background image

Introduction

1-1

September 2004 202-10058-01

Chapter 1 

Introduction

Audience, Scope, Conventions, and Formats

This reference manual assumes that the reader has basic to intermediate computer and Internet 
skills. This guide uses the following typographical conventions:

This guide uses the following format to highlight special messages:

This manual is written for the ProSafe NMS according to these specifications.

Table 1-1.

Typographical Conventions

italics

Emphasis, books, CDs, URL names

bold 

User input

SMALL

 

CAPS

Screen text, file and server names, extensions, commands, IP addresses

Note: 

This format is used to highlight information of importance or special interest.

Table 1-2.

Manual Scope

Product Version

ProSafe Network Management System

Manual Publication Date

September 2004

Note: 

Product information and updates are available on the NETGEAR Web site at

 

http://kbserver.netgear.com.

Summary of Contents for NMS100 - ProSafe Network Management Software

Page 1: ...September 2004 202 10058 01 202 10058 01 September 2004 NETGEAR Inc 4500 Great America Parkway Santa Clara CA 95054 USA Reference Manual for the ProSafe Network Management System NMS100...

Page 2: ...nstallation of NETGEAR ProSafe Network Management System must use a unique Software License Key Statement of Conditions In the interest of improving internal design operational function and or reliabi...

Page 3: ...ents 2 4 Chapter 2 Installation and Startup Installing the ProSafe NMS Server and Local Console 3 1 Installing the Air Messenger Pro Paging Software 3 2 Starting the ProSafe NMS Server and Local Conso...

Page 4: ...p Objects 4 10 Viewing Device MIB Data 4 11 The MIB Selection Tree 4 11 Manage Menus 4 11 Custom Menus 4 12 Table Display Elements 4 12 Graph Display Elements 4 13 Graph Styles 4 13 Graph Page Control...

Page 5: ...g Network Discovery 6 1 Duration of Network Discovery 6 1 Normal Discovery Map Layout 6 1 Failure Symptoms and Solutions 6 2 Discovery Agent Fails to Connect to the Server 6 3 Incorrect or Missing Com...

Page 6: ...July 2004 202 10036 01 iv Contents...

Page 7: ...anual is written for the ProSafe NMS according to these specifications Table 1 1 Typographical Conventions italics Emphasis books CDs URL names bold User input SMALL CAPS Screen text file and server n...

Page 8: ...e TCP polling Long term trend reports Custom MIB tables with derived MIB expressions RMON I user interface application GUI device support development tools Application programming interfaces with samp...

Page 9: ...NT XP ME and 98 systems All components run on a single system and support one user The map database size is limited to 1 000 objects System Requirements The following table lists the minimum recommen...

Page 10: ...needed So in most cases select SNMP V1 as the device access mode for any SNMP device Since SNMP V1 and V2c are the most common and simplest SNMP protocols this guide will only show you how to use thes...

Page 11: ...Reference Manual for the ProSafe Network Management System NMS100 Introduction 1 5 September 2004 202 10058 01...

Page 12: ...Reference Manual for the ProSafe Network Management System NMS100 1 6 Introduction September 2004 202 10058 01...

Page 13: ...e NMS system you only need to install the Server component as this includes a local console and polling agent 4 Click the Server button You are prompted for the installation directory Then the Discove...

Page 14: ...afe NMS Install Air Messenger Pro menu Follow the installation instructions After you have installed Air Messenger Pro you can configure ProSafe NMS to notify your pager when an event occurs Please re...

Page 15: ...ess 3 Enter the username and password and click OK Initially there is only one user named Administrator with no password Stopping and Starting the Server 1 Go to the Windows Start menu and use the Pro...

Page 16: ...ts Element Function Main Button Bar Buttons and controls to execute common commands quickly Edit Button Bar Buttons to quickly insert Map elements Selection Tool Tabbed control to select objects withi...

Page 17: ...objects shown below Figure 2 3 Edit button bar View All Zoom to Normal 1 1 Zoom In Selected Rectangle Zoom Out Zoom View Find Edit Use Show Hide View Object View Map Objects Object Properties Read Wr...

Page 18: ...s is determined by the highest priority unacknowledged event for that object Select the History tab to show all events including acknowledged and unacknowledged events Select one of the Custom tabs an...

Page 19: ...imized window uses the entire area and hides any other windows behind it If you close a maximized window the next top most window will still be displayed in the maximized state You need to be careful...

Page 20: ...Reference Manual for the ProSafe Network Management System NMS100 2 8 Installation and Startup September 2004 202 10058 01...

Page 21: ...see below Left click on any object name to select that object Use the Shift and Ctrl keys to select multiple objects Use the Delete key to remove selected objects After opening two subnet levels sele...

Page 22: ...w all windows within the View Window area Use the View Map View Root Submap menu to show the top level of the ProSafe NMS map Double click on any subnet name in the Map Selection Tree or subnet icon i...

Page 23: ...e top level includes all router devices and subnet icons The second layer includes single port devices linked to Bus Networks under the appropriate subnet icons The top level map is automatically arra...

Page 24: ...ayer below top level subnet icons Each subnet layer also includes a Bus Network that all devices are attached to You can move devices around the Bus Network by selecting them and dragging them to the...

Page 25: ...of the source and target map subnets 3 Use the Windows Tile Horizontal menu to make both windows fully visible 4 Scroll and zoom the source Map view so the objects you want to move are visible 5 Scro...

Page 26: ...ype can only be changed for network type objects Ring Bus Network 4 For device objects set the object IP Address in the Address edit box This can be in dot format or a DNS name You can also append a U...

Page 27: ...s is shown as Changing these attributes will set the new value for all selected objects The following table describes the access parameters available in the Object Properties Access tab for Device Lin...

Page 28: ...ribute value When editing multiple objects any attribute that has a different value for different objects is shown as Changing these attributes will set the new value for all selected objects Read Wri...

Page 29: ...Poll Interval Seconds between poll sequences D L N Poll Timeout Seconds to wait for a response after a poll is sent D L N Poll Retries Number of times to retry a failed poll during a single poll seque...

Page 30: ...mes 3 Finally select the Attributes tab and set appropriate values for the Poll Interval Poll Timeout and Poll Retries attributes Link A Link object is a line between two icon objects Subnet Device Go...

Page 31: ...re table grid icons listed These are the MIB table definitions that you will be working with 6 Right click on one of the table names and use the View Table or View Graph menu to display the contents o...

Page 32: ...ect the Menu tab of the Selection Tool and press the F1 key Table Display Elements The following figure shows a sample table display and describes the function of table controls Figure 3 3 Table displ...

Page 33: ...g figure shows a sample graph display and the function of graph controls Figure 3 4 Graph display and graph controls Graph Styles In the following figure there are four graph styles Line Bar Distribut...

Page 34: ...ble or disable a variable Use the right click Properties menu to set line properties and scaling for a variable Double click on the Graph View area to show or hide the Legend Control Saving Long term...

Page 35: ...test purposes set the Poll Interval to one minute We recommend that you use a 10 minute poll interval if you have several reports 7 Click OK to save the report using standard settings Viewing Trend D...

Page 36: ...s for each variable in a trend report table 1 To limit polled instances select the report name in the Trend Selection Tree and use the right click Properties menu then use the Instances button 2 Selec...

Page 37: ...seconds Use this for Emergency Status Polling For example poll for UPS battery failure disk full or link down conditions Automatic Trend Baseline ProSafe NMS automatically determines a baseline value...

Page 38: ...the Status Variable to the name of an Integer SNMP variable including an instance e g ifOperStatus 3 Make sure you enter a full variable instance Set the Status Value to the Numeric value for your com...

Page 39: ...ton to add alarms for each variable 4 Select a variable name from the list at the bottom of the Instance Edit dialog 5 Enter a simple expression at the Threshold edit box This is an operator and a num...

Page 40: ...these services to be polled Use the Proto tab of the Config Discovery Polling dialog to enable discovery of the four built in services TCP Service Polling 1 To enable TCP service polling for a device...

Page 41: ...e upper portion of the dialog box Polled Services for this Object to manage polling for the selected device To enable polling of a TCP service for the device 1 Select the service name in the All Servi...

Page 42: ...s 3 Click the Change button Note that service names prepended by an asterisk are built in and cannot be changed or deleted These services are Ftp Telnet Smtp and Web These services use a simplified co...

Page 43: ...d Select the Pager Application Air Messenger Pro or Notify Connect e Select the Enable Tracing to History Log check box Later when you have verified that email works you can disable this option 3 Next...

Page 44: ...ions d Open the pollDeviceDown subtree which contains all event filters for the Device Down event e Right click on the Default event filter and use the Insert Event Filter menu to add a new event filt...

Page 45: ...Click OK to save the new filter 7 Finally test the new Event Filter a Select the Map tab of the Selection Tool and select one of the devices you matched in the new event filter b Use the Tools Trap S...

Page 46: ...sponse Could not connect to the TCP port after one attempt pollServiceResponding Connection to TCP port OK pollStatusTestFail Status variable test failed pollStatusTestPass Status variable test passed...

Page 47: ...ator on an Event on page 5 6 before reading this one 1 First add a grouped set of users a Use the Config User Profiles menu b Click the Add button c Enter the Name of the new user d Set the user Email...

Page 48: ...ent on page 5 6 b In the Action tab select SwitchOperators in the Page pull down to page the two new users c Select SwitchOperators in the Email pull down to send email to the two new users d In the M...

Page 49: ...eeding Please refer to Limiting the Scope of Discovery on page 6 5 before reading this section Normal Discovery Map Layout Discovery creates a two level IP Subnet based topology At the top level disco...

Page 50: ...ic algorithm to find network devices That means it is somewhat non deterministic and will show different results from one run to another There are many reasons for this including lost broadcast respon...

Page 51: ...or any other management applications or Windows services and stop them for example Windows SNMP Trap Service Try installing on a different system that has less software installed to help identify the...

Page 52: ...can shut down and reconfigure devices If you have any firewalls in your network you need to make sure that your ProSafe NMS system can send and receive SNMP operations through the firewalls This is n...

Page 53: ...iscovered subnets To discover more subnets add more seeds as described in the previous section Limiting the Scope of Discovery If you have a large network but you only want to manage a small part of i...

Page 54: ...very layout use the Config Discovery Polling menu and do one of the following Clear the Enable Discovery check box to disable further discovery Select Discovered Objects from the Layout pull down to a...

Page 55: ...window number M Server IP Address R Address of sending entity could be the same as the target device or it could be a Polling Agent address F Event Action Filter name f Event Action Filter database re...

Page 56: ...target device P The name of the map parent subnet object C The number of variables in the event trap All variables as seq name type value n The nth variable as name type value n The nth variable as n...

Page 57: ...such as token cards Kerberos one time passwords certificates and public key authentication For details on EAP specifically refer to IETF s RFC 2284 802 11a IEEE specification for wireless networking...

Page 58: ...sical address and a RARP server replies with the host s IP address Auto Uplink Auto UplinkTM technology also called MDI MDIX eliminates the need to worry about crossover vs straight through Ethernet c...

Page 59: ...ss mail NETGEAR com mail is a server name and NETGEAR com is the domain DoS A hacker attack designed to prevent your computer or network from operating or communicating DSL Short for digital subscribe...

Page 60: ...d researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet IP Internet Protocol is the main internetworking protocol used in the Internet Used in...

Page 61: ...twork interface card Usually written in the form 01 23 45 67 89 ab Mbps Megabits per second MDI MDIX In cable wiring the concept of transmit and receive are from the perspective of the computer which...

Page 62: ...ectivity to a network NID Network Interface Device The point of demarcation where the telephone line comes into the house packet A block of information sent over a network A packet typically contains...

Page 63: ...vice RADIUS is an authentication system Using RADIUS you must enter your user name and password before gaining access to a network This information is passed to a RADIUS server which checks that the i...

Page 64: ...110 11010111 and the host address is 00010001 00001001 If this network is divided into 14 subnets however then the first 4 bits of the host address 0001 are reserved for identifying the subnet The sub...

Page 65: ...r requests from clients within the firewall and forwards these requests to remote Internet servers outside the firewall The proxy server reads responses from the external servers and then sends them t...

Page 66: ...mputer names to IP addresses Wireless Network Name SSID Wireless Network Name SSID is the name assigned to a wireless network This is the same as the SSID or ESSID configuration parameter WPA Wi Fi Pr...

Page 67: ...y 2 1 crossover cable G 2 custom menus 4 12 customer support 1 ii D device access control list 6 4 device access modes ICMP Ping 2 4 none TCP only 2 4 SNMP V1 and V2c 2 4 SNMP V3 2 4 device MIB data 4...

Page 68: ...tab 4 7 changing access parameters 4 7 changing attributes 4 6 changing type dependent attributes 4 8 P package contents 2 4 paging administrator on an event 5 6 multiple users 5 11 polling custom TC...

Page 69: ...Index 3 trend data viewing in a graph window 4 15 trend reports limiting saved instances 4 16 troubleshooting network discovery 6 1 V View Window area 3 7 W World Wide Web 1 ii...

Reviews: