool (RTMT). Some options that are available in the current version of the

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

Scheduling Meetings. Tips for Scheduling Secure Cisco Unified MeetingPlace Meetings

Scheduling Meetings. Tips for Scheduling Secure Cisco Unified MeetingPlace Meetings Scheduling Meetings Release: 7.0 Revision Date: December 9, 2009 1:30 pm Tips for Scheduling Secure Cisco Unified MeetingPlace Meetings, page 1 How to Schedule a Web Meeting, page 2 How to Schedule a Video

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Active Directory 2000 Plugin Installation for Cisco CallManager

Active Directory 2000 Plugin Installation for Cisco CallManager Active Directory 2000 Plugin Installation for Cisco CallManager Document ID: 15323 Contents Introduction Prerequisites Requirements Components Used Conventions Before You Begin Task 1: Create the Cisco

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Installing the Cisco Unified MeetingPlace Web Server Software

Installing the Cisco Unified MeetingPlace Web Server Software Installing the Cisco Unified MeetingPlace Web Server Software Release 8.5 Revised: 2/19/13 : Install the Application Server (which includes the Software Media Server) : Install the Hardware Media Server

More information

Installing and Configuring Cisco Unified Real-Time Monitoring Tool

Installing and Configuring Cisco Unified Real-Time Monitoring Tool CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

Sophos Connect. help

Sophos Connect. help help Contents About... 1 Installing...1 Uninstalling... 1 Connections...3 Import connection... 3 Connect...4 Connection options...7 Events...9 Troubleshooting events... 10 General troubleshooting... 13

More information

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version Version 3.1 TNT SOFTWARE ELM Log Manager Administrator s Guide TNT SOFTWARE ELM Log Manager 3.1 Administrator s Guide Copyright 1997-2003 TNT Software All Rights Reserved 2001 Main Street Vancouver, WA

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server 1 Table of Contents What is OfficeCalendar? Sharing Microsoft

More information

Installing and Configuring Cisco Unified Real-Time Monitoring Tool

Installing and Configuring Cisco Unified Real-Time Monitoring Tool CHAPTER 2 Installing and Configuring Cisco Unified Real-Time Monitoring Tool You can install Cisco Unified Real-Time Monitoring Tool (RTMT), which works for resolutions 800*600 and above, on a computer

More information

Reinstalling the Operating System on the Dell PowerVault 745N

Reinstalling the Operating System on the Dell PowerVault 745N Reinstalling the Operating System on the Dell PowerVault 745N This document details the following steps to reinstall the operating system on a PowerVault 745N system: 1. Install the Reinstallation Console

More information

Getting Started with Prime Network

Getting Started with Prime Network CHAPTER 1 These topics provide some basic steps for getting started with Prime Network, such as how to set up the system and the basic parts of the Prime Network Administration GUI client. Basic Steps

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

Configuring Service Monitor

Configuring Service Monitor CHAPTER 3 The following topics are included: Configuring Trap Receivers, page 3-2 Understanding and Setting Data Source Credentials, page 3-2 Managing the Phone Count, page 3-15 Configuring Settings for

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Troubleshooting Cisco DCNM

Troubleshooting Cisco DCNM 18 CHAPTER This chapter describes some common issues you might experience while using Cisco Data Center Network Manager (DCNM), and provides solutions. Note For troubleshooting Cisco DCNM server installation

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

Using NetShow Commands

Using NetShow Commands CHAPTER 10 Network show (NetShow) commands represent a set of read-only commands. These are primarily, show commands that you can run on devices that are managed in LMS. You can specify the commands that

More information

SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v Administration Guide

SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v Administration Guide SteelEye Protection Suite for Windows Microsoft Internet Information Services Recovery Kit v8.0.1 Administration Guide March 2014 This document and the information herein is the property of SIOS Technology

More information

OAISYS Administrative Guide

OAISYS Administrative Guide OAISYS Administrative Guide Version 5 10/06/2008 OAISYS 7965 S. Priest Drive, Suite 105 Tempe, AZ 85284 (480) 496-9040 OAISYS Administrator Guide 1 Table of Contents: Table of Contents:... 2 OAISYS Administrative

More information

Dameware ADMINISTRATOR GUIDE. Version Last Updated: October 18, 2017

Dameware ADMINISTRATOR GUIDE. Version Last Updated: October 18, 2017 ADMINISTRATOR GUIDE Dameware Version 12.0 Last Updated: October 18, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/dameware_remote_support_mini_remote_control 2017

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

PortAssist Manager Users Guide

PortAssist Manager Users Guide PortAssist Manager Users Guide Introduction PAM Architecture Planning and Preparation Installation Requirements About UDP and HTTP Ports Setup: Windows NT 4.0 Master Setup Process Installing and Configuring

More information

Perceptive Reflect. Installation and Setup Guide. Version: 2.3.x

Perceptive Reflect. Installation and Setup Guide. Version: 2.3.x Perceptive Reflect Installation and Setup Guide Version: 2.3.x Written by: Product Documentation, R&D Date: September 2016 2012 Lexmark International Technology SA. All rights reserved Perceptive Reflect

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Configuring IP SLAs ICMP Echo Operations

Configuring IP SLAs ICMP Echo Operations This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices

More information

Yong Peng High School System Documentation PC Section

Yong Peng High School System Documentation PC Section Yong Peng High School System Documentation PC Section Kent Ong Date: 26 May 2008 System Engineer Revision 1 Liew Toh Seng System Consultant Table of Contents Preface...1 Network Configuration (Manual Configuration)...1

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

SSL VPN Reinstallation

SSL VPN Reinstallation SSL VPN Reinstallation This software reinstallation procedure describes how to reinstall the software onto a previously formatted and programmed hard disk drive (HDD) on the Contivity SSL VPN 1000 card.

More information

Getting Started with VMware View View 3.1

Getting Started with VMware View View 3.1 Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation

More information

Accops HyWorks v3.0. Quick Start Guide. Last Update: 4/25/2017

Accops HyWorks v3.0. Quick Start Guide. Last Update: 4/25/2017 Accops HyWorks v3.0 Quick Start Guide Last Update: 4/25/2017 2017 Accops Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Technologies

More information

Configuring IP SLAs ICMP Echo Operations

Configuring IP SLAs ICMP Echo Operations This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices

More information

Accessing Data from the Web Interface

Accessing Data from the Web Interface 5 CHAPTER This chapter provides information about accessing Prime Performance Manager data from Prime Performance Manager web interface. This chapter contains: Supported Browsers, page 5-1 Accessing Prime

More information

Intercluster Peer Configuration

Intercluster Peer Configuration Prerequisites for Intercluster Deployment, page 1, page 2 Prerequisites for Intercluster Deployment You configure an intercluster peer between the IM and Presence database publisher nodes in standalone

More information

Managing CX Devices in Multiple Device Mode

Managing CX Devices in Multiple Device Mode Tip Device inventory management applies to PRSM in Multiple Device mode only. If you are configuring a CX device through a direct connection to the device, you do not need to add the device to the inventory

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Table of Contents What is OfficeCalendar? Sharing Microsoft Outlook

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Hollins University VPN

Hollins University VPN Hollins University VPN Hollins is now using Palo Alto for its network security and VPN gateway. You will need to install the new VPN client called GlobalProtect to gain access to the Hollins network remotely.

More information

Using Double-Take in a Network Address Translation (NAT) Environment

Using Double-Take in a Network Address Translation (NAT) Environment Using Double-Take in a Network Address Translation (NAT) Environment Using Double-Take in a Network Address Translation (NAT) Environment published October 2002 NSI and Double-Take are registered trademarks

More information

Finding Support Information for Platforms and Cisco IOS Software Images

Finding Support Information for Platforms and Cisco IOS Software Images First Published: June 19, 2006 Last Updated: June 19, 2006 The Cisco Networking Services () feature is a collection of services that can provide remote event-driven configuring of Cisco IOS networking

More information

User Agent Preparing the Windows Environment and Installing the User Agent. How-To

User Agent Preparing the Windows Environment and Installing the User Agent. How-To User Agent 1.1.5 Preparing the Windows Environment and Installing the User Agent How-To CONTENTS Introduction to the User Agent... 2 Selecting the User Account to Run the User Agent... 3 Setting Access

More information

Table of Contents. Page 1 of 82. Install the Exchange idataagents Install the Exchange idataagents - Clustered Environment -Virtual Server

Table of Contents. Page 1 of 82. Install the Exchange idataagents Install the Exchange idataagents - Clustered Environment -Virtual Server Page 1 of 82 Features - Exchange Public/Web Folder idataagent Table of Contents Overview System Requirements - Microsoft Exchange Public/Web Folder idataagent Installation Install the Exchange idataagents

More information

Perceptive Process Mining

Perceptive Process Mining Perceptive Process Mining Installation and Setup Guide Version: 2.8.x Written by: Product Knowledge, R&D Date: September 2016 2014-2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International,

More information

Installation. Power on and initial setup. Before You Begin. Procedure

Installation. Power on and initial setup. Before You Begin. Procedure Power on and initial setup, page 1 Customize ESXi host for remote access, page 4 Access and configure ESXi host, page 6 Deploy virtual machines, page 13 Install applications on virtual machines, page 14

More information

CompleteView Video Proxy User Manual. CompleteView Version 4.6.1

CompleteView Video Proxy User Manual. CompleteView Version 4.6.1 CompleteView Video Proxy User Manual CompleteView Version 4.6.1 Table of Contents Minimum System Requirements... 4 Installation... 5 Configuring the Video Proxy... 8 Add an Administrator Account... 10

More information

NetBrain OE System Quick Start Guide

NetBrain OE System Quick Start Guide NetBrain Technologies Inc. NetBrain OE System Quick Start Guide For Operator Edition Administrators Table of Contents 1. Install NetBrain OE System... 3 1.1 Install Gateway Server... 4 1.2 Install Network

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Virtualized Server Environments Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to

More information

Privileged Access Access Console User Guide 17.1

Privileged Access Access Console User Guide 17.1 Privileged Access Access Console User Guide 17.1 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

User Manual. Version 5.8

User Manual. Version 5.8 User Manual Version 5.8 Information in this document is subject to change without notice. Copyright 2013-2018, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark of Exacq Technologies,

More information

Google Search Appliance

Google Search Appliance Google Search Appliance Configuring GSA Mirroring Google Search Appliance software version 7.2 Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com GSA-MIR_100.08 December 2013

More information

Configuring IP SLAs FTP Operations

Configuring IP SLAs FTP Operations This module describes how to configure an IP Service Level Agreements (SLAs) File Transfer Protocol (FTP) operation to measure the response time between a Cisco device and an FTP server to retrieve a file.

More information

Welcome to PDQ Inventory

Welcome to PDQ Inventory Getting Started Contents Welcome to PDQ Inventory........ 1 Licensing.................... 2 PDQ Inventory Licensing Mode Comparison.................. 2 PDQ Inventory Product Feature Comparison..................

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Network Tree View. About the Network Tree View CHAPTER

Network Tree View. About the Network Tree View CHAPTER CHAPTER 14 This section provides a description of the network tree view available in the Network Manager. Topics in this section include: About the, page 14-1 Displaying General Information, page 14-4

More information

Step 3 - How to Configure Basic System Settings

Step 3 - How to Configure Basic System Settings Before configuring the IP address and network settings, complete Step 2 - How to Configure IP Address, network Settings, and Firewall. Verify the computer and the are connected to the same network, with

More information

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

29 March 2017 SECURITY SERVER INSTALLATION GUIDE 29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain

More information

Setting Up the Sensor

Setting Up the Sensor CHAPTER 4 This chapter provides information for setting up the sensor. This chapter contains the following sections: Understanding Initialization, page 4-1 Configuring Network Settings, page 4-1 Configuring

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

Overview. ACE Appliance Device Manager Overview CHAPTER

Overview. ACE Appliance Device Manager Overview CHAPTER 1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager

More information