Documente Academic
Documente Profesional
Documente Cultură
PN 3397397
January 2009, Rev 9 7/2012
2009-2012 Fluke Corporation. All rights reserved.
All product names are trademarks of their respective companies.
Licensing Information
1997-2012 Fluke Corporation
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, by photocopying, by recording, or otherwise, without prior written permission from Fluke Networks.
Fluke, Fluke Networks, Visual Network Systems, Visual UpTime, Visual IP InSight, and other trademarks are trademarks or
registered trademarks of Fluke Corporation in the United States and other countries. Fluke Corporations trademarks may be used
publicly with permission only from Fluke Corporation. Other names and brands may be claimed as the property of others.
Fluke Networks, a division of Fluke Electronics Corporation, is an ISO 9001:2000 registered company.
This product includes the following software from third party providers:
VMware Workstation (VPM Xpress only) http://www.vmware.com/download/eula/workstation71.html
MySQL Enterprise Advanced
Microsoft - Windows Server 2008 R2 and SQL Server 2008 R2
Dundas CHART for ASP.NET Professional Edition
Dundas CHART for Reporting Services. http://www.dundas.com/Products/Chart/RS/Licensing/OEM-ISV.aspx.
Visual Mining, Inc. NetCharts Java Graphing applet.
Hifn MeterFlow.
MatrixSSL security software licensed from PeerSec Networks Inc., http://www.peersec.com.
ComponentArt: Web.UI for ASP.NET - Enterprise License (version 2007.2)
http://www.componentart.com/store/licenseagreements.aspx.
Copyright 19962010 Flexera Software, Inc. and/or InstallShield Co. Inc. All Rights Reserved.
This product contains proprietary and confidential technology, information and creative works owned by Flexera
Software, Inc. and/or
InstallShield Co. Inc. and their respective licensors, if any. Any use, copying, publication, distribution, display,
modification, or transmission of
such technology in whole or in part in any form or by any means without the prior express written permission of
Flexera Software, Inc. and/or
InstallShield Co. Inc. is strictly prohibited. Except where expressly provided by Flexera Software, Inc. and/or
InstallShield Co. Inc. in writing,
possession of this technology shall not be construed to confer any license or rights under any Flexera Software, Inc.
and/or InstallShield Co. Inc.
intellectual property rights, whether by estoppel, implication, or otherwise.
Adobe Acrobat reader. Copyright 2011 Adobe Systems Incorporated.
http://www.adobe.com/products/acrobat/acrruela.html.
This product contains open source code from the following sources:
The following sources are distributed under Apache Software License. http://www.apache.org/LICENSE.
Apache Tomcat v2.2.4.
Apache Xerces Java v2.9.0 (http://xerces.apache.org/xerces2-j/)
Jakarta Log4j v1.1.3 (http://logging.apache.org/log4j/).
Jakarta Tomcat v3.3.2 (http://tomcat.apache.org/).
Xerces C++ Version 2.8.0. Copyright 2007 The Apache Software Foundation. Licensed under the Apache License,
Version 2.0.
Xerces XML parser. http://www.apache.org/licenses/LICENSE-2.0.html.
commons-collections http://commons.apache.org/collections
commons-dbcp http://commons.apache.org/dbcp
commons-lang http://commons.apache.org/lang
commons-logging http://commons.apache.org/logging
commons-math http://commons.apache.org/math
commons-pool http://commons.apache.org/pool
log4j http://logging.apache.org/log4j
quartz http:www.opensymphony.com/quartz
snmp4j http://snmp4j.org
CentOS Linux distributed under GNU General Public License (http://www.gnu.org/licenses/gpl.txt)
7-Zip is open source software. Most of the source code is under the GNU LGPL license. The unRar code is under a
mixed license: GNU LGPL and unRar Restrictions. License information can be found at http://www.7zip.org/license.txt.
WinSCP is free software: you can use it, redistribute it and/or modify it under the terms of the GNU General Public
License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later
version (http://www.gnu.org/licenses/gpl.txt).
Dell OpenManage Server Administrator includes two device drivers for Linux: Dell Systems Management Base Driver
(dcdbas) and Dell BIOS Update Driver (dell_rbu). Server Administrator uses these drivers to perform its systems
management functions. Depending on the system, Server Administrator loads one or both of these drivers if
required. These drivers have been released as open source under the GNU General Public License v2.0. They are
available in Linux kernels from http://kernel.org starting with kernel 2.6.14.
IE5.5+ PNG Alpha Fix v1.0RC4 (http://www.twinhelix.com/css/iepngfix/demo/), distributed under the CC-GNU Lesser
GNU Public License, a copy of which is available at http://creativecommons.org/licenses/LGPL/2.1/deed.en.
PostgreSQL is distributed under the following BSD-type license: Portions Copyright (c) 1996-2010, The PostgreSQL
Global Development Group. Portions Copyright (c) 1994, The Regents of the University of California Permission to
use, copy, modify, and distribute this software and its documentation for any purpose, without fee, and without a
written agreement is hereby granted, provided that the above copyright notice and this paragraph and the following
two paragraphs appear in all copies.
IN NO EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY PARTY FOR DIRECT, INDIRECT,
SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING OUT OF THE USE OF
THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE UNIVERSITY OF CALIFORNIA HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE. THE UNIVERSITY OF CALIFORNIA SPECIFICALLY DISCLAIMS ANY
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS ON AN "AS IS" BASIS, AND
THE UNIVERSITY OF CALIFORNIA HAS NO OBLIGATIONS TO PROVIDE MAINTENANCE, SUPPORT, UPDATES,
ENHANCEMENTS, OR MODIFICATIONS.
Java Runtime Environment distributed under Sun Microsystems Binary Code License Agreement. Copyright 2002
Sun Microsystems, Inc. http://java.com/en/download/license.jsp.
joeSNMP v0.2.6 (http://opennms.svn.sourceforge.net/viewvc/opennms/opennms/branches/OPENNMS/src/joesnmp/),
distributed under the Lesser GNU Public License, a copy of which is available at
http://www.gnu.org/licenses/lgpl.html.
jspSmartUpload v2.1, which is no longer available, is distributed under the Advantys Freeware license contract, a
copy of which is available at
http://web.archive.org/web/20031209160524/http://www.jspsmart.com/liblocal/docs/legal.htm.
libpcap. Copyright 2000-2008 Free Software Foundation, Licensed under BSDAdClause.
http://www.filewatcher.com/p/nmap-3.93.tar.bz2.2029943/nmap-3.93/libpcap/LICENSE.html.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. The names of the authors may not be used to endorse or promote products derived from this software without
specific prior written permission.
4. This license must be included with all copies of the Software, and may not be modified from its original format as
created by the Licensor. The Software may not be distributed subject to any other license.
5. This License is effective until terminated. Your rights under this License will terminate automatically without notice
from Licensor or if you fail to comply with any term(s) of this License. Upon the termination of this License, you shall
cease all use of the Software and destroy all copies of it, whether full or partial.
6. Selling or charging a fee for the Software is prohibited, although a fee may be charged for the act of transferring a
copy and/or for the distribution media, but not for the Software itself.
7. The Software, in whole or in part, may not be incorporated with or into any other software product without written
permission from Licensor. Publishing or distributing The Software is only allowed when The Software is in the
original archive, adding or remove files from The Software archive is not allowed!
8. You expressly acknowledge and agree that use of the software is at your sole risk and that the entire risk as to
satisfactory quality, performance, accuracy and effort is with you. Licensor does not warrant against interference with
your enjoyment of the software, that the functions contained in the software will meet your requirements, that the
operation of the software will be uninterrupted or error-free, or that defects in the software will be corrected. Should
the software prove defective, you assume the entire cost of all necessary servicing, repair or correction.
9. THE SOFTWARE IS PROVIDED "AS IS," WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. No oral or written advice given by Licensor or by an authorized representative of Licensor shall
create a warranty.
10. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT SHALL THE LICENSOR BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, INCLUDING BUT NOT LIMITED TO PERSONAL INJURY, OR ANY INCIDENTAL,
SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING WITHOUT LIMITATION, DAMAGES
FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION OR ANY OTHER COMMERCIAL DAMAGES OR
LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY TO USE THE SOFTWARE, HOWEVER
CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF
LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
11. THIS SOFTWARE IS NOT INTENDED FOR USE IN ANY APPLICATION IN WHICH THE FAILURE OF THE SOFTWARE
COULD LEAD TO DEATH, PERSONAL INJURY OR SEVERE PHYSICAL OR ENVIRONMENTAL DAMAGE.
12. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, LIABILITY OR LIMITATIONS
ON APPLICABLE STATUTORY RIGHTS OF A CONSUMER, SO THE ABOVE EXCLUSIONS AND LIMITATIONS MAY
NOT APPLY TO YOU. IF SUCH EXCLUSIONS FROM LIABILITY APPLY TO YOU, DO NOT USE THIS SOFTWARE.
13. In no event shall Licensor's total liability to you for all damages exceed the amount of $50.00. The foregoing
limitations will apply even if the above stated remedy fails in its essential purpose.
14. This License constitutes the entire agreement between the parties with respect to the use of the Software licensed
hereunder and supersedes all prior or contemporaneous understandings regarding such subject matter. No
amendment to or modification of this License will be binding unless in writing and signed by Licensor. Any
translation of this License is done for local requirements and in the event of a dispute between the English and any
non-English versions, the English version of this License shall govern.
15. This License will be governed by and construed in accordance with the laws of the Netherlands, as applied to
agreements entered into and to be performed entirely within the Netherlands between Dutch residents. This License
shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the
application of which is expressly excluded.
16. If for any reason a court of competent jurisdiction finds any provision, or portion thereof, to be unenforceable, the
remainder of this License shall continue in full force and effect.
U.S. GOVERNMENT RESTRICTED RIGHTS. The Software and documentation are provided with RESTRICTED RIGHTS.
Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of
the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of
the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19, as applicable.
RSA MD5 code. Copyright 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
http://www.faqs.org/rfcs/rfc1321.html.
License to copy and use this software is granted provided that it is identified as the RSA Data Security, Inc. MD5
Message-Digest Algorithm in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as derived from the
RSA Data Security, Inc. MD5 Message-Digest Algorithm in all material mentioning or referencing the derived work.
1. This LICENSE AGREEMENT is between the Python Software Foundation (PSF), and the Individual or Organization
(Licensee) accessing and otherwise using Python 2.7.2 software in source or binary form and its associated
documentation.
2. Subject to the terms and conditions of this License Agreement, PSF hereby grants Licensee a nonexclusive,
royalty-free, world-wide license to reproduce, analyze, test, perform and/or display publicly, prepare derivative works,
distribute, and otherwise use Python 2.7.2 alone or in any derivative version, provided, however, that PSFs License
Agreement and PSFs notice of copyright, i.e., Copyright 2001-2012 Python Software Foundation; All Rights
Reserved are retained in Python 2.7.2 alone or in any derivative version prepared by Licensee.
3. In the event Licensee prepares a derivative work that is based on or incorporates Python 2.7.2 or any part thereof,
and wants to make the derivative work available to others as provided herein, then Licensee hereby agrees to include
in any such work a brief summary of the changes made to Python 2.7.2.
4. PSF is making Python 2.7.2 available to Licensee on an AS IS basis. PSF MAKES NO REPRESENTATIONS OR
WARRANTIES, EXPRESS OR IMPLIED. BY WAY OF EXAMPLE, BUT NOT LIMITATION, PSF MAKES NO AND
DISCLAIMS ANY REPRESENTATION OR WARRANTY OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR
PURPOSE OR THAT THE USE OF PYTHON 2.7.2 WILL NOT INFRINGE ANY THIRD PARTY RIGHTS.
5. PSF SHALL NOT BE LIABLE TO LICENSEE OR ANY OTHER USERS OF PYTHON 2.7.2 FOR ANY INCIDENTAL,
SPECIAL, OR CONSEQUENTIAL DAMAGES OR LOSS AS A RESULT OF MODIFYING, DISTRIBUTING, OR OTHERWISE
USING PYTHON 2.7.2, OR ANY DERIVATIVE THEREOF, EVEN IF ADVISED OF THE POSSIBILITY THEREOF.
6. This License Agreement will automatically terminate upon a material breach of its terms and conditions.
7. Nothing in this License Agreement shall be deemed to create any relationship of agency, partnership, or joint
venture between PSF and Licensee. This License Agreement does not grant permission to use PSF trademarks or
trade name in a trademark sense to endorse or promote products or services of Licensee, or any third party.
8. By copying, installing or otherwise using Python 2.7.2, Licensee agrees to be bound by the terms and conditions of
this License Agreement.
WinPcap 4.1.2
Copyright (c) 1999 - 2005 NetGroup, Politecnico di Torino (Italy).
Copyright (c) 2005 - 2010 CACE Technologies, Davis (California).
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Politecnico di Torino, CACE Technologies nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS
OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
This product includes software developed by the University of California, Lawrence Berkeley Laboratory and its
contributors.
This product includes software developed by the Kungliga Tekniska Hgskolan and its contributors.
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
-----------------------------------------Portions Copyright (c) 1997 Yen Yen Lim and North Dakota State University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
"This product includes software developed by Yen Yen Lim and North Dakota State University"
4. The name of the author may not be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-----------------------------------------Portions Copyright (c) 1993 by Digital Equipment Corporation.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted,
provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital
Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software
without specific, written prior permission.
THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH
REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN
NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
-----------------------------------------Portions Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the project nor the names of its contributors may be used to endorse or promote products
derived from this software without specific prior written permission.
10
USING THIS SOFTWARE INDICATES YOUR ACCEPTANCE OF THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE
WITH THEM, YOU SHOULD PROMPTLY RETURN THE SOFTWARE PACKAGE AND YOUR PAYMENT WILL BE REFUNDED.
This Agreement is between you and Fluke Networks, a division of Fluke Electronics Corporation.
This Software License Agreement (the "Agreement") grants you a non-exclusive license to use the software supplied to you by
Fluke Networks, including the software supplied to you on CD-ROM, on-line, and/or as part of the equipment supplied by Fluke
Networks (collectively the "Software") in return for payment of a license fee. This Agreement imposes certain restrictions on the use
of the Software. Fluke Networks retains ownership of the Software and no rights are granted to you other than a license to use the
Software on the terms expressly set forth in this Agreement.
Permitted Uses
You may install and use one copy of Fluke Networks server products. You must reproduce and place all copyright/proprietary/patent
notices on the backup copy, as indicated on the original. Per the conditions of your specific purchase agreement with Fluke
Networks, you may install multiple copies of the client code component of Fluke Networks product, but copies are limited to one
server. If the Software is an upgrade, you may now use that upgraded product only in accordance with this Agreement.
Restricted Uses
Without the express written consent of Fluke Networks, you may not:
1. Use, copy (other than described above), modify, distribute, reverse engineer, reverse assemble, or reverse compile the Software
or accompanying documentation except as expressly allowed in this Agreement.
2. Transfer or assign your rights to use the Software except upon a transfer of any Fluke Networks equipment with which or for
which it was supplied, and then only if Fluke Networks receives written agreement of the transferee to be bound by all of the terms
of this Agreement.
3. Sublicense or lease this program or its documentation.
Term
This license is effective from your date of purchase and shall remain in force until terminated. You may terminate this license and
Agreement by destroying the Software and its documentation, together with all copies in any form, or by returning to Fluke Networks
the Software and its documentation, together with all copies in any form. This Agreement will also terminate if you fail to comply with
any term of this Agreement. You agree upon any such termination to either (i) destroy the Software and documentation, together
with all copies in any form or (ii) return to Fluke Networks the Software and its documentation, together with all copies in any form.
Warranty
Fluke Networks warrants that the Software will operate substantially in accordance with its functional specifications for 90 days and
that it has been properly recorded on non-defective media. Fluke Networks does not warrant that software will be error free or
operate without interruption. If, within the Warranty period, You notify Fluke Networks of any defect or fault in the Software where
the Software does not perform substantially in accordance with its functional specifications and such defect or fault does not result
from You, or anyone acting with your authority, having amended, modified or used the Software for a purpose other than for what it
was designed, Fluke Networks shall, at its sole option, do one of the following:
(I) REPAIR OR REPLACEMENT OF THE SOFTWARE, OR
(II) RETURN OF THE MONIES PAID BY YOU TO FLUKE NETWORKS FOR THE SOFTWARE. THIS WARRANTY IS
CUSTOMER'S SOLE AND EXCLUSIVE REMEDY AND IS IN LIEU OF ALL OTHER WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Limitation on Liability
IN NO EVENT SHALL FLUKE NETWORKS, ITS SELLING REPRESENTATIVES, DEALERS, OR DISTRIBUTORS BE LIABLE
FOR LOST PROFITS, DATA, OR INFORMATION OF ANY KIND OR FOR CONSEQUENTIAL, SPECIAL, INDIRECT,
INCIDENTAL, PUNITIVE OR OTHER DAMAGES THAT MAY ARISE THROUGH THE SALE OF, USE OF, OR INABILITY TO USE
ANY FLUKE NETWORKS PRODUCT, SOFTWARE OR SERVICE, EVEN IF FLUKE NETWORKS HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
Applicable Law
This Agreement will be governed by the laws of the state of Washington.
12
Contents
Contents ..................................................................................................................................... i
Preface ..................................................................................................................................... ix
About this Guide .................................................................................................................... ix
User Documentation .............................................................................................................. ix
Guides and Other Documents ............................................................................................ ix
Accessing Documentation .................................................................................................. xi
Launching Online Help .......................................................................................................xii
Supported Web Browsers and Operating Systems .............................................................xii
Product Services ................................................................................................................... xiii
Technical Support.............................................................................................................. xiii
Professional Services ........................................................................................................xiv
Product Training ................................................................................................................xiv
1.
3.
5.
Managing Domains.......................................................................................................... 84
About Domains ..................................................................................................................... 84
Creating Domains ................................................................................................................. 85
Setting Domain Options ........................................................................................................ 87
Collecting ASE Data .......................................................................................................... 87
Performing Database Maintenance for a Domain .............................................................. 88
Configuring Domain-Wide Event Priorities ......................................................................... 91
Configuring Domains............................................................................................................. 92
Setting the SNMP Community Name ................................................................................. 93
iii
6.
7.
9.
vii
viii
Preface
User Documentation
The VPM documentation set includes online guides and administrative and Web portal Help systems.
Documents are installed with server and PAC software by default as Adobe Acrobat portable document
format (PDF) files. On the server, the documentation is installed in:
[drive]:inetpub\wwwroot\Manuals
On the PAC, the documentation is installed in:
...\Fluke Networks\Visual UpTime Select PAC\Manuals
Product Services
For system integrators responsible for integrating VPM into a service provider or enterprise
environment.
Application Performance Appliance Installation and Setup Guide
For field technicians who install Application Performance Appliances (APAs) and network
professionals who manage them, this guide explains how to install the APA, perform basic
configuration tasks to ensure connectivity, and to perform software updates.
Network Performance Appliance Installation and Setup Guide
For field technicians who install Network Performance Appliances and network professionals who
manage them, this guide explains how to install the appliance, perform basic configuration tasks to
ensure connectivity, and to perform software updates.
Visual Performance Manager / Application Performance Appliance External Storage Array Installation
and Setup Guide
The External Storage Array (ESA) is an external storage device that connects to a Visual
Performance Manager (VPM) server or an Application Performance Appliance (APA) and enables
expansion of the storage capacity of the VPM Server or the APA.
This setup guide shows you how to connect the ESA to a VPM Server or an APA.
ASE Installation Instructions (vary by ASE model)
For field technicians who install Visual UpTime Select ASEs, these documents explain how to install
the ASE, connect the physical interfaces, and perform basic configuration tasks to ensure ASE
connectivity to the VPM server.
VPM Connex User Guide
VPM Connex provides a web based programmable interface for accessing the Visual Performance
Manger (VPM) performance database and for accessing and publishing VPM configuration data.
Accessing Documentation
All guides are included on the VPM CD along with a Windows version of Adobe Acrobat Reader 8.1. The
guides and Acrobat Reader are pre-installed on new servers. Acrobat Reader 6.0 or later is required. The
Acrobat Reader is available for free from Adobes website, www.adobe.com.
Any user with IP connectivity to the VPM server can view or download all or selected guides from the
Web server.
To access documentation from the Web portal:
In the Web portal interface, click Support.
To access documentation from the servers Visual UpTime Select home page:
1
Launch your Web browser, and type the following URL in the address field:
http://<VPM server name or IP address>/uptime.htm
xi
To view a PDF document, click its title. To download a document, right-click its title and choose Save
Link As (Firefox) or Save Target As (Internet Explorer).
Component
Operating Systems
xii
Product Services
VPM supports the following Web browsers on the operating systems listed above.
MS Internet Explorer (IE) 8.0 or 9.0
Firefox 5.0
Note
Other browsers may run but have not been tested.
For best performance when running Web applications, set your screen resolution to 1280 x 1024
pixels or higher.
Sun JRE 6.0 (1.6.0) is required. When installing or upgrading browsers, make sure that Java is
supported and that you have installed the correct Java version, which is available from the Web portal
Support page and the VPM servers Visual UpTime Select home page.
Help is HTML-based with Javascript enhancements. Enable Javascript in your browser options.
To run more than one browser session at the same time, open a new instance of the browser. This
ensures that each session refreshes independently. Do not use File > New > Window to open a new
window.
Do not use the browser Back button to return to a previous view.
Product Services
For VPM product information, see: www.flukenetworks.com.
Technical Support
For VPM technical support, contact your vendor technical support representative or contact Fluke
Networks Technical Assistance Center (TAC) at the points listed below:
Phone: 1 888-293-5853 (U.S. only) or 1 425-446-4519 (international)
E-mail: support@flukenetworks.com
Supervision Gold support packages are available from the Fluke Networks website.
VPM software updates are available from the Fluke Networks website. You must be a Gold Support
customer to get updates.
To get VPM software updates:
1
Go to www.flukenetworks.com.
If you need to create an account, click the Create an Account link. Fill out the form and submit it.
Click the Download link to the right of the software that you want to download.
Professional Services
Fluke Networks has certified consultants who can assist you with the planning, installation,
implementation, and deployment of the product. Contact Professional Services at the points listed below:
Phone: 1 888-293-5853 (U.S. only) or 425-446-4600
Fax: 421-446-4839
E-mail: professionalservices@flukenetworks.com
Product Training
Training is available. Direct training requests to your product vendor or the training coordinator at the
contact points listed below:
Phone: 301-296-2300
Fax: 301-296-2651
E-mail: training@flukenetworks.com
xiv
As a standards-based open system, VPM also supports integration with thirdparty interfaces. For more information about system components, see System
Architecture.
16
18
Monitor response times for critical n-tier applications from the end user to the
server farm and back. Analyze application, site, and server data gathered by
APAs at 1-minute granularity. Drill down to individual client and transaction
performance data. Analyze trends and response times. Rapidly drill down on
unusual response times to view the problem from multiple points of
reference.
Corroborate end-user performance complaints to quickly identify the problem
domain and quantify business impact. Use response time breakdown to
determine whether the problem is caused by the application, server, or
network. Compare an individual end user's experience to that of other users
at that site and quickly determine if a problem is isolated to the user or is
impacting many clients.
Correlate end user activity with the application backend. View the
performance of a multi-tier application from the web front end through the
application servers and to the database backend to quickly isolate
performance issues. Understand the relationships between the dependent
servers at the transaction level.
Back-in-time application performance troubleshootingGet the data view
that you need to solve a specific issue by applying time, application, site,
19
20
21
Drill-down on problem
services to view port
and circuit events and 3
day performance
history
Use the Events tab to
respond to events on the
selected network
element
22
System Architecture
The VPM system includes the following components:
Analysis Service Elements (ASEs)Devices installed on the network that
collect application and network performance data. These include both Visual
UpTime Select ASEs and partner devices equipped with agent software.
ASEs on both ends of a physical access line form an end-to-end managed
circuit.
Application Performance Appliances (APAs)Devices installed at the data
center that monitor data passing through core switches. APAs monitor
application traffic and measure application performance and usage.
Network Performance AppliancesDevices installed at key points on the
network that collect IP traffic (NetFlow) data from Cisco routers and managed
switches.
ServerThe VPM server stores system and performance data and provides
interfaces for clients to access this data. A Web server may be installed on
the server machine or as a stand-alone Web server.
Web portalWeb-based client applications, accessed through a single
logon, that present data for analysis and provide tools for configuring
devices.
PACThe PAC (Platform Applicable Client) is a Windows-based client used
primarily for Visual UpTime Select network configuration.
Figure 6 shows the location of VPM components relative to the WAN, customer
premises equipment (CPE) such as routers, and site local area networks. In this
example, the VPM server is located at the data center site, along with the PAC
and an NPA. Web portal users access the server (or a stand-alone Web server
with communication links to the server) over secure or non-secure Internet
connections. The corporate head office site has a WAN ASE, an Ethernet ASE
deployed on the LAN, and an NPA. All sites have WAN ASEs deployed at or
near the WAN demarcation point.
24
25
26
27
ASEs
To get ASE software updates:
1
For detailed information on features and commands in each available ASE software
version, see the Visual UpTime ASE User Guide.
ASE software image files typically have the following filename format:
ISmmm_x_y_zzz.img
Where:
mmm = ASE Model Number
x = Major Software Version Number
y = Minor Software Version Number
zzz = Point Release Software Version Number
For example, the 3.1.051 software image file for a Model 165 ASE should have the
28
When upgrading, it is important to ensure that the model number of the image file
matches the target ASE model number. To determine the model number of a given
ASE, telnet to the ASE and run the ID command. The first four digits of the serial
number is the units model number. Should you accidentally attempt to install an
incorrect image file, the ASE will reject the file.
Partner devices (such as CSU/DSUs, probes, routers, or access concentrators) that
are equipped with agent software can function as ASEs in the VPM system. These
devices are developed and produced by third-party companies in consultation with
Fluke Networks. The system software verifies whether such a device is licensed to be
managed by VPM. The capabilities available to a partner device are determined by
hardware limitations and the agent software implementation chosen by the partner.
Server
The VPM server consists of a Web server, which provides the web-based userinterface and security, and an Analysis server, which provides the data collection
from deployed devices, data storage, baselining, alarming, and notification.
The VPM server runs Microsoft Windows Server and Microsoft SQL Server. (For
supported operating systems for servers, see Table 1.) A single server can
support multiple Web portal users and PAC clients.
Server software can be provided on a pre-configured computer shipped by Fluke
Networks or installed by the customer on a computer that meets server
requirements defined in the Software Installation Guide.
The server computer typically resides in a central location, such as an
enterprises data center or service providers NOC, from which a WAN or set of
29
Using VPM Server Administration and other tools on the server, a system
administrator can:
Administer multiple servers from a single user interface. Monitor server
status and configure server-wide and domain-level settings.
Control access to Application Performance Manager, Visual UpTime Select,
and Network Performance Manager features.
Control the access of users through group permissions to features.
Filter access to reports at the domain level.
Collect data and initiate database maintenance on one or all domains.
30
Web Server
Web portal users access data over an IP network using HTTP or HTTPS
connections to the Web server. The Web server is a Microsoft IIS Server that
may be installed on the same system as the VPM server or on a separate
machine.
The Web server may be separated from users and/or the VPM server by a
firewall. A stand-alone Web server positioned behind a firewall limits Web portal
user direct access to the VPM server (see Figure 6). It can also serve as a single
Web portal for users to access multiple servers.
On the Web server, administrators use the System Management tool to configure
supported VPM servers.
Web Portal
The VPM Web portal is the single access point through which users interact with
data. From the Web portal, users can create and organize personalized views of
data based on their workflow, interact with data from a range of perspectives,
and access data from multiple sources. For example, the Web portal can host a
system, or can be launched from another system.
The Web portal supports HTTP and HTTPS connections to the Web server (see
Figure 6). For more information about Web portal features, see isual
Performance Manager Fe
31
PAC
The Platform Applicable Client (PAC) runs on a Microsoft Windows PC. It is used
primarily for network and event configuration:
Add ASEs to the network and configure ASE physical, link, circuit, and
application monitoring settings.
Perform ASE data collection, update ASE software, and set event
destinations.
Configure state-change and network performance threshold events that
ASEs report.
Create and manage ASE templates.
PAC software is installed on the VPM server. More than one PAC can connect to
a single server. A single PAC can also connect to multiple VPM servers.
32
Network Models
How VPM is deployed in a network varies according to customer needs. The
following typical customer scenarios are illustrated in this section:
34
Data Management
As the database server, the VPM server stores several types of data gathered by
APAs, ASEs, and NPAs (see Figure 12):
36
38
Once in the VUpTimeNF database, long-term data for NPA reports is stored by
default for up to 52 weeks. It is maintained at 1-hour granularity. You can
determine the number of weeks to keep long term data for all reports from the
server.
40
Service Summary Data Flow illustrates how Service Summary data is processed.
On the VPM server, the Service Summary process polls ASEs for status data
and received events every 15 minutes (this setting can be changed from the
server). A middleware component in the Service Summary requests updates
from the poller every 15 minutes, and interfaces with the Web server to make
detected ASE status changes available to Web portal users.
In response to a Web portal users refresh, the Web server initiates a check in
the Service Summary poller for status updates received from ASEs. For more
information, see Managing Web Access.
41
2. Server Overview
The VPM server is a dedicated, uniquely configured database and Web server that stores application and
network performance data from ASEs, NetFlow data from NPAs, network configuration data, and access
control settings for users.
Topics in this chapter include:
Visual Performance Manager servicesOverview of services, server integrity and performance, and
databases.
Server applicationsOverview description of the three VPM applications on the server.
Administrative tasksSetup, configuration, and maintenance tasks that you will need to perform
when managing the system.
Starting and stopping servicesSteps for starting and stopping VPM and SQL Server services.
For a complete overview of the server and its relation to other system components, see Chapter 1, Visual
Performance Manager Overview.
Server Overview
Visual Performance Manager Services
Provide communication with PACs through a Remote Procedure Call (RPC) server.
Provide managed user accounts, and thereby control access to network data and VPM capabilities.
Perform large-scale configuration of ASEs and network performance monitoring through the use of
templates.
Provide long-term data to clients.
Warning
DO NOT install other software applications on the VPM server other than those approved by
Fluke Networks. The installation of other software particularly network management
applicationscan use critical resources, may degrade integrity and performance, and may
void the sales and service/support warranty.
It is also recommended that you subscribe to the Microsoft Product Security Notification Service to
receive alerts from Microsoft regarding new security information. See the following URL:
http://www.microsoft.com/technet/security/notify.asp
Table 2
43
Action
ApprovedInstall.
Always upgrade server software versions sequentially to ensure thorough database conversions. Refer to
the Software Installation Guide for complete installation information.
Data Storage
A server collects and stores network performance data from ASEs that have been configured via the
Network Configuration tool on a PAC. This data is stored in two databases on the serverthe short-term
(VUpTime) and long-term (VUpTimeLT) databases.
Short-term databasestores 14 days of network performance data in 15-minute increments. A
server downloads these data packets from the ASE each time ASE data collection occurs. The
default is daily at 1:00 AM. Each time database maintenance occurs (by default, daily at 2:00 AM),
the server copies data from the short-term database to the long-term database. Any data more than
14 days old is purged from the short-term database.
The short-term database also stores network configuration and performance monitoring event
configuration data (entered from a PAC), and access control settings (entered from the server). This
information is updated when new information is entered through the PAC or server user interfaces.
Long-term databasestores up to n weeks (the default is 52) of network performance data in 1-hour
increments for use in reporting. Long-term database capacity is determined by the size of the server
computer at the time of purchase.
44
Server Overview
Server Applications
Both ASE data collection and database maintenance, which trigger this movement of data, can be
scheduled and performed on-demand from the server or PAC. Data collection can also be done from the
VPM portal. You also can change the number of weeks of data stored in the long-term database.
Server Applications
In addition to VPM services, the server includes the following applications that help you perform
administrative functions:
Server AdministrationCheck server connectivity and database usage, and monitor agent/license
usage. (See Chapter 4, Monitoring Servers.) Establish criteria for secure user access to VPM. (See
Chapter 6, Managing Users.) Configure server-wide settings such as Service Summary thresholds,
ATM Class of Service, and licensing.
Remote Server AdministrationRun the Server Administration application from a computer other
than the server computer. You can use Remote Server Administration from a different server
computer or from a computer that has network access and the proper configuration. For information
about installing Remote Server Administration, see the Software Installation Guide.
Administrative Tasks
Table 3 lists the administrative tasks involved in configuring and maintaining the VPM system.
Table 3 System Administrative Tasks
Task
Use...
See...
server
Local/Remote Server
Administration
Configuring Licenses
PAC
Server
Chapter 5, Provisioning
Management Communication in
the Visual UpTime ASE User
Guide
Server Administration
45
Task
Use...
See...
Server Administration
Local/Remote Server
Administration
Local/Remote Server
Administration
Configuring an IP Class of
Service Template on page 98
Local/Remote Server
Administration
PAC Network
Configuration
Chapter 2, Network
Configuration in the PAC User
Guide
Chapter 2, Network
Configuration in the PAC User
Guide
Web System
Management Utility, on
the Web server
Web portal
Chapter 3, Administration, in
the Visual Performance Manager
User Guide
Server Administration
Web portal
46
Server Overview
Starting and Stopping Services
Guide
Task
Use...
See...
Server Administration
Server Administration
Server Administration
Performing Database
Maintenance for a Domain on
page 85
Server Administration,
SQL Functions on the
server
server
PAC
47
Warning
For non-routine events, stop VPM services only when instructed to do so. Notify Web portal
and PAC users that the server will be temporarily unavailable before stopping VPM services.
To see if any users are logged in, use the Server Administration reporting tool. See
Identifying Active Users on page 64.
To manually stop and start VPM services:
1
Select Start > Settings > Control Panel > Administrative Tools.
In the list of services, select the serviceVisual UpTime Select Web Application, Visual
Performance Manager Server, or MSSQLSERVERand click Stop.
Select Start > Settings > Control Panel > Administrative Tools.
In the list of services, select the serviceMSSQL Server, Visual Performance Manager Server, or
Visual UpTime Select Web Applicationand click Start.
48
Monitoring Servers
Managing the Server Monitor List
This chapter covers recommended security procedures that you should perform on the server computer.
These include assigning access privileges to user accounts and setting security options and audit policies
within the Windows server. You can leave the default security settings that were configured when you
purchased the server computer from Fluke Networks, or you can establish and configure your own
security policies in Windows.
Topics in this chapter include:
Setting up server securityDefault user accounts, password policies, audit policy, critical files, and
registry access.
Firewall configurationRecommended firewall configuration settings for use in a service provider
network environment.
Note
You must log in to your server with Administrative privileges to verify the security settings detailed in
this chapter.
For information about adjusting optional security settings on the VPM server, see Chapter 4, Setting up
the Server, in the Software Installation Guide.
Server Security
The security design of the VPM server provides for user authentication, access control, and auditing. It
uses existing applications on the Windows operating system, SQL Server DBMS, and server software.
The security component in the server software uses the access control features of SQL Server to prevent
one customer from accessing another customers (potentially sensitive) network and application
performance data. Server application security also helps prevent unauthorized access to Windows.
Login Type
When Requested
Windows
name: vuptime
password: Visual1
VPM default
login
name: VPMadmin
password: vpm
Internet
Information
Server
account
name: vuptime or
IUSR_[Name], depending
on the original version of
VPM installed on your
server computer
password: visual
SQL Server
name: sa*
password: VPM@dmin1
In the Computer Management (Local) window, expand Local Users and Groups > Users. Check
for the user IUSR_<Name>.
SQL Server and VPM services start automatically when you power up the server computer. You are not
required to log into Windows. (See Starting and Stopping Services.)
Windows Server
The Windows Server operating system on the server computer comes with two user accounts defined:
administrator and vuptime, both of which are assigned to the Administrative group. The Administrative
group has administrative privileges on the current server computer, and not the VPM network domain.
50
Monitoring Servers
Managing the Server Monitor List
Password Policy
By default, the passwords for the two default Administrator user accounts (administrator and vuptime) are
configured never to expire. Protect these accounts by changing their passwords to restrict access to the
server computer.
At server setup, Windows user account definitions are restricted to vuptime and administrator.
Click Start > Programs > Administrative Tools > Internet Services Manager.
Expand local computer --> Web Sites. Right-click Default Web Site and click Properties.
Select the Directory Security tab and click Edit under Authentication and access control.
In the Authentication Methods dialog, Verify that anonymous access is set to Enabled and the
user name is set to IUSR_<Name>.
Assigning Passwords
To assign a password to any of the login names listed in Server , follow the procedures in this section.
Your Windows server may have been configured to enforce restrictions on passwords, such as limitations
on password reuse. Check the Windows Server Computer Management for the password and audit
policies on the server.
Warning
Do not change any user names assigned to these logins. Also, the password of the Windows
IUSR_<Name> user must match the password for the anonymous login of the WWW service.
To secure the Windows login:
1
Select Start > Programs > Administrative Tools > Computer Management.
Select System Tools, Local Users and Group, then select Users. Select the user name vuptime.
In the same dialog, select the IUSR_Name user name, then repeat the Set Password process in
step 3.
Warning
Make certain that you assign the same password to the WWW service login, as explained in
the next procedure.
51
Select Start > Programs > Administrative Tools > Internet Services Manager
In the left pane of the Internet Services Manager window, click the name of the server.
Click the Edit button in the Anonymous access and authentication control section.
Check the Anonymous access box and click the Edit button.
Select Start > Programs > Microsoft SQL Server > Management Studio.
In the left pane of the Management Studio window, click the + icon next to Microsoft SQL Servers,
then SQL Server Group, SQL Server server (where server is the hostname of the server computer),
Security, and finally Logins to expand these folders.
For SQL Server system administratorright-click the sa user name.
For VPM database administratorright-click the vupadmin user name.
Click Start > Run, enter Gpedit.msc. Click OK. The Group Policy Object Editor window opens.
In the left pane of the Group Policy window, expand Computer Configuration > Windows Settings
> Security Settings > Account Policies.
View the Local Setting values for all password policies in the right pane. Apply settings based on
your companys policies. Use the settings in Windows Password Policy Settings as a guide.
Policy
Remember 6 Passwords
0 (never expire)
2 days
52
Monitoring Servers
Managing the Server Monitor List
Table 5 Windows Password Policy Settings
Policy
0 characters
40 characters
Disabled
Policy
Local Setting
30 minutes
30 minutes
Audit Policy
In Windows Server, the audit policy determines which security events are logged into the Security log on
your server computer. An audit records an entry whenever users perform certain actions that you specify.
For example, the modification of a file can trigger an audit entry. The audit entry shows the action
performed, the associated user account, and the date and time of the action. You can audit both
successful and failed attempts at actions.
53
Select Start > Programs > Administrative Tools > Local Security Policy.
Apply settings based on your companys policies. Use the settings shown in Audit Policy Settings as a
guide.
Audit Policy
Success Failure
Security Logs
You use the Windows Event Viewer to examine security logs. Because security logs are limited in size,
change the events to be audited carefully, and consider the amount of disk space you are willing to
devote to the security log. The maximum size of the security log is defined in the Event Viewer.
The following security logs come pre-configured on your server computer:
Application logRecords events logged by applications or programs. For example, SQL Server
could record a file error in the application log.
System logRecords events logged by the Windows system components.
Security logRecords security events such as valid and invalid log on attempts, as well as events
related to resource use such as creating, opening or deleting files. (See Table 7 for recommended
settings.) For example, if you have enabled Audit logon events, attempts to log on to the system are
recorded in the security log.
54
Monitoring Servers
Managing the Server Monitor List
All three server security logs have the following default settings:
Event Log Wrapping is set to Overwrite Events as Needed.
Event Viewer log size is set to a maximum of 5056K.
To verify Event Log Wrapping:
1
Open Event Viewer by clicking Start > Settings > Control Panel. Double-click Administrative
Tools, and then double-click Event Viewer.
In the console tree, click one of the three server security logs.
On the General tab, select the Overwrite events as needed option under Log size. If the Overwrite
events as needed option is not selected, the log may fill to capacity and newer events will not be
logged.
Critical Files
Add file modification auditing for all files in the server software directory tree (c:\Program
Files\Fluke Networks\Visual Performance Manager Server) with the following extensions:
.cab, .dll, .exe, .img, .jar, and .sql.
To implement file modification auditing:
1
Right-click the appropriate directory in Windows Explorer and select Search in the context menu. The
Search Results dialog appears.
In Search for files or folder named, enter the file extension for the type of file you want to audit
preceded by a period and the * (asterisk) wildcard symbol (for example, enter *.exe to search for
executable files). Then click Search Now.
Locate all types of files listed above.
Press Ctrl+A to select all files found. Then press Alt+Enter to display the Properties dialog.
In the Properties dialog, select the Security tab and click Advanced. The Access Control Properties
dialog appears.
Note
If your computer is on a domain in which other policies override this permission or if you do not have
proper permission, your system may not display the Security tab.
55
In the Access Control Properties dialog, select the Auditing tab. Click Add to add a new audit entry.
The Select User or Group dialog appears.
In the user list, select the group named Everyone and click OK. An Auditing Entry dialog appears,
listing file access events that are available for auditing.
56
Monitoring Servers
Managing the Server Monitor List
Table 8 File Access Audit Settings
Write attributes
Delete
Change permissions
Take ownership
Click OK to save the auditing entry. Click OK to close the Access Control Properties dialog. Click OK
to close the Properties dialog.
In the left pane of the Registry Editor window, expand the HKEY_LOCAL_MACHINE sub-tree by
clicking the + icon.
Continue expanding through the key and sub-key registry folders (through the path shown below)
until the Winreg entry is shown:
System\CurrentControlSet\Control\SecurePipeServers\Winreg
Click the Winreg entry, and then select the Permissions from the Security menu.
Verify that the Administrators group has sole access to this key.
Expand or collapse (as necessary) the HKEY_LOCAL_MACHINE sub-tree folder in the navigation
pane to the following registry path:
System\CurrentControlSet\Control\LSA
Double-click the LSA sub-key to expose the entries in the topic pane (on the right of the Registry
Editor window).
Verify that the RestrictAnonymous REG_DWORD entry (with a value of 1) appears in the LSA subkey entry listing.
Configuring Firewalls
VPM deployment in a WAN service provider environment can present security challenges not present in a
service subscriber environment. This section describes recommended configurations for servers
protected behind network operation center (NOC) firewalls. These security settings are designed to
simplify server administration while maximizing network security.
Within a typical service provider NOC, a firewall provides added security between the service providers
servers, and open (publicly registered) IP access by the service subscribers. Therefore, each server has
at least two network connections:
One connection provides access to the service providers closed ASE collection network using private
IP addressing (to simplify assignment and conserve registered IP address space).
The other connection provides access to the open client access network using publicly registered IP
addressing.
58
Monitoring Servers
Managing the Server Monitor List
For more information about the port requirements, see Appendix A, Open Ports for Firewall
Configuration.
In the left pane of the Registry Editor window, expand the HKEY_LOCAL_MACHINE sub-tree by
clicking the + icon.
Continue expanding through the key and sub-key registry folders through the following path:
HKEY_LOCAL_MACHINE\Software\Fluke Networks\UpTime\RPC Server\
Click the RPC Server folder, and select Edit > New > DWORD Value. The Registry Editor creates a
new value in the RPC Server folder.
Enter Port as the name of the new value. Double-click the value. The Edit DWORD Value dialog
appears.
In Value Data, enter the port number you want to use for the RPC server. This value must be a
decimal integer between 1024 and 65535.
Configure your firewall to allow incoming access to the servers RPC server on the specified port.
60
4. Monitoring Servers
Select Start > Programs > Fluke Networks > Visual Performance Manager Server > Server
Administration.
If the license agreement appears, click Accept to accept the terms of the license and proceed.
The server icons on the left side of the window are color-coded to reflect the status of the server (see
Table 9.
Table 9 Server Icon Colors
Color
Meaning
Gray
Green
Yellow
Red
The right side of the window shows a brief status message for each server. Table 10 describes these
status messages in increasing order of severity.
Table 10 Server Status Messages
Server Status
Icon
Cause
Recommended Action
Gray
62
Monitoring Servers
Managing the Server Monitor List
Table 10 Server Status Messages
Server Status
Icon
Cause
Recommended Action
No problems
detected
Green
None.
Insufficient DB
space
Yellow
Either the duration (in weeks) of longterm archive storage is too long or the
number of ASEs in the network is too
great.
Change the number of weeks for which longterm archives are maintained or to delete any
obsolete ASEs from the server in Domain
Configuration. (See Managing User Groups on
page 122.)
Yellow
Yellow
Yellow
Unreachable
Red
Server license
expires soon
Yellow
63
Server Status
Icon
Cause
Recommended Action
Select Start > Programs > Fluke Networks > Visual Performance Manager > Remote Server
Administration.
If the license agreement appears, click Accept to accept the terms of the license and proceed.
Note
Some Server Administration functions, such as deleting a VPM domain, require that you restart
VPM services. If you are using Remote Server Administration, make sure that your Windows user
account has permission to stop and start Windows services on the target server computer. See the
Software Installation Guide and the Windows Server online help for instructions on setting security
in Windows.
64
Monitoring Servers
Managing the Server Monitor List
In Server Administration, select the Visual Performance Manager Servers item. All servers are
listed (see Figure 16).
Select Action > Add Server. The Name and IP Address Setup dialog appears.
In Display name, enter a descriptive name to identify the server. (The display name has no
significance outside of Server Administration.)
In Server IP address or host name, enter the host name or IP address of the server.
Click OK.
Take the following steps to remove a server from the list of monitored servers.
Note
Removing a server only causes Server Administration to stop monitoring it. The server itself is
unaffected by this action.
To remove a server from the list:
1
Right-click the server icon and select Delete Server. Server Administration shows a message asking
you to confirm the deletion.
65
66
Monitoring Servers
Generating Administrative Reports
Table 11 Server Status Details
Category Item
Server
Information
Description
One-line status message indicating whether the server management software is in contact
with the server and the server has sufficient database resources. For messages, see
Server Status Messages .
If the server is running low on database resources, note the values for DB size and % free
for long-term, short-term, NPM, and APM databases. Then see Resolving Database
Space Issues on page 199.
Database
Information1
Server license
expiration
The date and time of expiration for the server license, if applicable. None indicates that
the server license is permanent and will not expire. Unknown indicates that the server
license key is invalid.
Domain
licensing
Licensing mode:
Short-term
DB size
Maximum amount of space allowed for the servers short-term (two-week) database. The
percentage free indicates how much of this total is still available.
Flexible(Service provider only) Feature licenses return to the pool for reuse when the
feature or ASE is removed or the entire domain is deleted.
Fixed(Service provider only) Feature licenses remain tied to the domain when a
feature or ASE is deleted or deactivated. Licenses do not return to the pool when a
domain is deleted.
NoneIn the default license mode, features are enabled server-wide, not on a domain
by domain basis.
For more information, see Configuring Licenses on page 155.
This database stores the data collected directly from ASEs. Total database size is
allocated at the factory, based on the anticipated number of ASEs in your network. To
determine the amount of space currently remaining, multiply the percentage free by the
size.
Short-term
DB log size
Maximum size of the log file for the short-term database. The percentage free indicates
how much of this total is still available.
Long-term
DB size
Maximum amount of space allowed for the servers long-term database. The percentage in
parentheses indicates how much of this total is still available.
This database supplies information used for long-term reporting and can grow quite large.
Total database size is allocated at the factory, based on the anticipated number of ASEs in
your network. To determine the amount of space currently remaining, multiply the
percentage free by the size.
Long-term
DB log size
Maximum size of the log file for the long-term database. The percentage free indicates how
much of this total is still available.
67
Category Item
Description
Database
Information
(continued)1
Maximum amount of space allowed for the servers NPM database. The percentage
indicates how much of this total is still available.
NPM DB size
This database supplies information used for NPM long-term reporting and can grow quite
large. To determine the amount of space currently remaining, multiply the percentage free
by the size.
NPM DB log
size
Maximum size of the log file for the NPM database. The percentage free indicates how
much of this total is still available.
APM DB size
Maximum amount of space allowed for the servers Application Performance Management
database. The percentage indicates how much of this total is still available.
This database supplies information used in APM views and reports and can grow quite
large. To determine the amount of space currently remaining, multiply the percentage free
by the size.
Domain
Information
Device
Information
APM DB log
size
Maximum size of the log file for the Application Performance Management database. The
percentage free indicates how much of this total is still available.
Domain count
Object count
Number of Visual UpTime Select ASEs, partner devices, defined VPI/VCIs or IP circuits,
and polled router IP SLA tests currently monitored by this server.
Number of
ASEs
supported
Maximum number of ASEs this server can support, as determined by its licenses. Polled
routers are not included in this count. This number is always 10000.
Number of
ASEs active
Number of ASEs currently monitored by this server. Polled routers are not included in this
count.
Number of
NPAs active
Number of
APAs active
68
Monitoring Servers
Generating Administrative Reports
and on-demand polling are unrelated and do not affect each other. By default, Server Administration polls
all monitored servers every 30 minutes to update their current status information. This setting can be
changed to poll as frequently as every 5 minutes or as infrequently as once a day. Polling can also be
performed on demand.
To set the polling frequency:
1
In Server Administration, select the Visual Performance Manager Servers item. All servers are
listed (see Figure 16).
Enter the polling interval in minutes. The lower the number, the more often Server Administration will
check server status. You can enter a value between 5 and 1440 (which is equal to 24 hours).
Click OK.
You can poll a server on demand to refresh its icon. If the server icon is red in the Server Administration
window, poll the server to see its current status.
To poll all servers on demand:
1
In Server Administration, select the Visual Performance Manager Servers item. The list of all
servers is shown (see Figure 16).
69
The user name and password must be valid for the server you are trying to access. For more information
about users, see Default User Accounts and Managing User Accounts.
If you cannot log in, your account may be locked. Contact your server administrator for assistance.
Item
Description
User
Domain Name
Session Type
70
Monitoring Servers
Generating Administrative Reports
Table 12 Active User Details
Item
Description
WebThe user is using the Web portal.
Connect Time
IP Address
Scheduling reports
For information about applying a custom logo to administrative reports, see Changing the Logo for
Reports.
Scheduling Reports
In Server Administration, you can schedule administrative reports at the server level from the Action >
Reports menu item. When creating a schedule, you can specify the date and time, frequency, start and
end dates, and delivery options for the selected report (see Figure 20). The scheduled report is generated
as a PDF file.
When working with schedules, note:
71
From the Action menu, select Reports. Select a report and from its submenu, select Schedule.
In the Start and End Dates section, select a starting date if applicable. Click the arrow to use the
calendar. To set an end date, select the checkbox next to End this schedule on: and specify a date.
To run the report indefinitely, leave the checkbox blank.
72
Monitoring Servers
Generating Administrative Reports
Note
If you deliver a report to accounts that use anti-virus software, the recipient may not be able to open
PDF files from these accounts. See your anti-virus and e-mail software documentation to find
options for allowing PDF files.
Report Server File ShareProvide the valid filename without the extension (this may not
contain the \ / : * ? < > | characters), type the path (such as \\server\shared), enter a
username with write access to the folder, and enter the users password on the shared drive.
5
Click OK.
From the Action menu, select Reports. Select the report type and from its submenu, select
Schedule.
In the lower left corner of the Schedule Report dialog, click Delete.
Administrative Reports
Administrative reports include:
Alarm NotificationsView information on configured alarms.
ApplicationsView information on configured standard and custom applications on a specific domain.
ASE Image UpdatesView information on successful ASE software image updates for the server or
a specific domain.
ASE Model SummaryView information about the number of ASEs deployed by model type for the
server or a specific domain.
ASE SummaryView summary information about ASEs and supported partner devices in each
domain on the server.
Configuration ChangesView information about recent administration and network configuration
changes for the server or a specific domain.
LicensesView license data for the server.
Server SummaryView domain summary information, database usage over time, and database
maintenance performance on the server.
APM Server SummaryView the status of data importing from APAs, aggregation in the VUpTimeDC
database, retrievals from the Web portal, and reports for a domain
Users and GroupsView details on all users and groups on the server.
Report Performance and UsageView breakdown of report generation by time, top users, by
appliance type, and many others.
73
Applications Report
The Applications report shows standard and custom applications and related details, including assigned
colors (with color image and RGB value). This report can be run only for a specific domain.
The report has the following tables:
Applications listed alphabetically, with profile information (for details, see Applications Report ).
Applications sorted by RGB color value.
Business and Rogue applications if applications have been classified.
Custom applications, which includes port range, subnet, URI prefix, and color as defined for the
custom application in the Applications or ASE Applications tool on the Web portal.
Table 13 Applications Report
Item
Description
Application
Application name.
Legacy Custom
Custom
Classification
Usage
Color
RGB
74
Monitoring Servers
Generating Administrative Reports
ASE software updates conducted through alternate means (such as from an ASE) are not included.
Therefore, the report information may not match the ASEs actual history or state.
Deleted and inactive ASEs are not included in the report.
If the same ASE appears multiple times in a domain (for example, if the same IP address appears as
multiple access lines), the report lists each instance with its own entry because an update operation is
associated with the access line. Note that the information for the duplicate ASE (the one not chosen
when the update occurred) may be out of date because a log entry for the duplicate ASE will not
exist.
The ASE Inventory permission is required to access this report. As with the ASE Summary report, data is
organized by domain and network and sorted alphabetically. For report details, see ASE Image Updates
Report .
Table 14 ASE Image Updates Report
Item
Description
ASE
ASE name.
Site
Version
ASE software version based on the last time the ASE was identified or
data collection occurred. An entry of UNKNOWN means that the ASE is
unreachable or has not been re-identified since an upgrade.
Prior Version
ASE Type
IP Address
IP address of ASE.
Product ID
For Visual ASEs, the ASE product ID (serial) number. The first four digits
indicate the ASE model number.
For partner devices, the device identification number in the format:
<vendor ID>-<product ID>
User
Update Time
Item
Description
Model Number
Type
Number of Active Number of deployed, active ASEs. Subcategories are: IPT (IP
ASEs
Transport), LV (LAN Visibility), and MP (Multi-Protocol).
VoIP Enabled
ASEs
Item
Description
ASE
ASE name.
Site
Version
ASE software version based on the last time the ASE was
identified or data collection occurred. An entry of UNKNOWN
means that the ASE is unreachable or has not been re-identified
since an upgrade.
Speed
IP Address
IP address of ASE.
ASE Type
76
Monitoring Servers
Generating Administrative Reports
Table 16 ASE Summary Report
Item
Description
Protocol.
Physical Interface The primary physical layer interface on the ASE. For example, T1,
DS1, HSSI, E3, Ethernet.
Link Interface
The link interface type. For example, Frame Relay, HDLC, ATM.
Partner
Product ID
For Visual ASEs, the ASE product ID (serial) number. The first four
digits indicate the ASE model number.
For partner devices, the device identification number in the format:
<vendor ID>-<product ID>
Last Data
Collection
The date and time of the last data collection from the ASE, using
the time of the last 15-minute interval. Last Data Collection
indicates how up-to-date historical data is in the database and can
reflect an inability to reach the ASE for an extended period. When
data collection has not occurred for more than two days, text is
shown in red. If the ASE has never had successful data collection it
is blank.
Note: The time reflects a successful completion of at least one set
of statistics. It does not mean all data had successfully been
collected.
Item
Description
Date
User Name
Domain Name
77
Item
Description
Change
Description
(Administration)
Change
Description
(Network
Configuration)
Licenses Report
The Licenses report shows license data for the server and all domains on the server. Information in this
report matches information shown in Server Administration licensing tabs. The License Administration
permission is required to access this report. For report table contents, see Table 18.
Table 18 Licenses Report
Table
Description
Domains
Server-wide
For each feature on the server, lists the number of users and
Feature Licenses power users (total, used, and available), whether the feature
license is evaluation or not, and its expiration date if applicable.
Domain
For each feature on the domain, indicates whether the feature is
Feature Licenses enabled permanently, the number of used licenses, the number of
licenses in reserve, whether the feature license is evaluation or
not, and its expiration date if applicable.
This section is shown when the server is in domain-flexible or
fixed licensing mode.
78
Monitoring Servers
Generating Administrative Reports
Table 18 Licenses Report
Table
Description
ASE Evaluation
Licenses
ASEs Under
Evaluation
Lists evaluation ASEs by port, site, and network for each domain
on the server.
Agent Licenses
Lists the initial, used, and available counts and the expiration date
of agent licenses by agent class.
Item
Description
Domain
Summary
Summary information for each domain is presented in two tables. The first
table lists the SNMP community string, whether the domain is enabled,
whether IP CoS SLA is enabled on the domain, whether Visual UpTime
Select, NPM, and APM features are enabled, the default data collection
time for ASEs, and the database maintenance time, The second table lists
the number of active ASEs, NPAs, and APAs, and the number of objects.
Short Term
Database Size and
Usage
Long Term
Database Size and
Usage
NPM Database Size
and Usage
APM Database Size
and Usage
Graphs show the usage and capacity of the short-term, long-term, NPM,
and APM databases and database logs over the past year. The
corresponding tables provide usage and capacity values and also include
the percentage of space free for the databases and the logs.
Database
Maintenance
Performance
For each domain, lists the average, minimum, maximum, and standard
deviation times for database maintenance based on the total number of
recent runs.
Number of Domains
79
Item
Description
Over Time
Graphs shows the maximum number of ASEs, NPAs, and APAs on the
Number of ASEs
Over Time
server, measured at weekly intervals, for up to the past 52 weeks.
Number of NPAs
Over Time
Number of APAs over
time
Number of Objects
Over Time
Table shows the number of domains, ASEs, NPAs, NPA network interfaces,
APAs, and objects on the server, measured at weekly intervals, for up to the
past 52 weeks.
Item
Description
A chart shows the seven stages of data flow from APAs for the last 24 hours. Each
box in the chart represents 15 minutes.
APA Records Aggregated - Bar chart shows the number of APA records aggregated in the VPM server
Last 24 Hours
database for the last 24 hours.
Stage 1 & 2 Details - APAs Shows the latency between the current system time and the current imported data
and Data Importer
time.
A table shows error and warning messages for the last 24 hours.
A table shows the data importer processing over the last day.
80
Monitoring Servers
Generating Administrative Reports
Table 20 APM Server Summary Report (continued)
Item
Description
Stage 3 & 4 Details - Import Shows the data importer latency, aggregator latency, and total latency.
Table and Data
Shows the number of records aggregated, processing time and aggregation rate.
Aggregation
Bar charts show the import table backlog and the aggregation rate over the last
seven days.
Tables show the last 30 entries in the aggregation log and the aggregation rate for
the last 24 hours and 30 days.
Stage 5 Details Aggregated Tables
Line chart shows the data ranges covered by each aggregated table in the database
for up to a year.
A stacked bar chart and table show the total number of records per aggregated table
by minute, hour, and day.
A stacked bar chart and table show the total disk space per aggregated table.
A table shows data deletion warnings and errors for the last 24 hours.
A bar chart shows the time it took to delete AggStat data for the last seven days.
A table shows the log of table indexes for the last 30 days.
Stage 6 Details - Retrievals Bar charts show the average retrieval time and retrieval performance distribution for
the last 60 minutes and last 24 hours.
Tables show the slowest retrievals for the last 24 hours and last seven days.
Tables show the slowest query groups, slowest aggregated table, and most popular
queries in the last seven days.
Stage 7 Details - Portal
Bar charts show the average page creation and render time and the number of Web
pages created for the last 60 minutes, last 24 hours, and last seven days. Tables
show the Web page creation and render time for the last 24 hours and last seven
days.
Bar charts show the average render time and number of reports created for the last
60 minutes, last 24 hours, and last seven days.
Tables show a log of reporting errors for the last 60 minutes, last 24 hours, and last
seven days.
A table shows the report generation time for the last 24 hours and last seven days.
Configuration Settings
A table shows the value and description of the VUpTimeDC database settings.
A table shows the stage number and name, color and value, and description of each
status threshold metric.
81
Item
Description
Groups
User Permissions
Enter the e-mail address (or addresses separated by commas) in the AlertEmailAddress attribute of
the ApaImporter element.
Any errors encountered while sending the e-mails are logged to:
82
Monitoring Servers
Generating Administrative Reports
C:\Documents and Settings\All Users\Application Data\Fluke Networks\Visual
Performance Manager Server\log\DataImporter.txt
83
5. Managing Domains
About Domains
Creating Domains
Conf
Asso
Configu
Con
Manag
Ena
Deleting Domains
Identifying ASEs
For more information on Web portal access permissions, see the Visual Performance Manager User
Guide.
About Domains
Each VPM server includes one or more domains. As the system administrator, you can create and
configure settings for domains, partitions of the server that contain data for unique sets of one or more
networks.
Note
Access to some domain-level tasks depends on user permissions.
84
Managing Domains
Associate an IP CoS Template with a Domain
Figure 21 Server Domain List
New servers automatically include one domain called Default. You can add more domains (up to the
number supported by the server) as necessary. You cannot delete the Default domain.
Note
Do not add ASEs to the Default domain.
Server Administration lists all domains on the server and provides options for editing their properties. To
see the list of domains, expand the server and select the Domains sub-item. The domain list indicates
whether each domain is enabled or disabled and the number of users in the domain who are active at the
moment (see Figure 21).
To view or edit the properties of a specific domain, select that domain in the left pane (or double-click it in
the right pane). The domain properties are organized into tabs. The set of tabs you see depends on the
permissions associated with your user account in this domain. For example, if your account does not
have permission to configure IP CoS settings, the IP Class of Service tab will not be available.
During normal operations, all domains are enabled or fully functional, but domains can be disabled
temporarily in Server Administration. For more information, see Backing Up and Restoring Databases.
Creating Domains
Your organization may require multiple domains if it is:
A service provider offering VPM as a service to its customers.
An enterprise with separate functional groups that require separate control and data access.
85
To add a domain:
1
In the left pane of Server Administration, expand the server and select the Domains sub-item. (See
Figure 21.)
Select Action > Add Domain. The Add Domain dialog appears.
In the Name field, enter a name that identifies the domain uniquely on the server. The name chosen:
Must contain 30 or fewer alphanumeric characters.
Must start with an alphabetic character, a pound symbol (#), or an underscore (_).
May contain a pound symbol or underscore only as the first character.
Is not case-sensitive.
Cannot contain blank characters (spaces or tabs).
86
Managing Domains
Associate an IP CoS Template with a Domain
Cannot be the same as a user login name.
4
Select Domain May Not Be Deleted to prevent users from deleting the domain.
Select Service Summary Domain to assign the domain for Service Summary use only (available
only in default licensing mode). For more information, see Cr
For detailed information about domain configuration (including secure ASE communications, feature
module support, ASE IP address restrictions, and reports logo), see Conf
Specify a priority of
1 (low) through
255 (high) for each
event type
In the Options tab for a domain, under ASE Configuration, enter a new time for Default Data
Collection Time. (See Figure 23.) You can use arrow keys to adjust values. The Apply default time
to existing ASEs checkbox becomes available.
Click OK.
You can also collect data on demand from all ASEs in a domain by selecting Action > Collect Data from
the menu.
Select Action > Collect Data. A message states: Data collection was requested. It will
proceed in the background now.
Click OK.
88
Managing Domains
Associate an IP CoS Template with a Domain
domain. For information about performing database maintenance and data collection for all domains on a
server, see Scheduling Data Collection and Database Maintenance.
Database maintenance settings in Server Administration affect the short-term and long-term databases
differently. For more information, see Data Storage.
To schedule or perform on-demand database maintenance:
1
Collect ASE dataFirst verify that the short-term database has the most recent network performance
data available. See Error! Reference source not found.
Perform daily and on-demand database maintenanceVerify that the long-term database has the
most recent network performance data available and that obsolete data has been purged. Ongoing
maintenance also ensures that the short-term database is up-to-date. See Error! Reference source
not found.
Perform monthly database maintenance (Optional)Verify that the long-term database is trimmed to
hold the appropriate historical data. See Scheduling Monthly Database Maintenance
Back up database (Optional)From the server using SQL Server, back up databases after ASE data
collection and database maintenance to make sure the backup contains the most recent data
available. For more information, see Chapter 10, Maintaining the Databases.
Warning
If you initiate on-demand ASE data collection followed by on-demand database maintenance,
data will be queued properly. You do not have to wait for data collection to complete before
initiating database maintenance. However, do not initiate or schedule database backup
during ASE data collection or database maintenance. Likewise, do not initiate ASE data
collection or database maintenance during database backup.
Select Action > DB Maintenance. A message states: Data collection was requested. It
will proceed in the background now.
Click OK.
In Daily Maintenance Time, specify the desired time for daily maintenance. (See Figure 23.) Enter
the hour, minute, second, and am/pm values or use the arrow keys to adjust these values.
To remove all data related to deleted network elements from the long-term database when database
maintenance runs, check Remove deleted network elements from reporting data. To retain this
data for historical reporting, clear the box.
To remove all data related to deleted applications, sites, or servers from the APM database, check
Remove deleted configuration items from APM data. All deleted data will be removed from the
database each day. To retain this data for historical reporting, clear the box.
90
Managing Domains
Associate an IP CoS Template with a Domain
5
Click the Remove Items Now button to immediately remove all deleted applications, sites and
servers from the database. All other associated data will be removed at the designated Daily
Maintenance Time. If the Remove deleted configuration items from APM data checkbox is not
enabled, deleted data is only removed once, not each day.
In Monthly Maintenance Day, enter the desired day for monthly maintenance to occur.
In Keep ___ Weeks of Reporting Data, enter the maximum number of weeks of data to be stored in
the long-term database.
Click OK.
In the left pane of Server Administration, select the domain in which to assign event priorities. Click
the Options tab if it is not already selected (see Figure 23). The right pane shows the properties of
the chosen domain.
Under Global Event Priorities, enter the priority values to be assigned for each type of event. The
greater the number, the higher the priority. The valid range is 1255.
Click OK.
Configuring Domains
From the domain Configuration tab, you can configure the authentication strings used to restrict access
to Visual ASEs and partner devices, ASE secured communications settings, what feature modules to
include, and the logo used in reports for the domain.
In default licensing mode only, you can also mark the domain as Service Summary. For more
information, see Cr
Figure 24 Domain Configuration
Specify communication
settings
92
Managing Domains
Associate an IP CoS Template with a Domain
Warning
If you change the community name, you must also change it on all ASEs in the domain so
that the names match. Otherwise, communication between VPM and ASEs will fail.
SNMP community naming rules are as follows:
The name may contain a maximum of 31 characters.
The SNMP community name field is case-sensitive.
The name must match exactly between the ASE and the VPM server and PAC.
If a single ASE is configured in multiple domains, all domains must use the same community name. To
change an ASEs community name, see the ASE User Guide.
To set the SNMP community name for a domain:
1
In SNMP Community String, enter the new community name. Click OK.
Configure each ASE in the domain to use the new community name.
Note
If failure notification occurs, log in to the ASE and use the EVENT command to see the IP address
attempting to contact the ASE.
In TFTP Authentication String, enter the new string. Click OK to save the change.
Configure each partner device in the domain to use the new authentication string. For more
information, see the documentation for partner devices.
Under Domain Configuration, for Router Polling Interval, specify a time in minutes in the range of
5 to 1440 minutes (24 hours). The default is 14 minutes.
Note
The recommended range for the polling interval is between 5 and 60 minutes.
Click OK.
94
Managing Domains
Associate an IP CoS Template with a Domain
To set the Application Summary Orientation:
1
Click OK.
Enter the Subnet Base IP Address in dotted decimal format. The IP address must be a valid IPV4
address.
Download the subnet list to the ASE by using the ASE identification tool. See Error! Reference
source not found.
96
Managing Domains
Associate an IP CoS Template with a Domain
For more information about PuTTY, see:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
SNMP notifications (traps) sent by ASEs are not encrypted.
To set up secure ASE communications:
1
Enter a passcode. Passcodes follow SNMP community name rules. For more information, see Error!
Reference source not found.
Specify the SSL TCP port used for secure communication. The default port is 2359.
Security Policy
Open
Partial
Full
SNMP
Read/Write
Read Only
Disabled
TFTP
Read/Write
Disabled
Disabled
Secure SNMP
Read/Write
Read/Write
Secure TFTP
Read/Write
Read/Write
Telnet
Enabled
Disabled
Disabled
SSH
Disabled
Enabled
Enabled
ICMP
Enabled
Enabled
Enabled
For information about ASE settings, see SECURITY in Chapter 5, ASE Administrative Commands, in
the ASE User Guide.
For information about applying security setting overrides for a specific ASE, see Chapter 2, Network
Communication, in the PAC User Guide.
97
In Network Address, enter the address of the network or subnet. If you specify a network or
subnet, only ASEs within the specified address range will be accessible and configurable. To
allow any IP address, use the default value (0.0.0.0).
In Subnet Mask, enter a subnet mask to further qualify the IP address (above). To allow any
subnet mask, use the default value (0.0.0.0).
Under Default Report Logo, the currently selected logo for reports in the domain is shown.
98
Managing Domains
Associate an IP CoS Template with a Domain
Click Change Logo to assign an override logo for reports in the domain only. In the Open dialog,
select a .jpg file to use as a logo and click OK.
Click Restore Default to restore the server-wide logo for reports in the domain. (This option is
available only when an override logo has been applied.)
3
IP CoS names assigned here will be shown in Troubleshooting, the IP Service Level Metrics report, the
Router IP SLA Service Level Metrics report, and reports for each CoS. CoS settings for ASEs in the
domain can be viewed through the ASE Configuration dialog in Network Configuration on the PAC.
Note:
99
In Server Administration, expand the IP CoS Templates category. To create a new template, select
the IP CoS Templates line and select Action > Add Template. To edit an existing template, select
one from the list.
The IP Class of Service Template appears (see Figure 26).
If creating a new template (or you wish to change the name), enter a descriptive name in the
Template field.
Select a Class of Service from the list and click Edit. The Class of Service dialog appears (see
Figure 27).
To include this class in reports, check Enable Class of Service. If you do not use this class and want
to exclude it from reports, clear Enable Class of Service.
100
Managing Domains
Associate an IP CoS Template with a Domain
5
To collect jitter measurements for this class (jitter is supported on one class), check Collect Jitter
Statistics on IP Circuits. (This applies only to ASEs that support jitter measurements.)
To gather SLA statistics on this class, check Use Class for SLA Measurements. To exclude this
class from SLA statistics, clear the box.
Enter a descriptive name for the class in the Description field. The name you enter can be up to 15
characters long. (Service providers typically provide this value to their customers.)
For Policing Threshold, use the radio button to select the method and then set the upper usage limit
for this class either in kilobits per second (kbps), or as a percentage of CAR (committed access rate).
For IP TOS Definitions, use the radio buttons to select DSCP (Differentiated Service Code Point) or
IPP (IP Precedence) standards or Custom. If DSCP or IPP is used, select the values to include by
enabling the checkboxes in the Value column. If Custom is selected, specify the Data/Bitmask values
in the TOS Value/Mask List field. Use hexadecimal notation; for example: 0xB8/0xFC, 0x30/0xFC.
10 Click OK to save your changes to this class. To edit another class, return to step 3.
Table 22 summarizes the CoS settings.
Table 22 IP CoS Settings
Setting
Description
Enable Class of
Service
Collect Jitter
Statistics on
IP Circuits
Specify whether to collect jitter statistics for this CoS (on ASEs that
support jitter measurements).
Description
Policing
Specify either kbps or a percentage of the Committed Access Rate,
Threshold (kbps) usually set by service provider in the SLA. Service usage exceeding
this mark would not be guaranteed to the same degree as service
up to this mark.
IP TOS
Definitions
101
Right click on the template that you wish to delete and select Delete Template.
Note
You cannot delete the Default Template.
In Server Administration, expand the Domains category and select a domain (see Figure 21). Click
the IP Class of Service tab.
Select a class of service from the list and click Edit (see Figure 26).
Verify that the Jitter Statistics and SLA Measurements settings are correct. You can also enter a new
name for the Class of Service. Select the checkbox to Enable Class of Service.
Click OK.
All ASEs in the domain will inherit the CoS settings.
102
Managing Domains
Associate an IP CoS Template with a Domain
In Server Administration, select the domain. Click the SNMP Notification tab.
When you are finished configuring the list of destinations, click OK to apply the changes.
103
In Server Administration, select the domain. Click the Associations tab. Any users already
associated with the domain are shown in the upper part of the window.
Under Add Association, select one or more available users, and then select a group. The group
defines the set of permissions available to those users.
Click Add Association to add the user or users to that domain with that groups permissions.
104
Managing Domains
Identifying ASEs
Figure 31 Domain Report Settings
Select a setting to
activate all its report
groups
In Server Administration, select the domain. Click the Report Settings tab (see Figure 31).
105
Subgroup
Reports
Application
Management
None
Capacity
Planning
VoIP Assessment
VoIP Assessment
VoIP Management
VoIP Performance
Service Level
Management
VoIP
106
Managing Domains
Identifying ASEs
Table 23 Domain and Network Reports
Setting
Subgroup
Reports
Application
Server
Management
None
Port Reports
Table 24 lists each subgroup for port-based reports and identifies the specific reports available when a
subgroup is selected.
Table 24 Port Reports
Setting
Subgroup
Reports
Application
Management
None
Capacity
Planning
None
Performance
Circuit Congestion
Circuit Usage
Physical Line
107
Setting
VoIP
Application
Server
Management
Subgroup
Reports
Port Usage
Service Level
Management
VoIP Assessment
VoIP Assessment
VoIP Management
VoIP Performance
None
Site Reports
Table 25 lists each subgroup for site-based reports and identifies the specific reports available when a
subgroup is selected.
Table 25 Site Reports
Setting
Subgroup
Reports
VoIP
108
Managing Domains
Identifying ASEs
NPM Reports
Table 26 lists domain-wide NPM reports.
Table 26 NPM Reports
Setting
Reports
NPA
APM Reports
Table 27 lists domain-wide Application Performance Management reports.
Table 27 Application Performance Management Reports
Setting
Reports
APM
Activate or deactivate
features for the domain
110
Managing Domains
Identifying ASEs
If the reserve count is zero when the feature is activated, licenses are drawn directly from the server
pool.
When you deactivate a feature, all consumed licenses on ASEs in the domain return to the domain
reserve for that feature. In domain-fixed mode, licenses assigned to a domain remain with that
domain. In domain-flexible mode, the server-wide administrator can reassign licenses from one
domain to another.
When managing domains with unique feature sets, you can either turn off a feature server-wide and
activate it only on specific domains or leave it available server-wide and turn it off on specific
domains. When a feature is available server-wide, by default, it is active on all new domains. When a
feature is deactivated on one domain, by default, it is not active on new domains.
To add and manage feature evaluation licenses for the domain, see Adding a Feature Evaluation
License
In default license mode, the domain Licensing tab is read-only.
Contact Fluke Networks to obtain a feature evaluation license key. You will need to provide a server
ID.
Enter the feature evaluation license key and click Add. In the Eval column, checkboxes are shown for
the features purchased, along with the expiration date.
Change the IP address value in the RemoteAddress value = ... line to the IP address of the
desired syslog recipient.
Note
If the section of code is commented out (indicated by <!-- .... --> tags), remove the tags.
You can use a Hostname instead of an IP address.
You can create multiple syslog recipients by copying the entire section of code and inserting it after
the existing code section. You must change the name in the <appender name="Syslog" line. For
example, change it to <appender name="Syslog2". Change the RemoteAddress value to the
IP address of the additional recipient
Locate the line <!-- <appender-ref ref="Syslog" /> --> and remove the comment tags. If
you have created multiple recipients, create an appender-ref line for each recipient and change
the value to match the name in the <appender name="Syslog" line. For example, if you created
two recipients, it would look like:
<appender-ref ref="Syslog" />
<appender-ref ref="Syslog2" />
Save the file. Changes take effect immediately; you do not have to restart the VPM application.
Note
During an upgrade, changes made to the DataImporterLogging.xml file are lost. A backup copy is
saved in the ...\config\backups folder. You can copy the changed sections from the backup file to
the new file.
112
Managing Domains
Identifying ASEs
Settings from the Configuration tab: SNMP community string, TFTP authentication string, ASE IP
address range.
ASE secured communications settings.
IP CoS settings.
Report settings.
Service Summary settings.
Protocol/Application colors.
Custom application definitions.
Business hour definitions.
Application alarm configuration settings.
Default report logo.
Note
These domain settings are always changed during copying, even if the administrator performing the
copying does not have permission to edit some of the settings. For example, if a user account has
permission to copy domain settings, but cannot edit IP CoS settings, the IP CoS settings are still
copied along with the other settings.
The following settings are not copied from the source domain to the target domain:
Module support settings.
User associationsAfter copying from the source domain, no user accounts will be associated with
the target domain. Power users can access the target domain immediately, but for other users, you
will need to associate the accounts with the target domain.
Enabled/disabled statusThe target domain will be enabled after copying.
NameThe target domain retains its name.
Event forwarding addressesAfter copying settings to the target domain, all domain forwarding
information in the target domain will be lost. If you want the target domain to forward events, you will
need to configure event forwarding after the copy.
LicensesDomain-specific licenses do not transfer to the target domain.
To copy settings from one domain to another:
1
Select Action > Copy Settings. The Copy Domain dialog appears.
113
Select a domain to copy settings from and click OK. The domains properties are copied, but the
associated users and contents (networks and configured sites, access lines, circuits, and event
configurations) are not.
Click OK. The process may take several minutes to complete. (You do not need to restart the server.)
Deleting Domains
Deleting a domain deletes the domains association with specific users, although the users themselves
are not deleted.
In order to delete domains, your Windows user login must have Administrator or Power User privileges on
the VPM server. In addition, your VPM user account must be a member of a group with Domain
Management permission.
Warning
Deleting a domain is an irreversible operation that removes all network configuration, shortterm, and long-term data in the domain. Therefore, make sure you back up the network
performance database before deleting a domain. See Backing Up and Restoring
Databases.
Deleting a domain also stops VPM services, making the server inaccessible to all clients
regardless of the domain they are using. Notify all users before stopping these services.
Users must log out of VPM until the server is restarted. Any client users who remain logged
on will receive error messages and must exit VPM.
114
Managing Domains
Identifying ASEs
To delete a domain:
1
Select Action > Delete Domain. The Delete Domain dialog is shown.
If another domain needs to be deleted, clear the Restart services checkbox so that the services are
not restarted automatically.
If report subscriptions cannot be deleted, you may receive a message after the domain is deleted.
Click OK.
If other domains need to be deleted, repeat steps 1 through 5. When deleting the last domain, select
the Restart services checkbox.
Identifying ASEs
You can use the Identify ASE command line tool (IdentifyASE.exe) from the VPM server or PAC to
identify ASEs in a specific domain or in all domains on the server. The Identify ASE tool can be run from
the VPM server or remotely. It is installed with VPM program files.
You can schedule the Identify ASE tool to run using Windows built-in scheduling or run the tool from a
script. As with other command line programs, you can send output to a file.
The Identify ASE tool requires the Identify ASE permission for the domain. If you do not have the Identify
ASE permission for a domain, the domain is not included.
For information about the Identify ASE feature available from the PAC interface, see Identifying ASEs, in
Chapter 6, Domain Options, in the PAC User Guide.
To run the Identify ASE tool:
1
Open a command line window. From the Windows Start button, select Run. In the Run window, type
cmd and click OK.
In the command line window, go to the directory where the Identify ASE tool is located and run the
program. Default locations are:
On the PAC: <drive>:\Program Files\Fluke Networks\Visual UpTime Select
PAC\IdentifyASE
On the server: <drive>:\Program Files\Fluke Networks\Visual Performance
Manager Server\IdentifyASE
The following is shown:
At least four arguments are required. 1 passed.
Usage: IdentifyASE <Select Server> <username> <password>
[/Domain name] [/UpdateIPCoS] [/UpdatePolicing] [/Verbose]
[/Logfile name]
115
Enter a valid server name, user name, and password and any additional specifications (see Table
28). Options are case-insensitive and may be entered in any order. For example, to identify ASEs on
domain XYZ:
IdentifyASE servername VPMadmin vpm /Domain XYZ
During ASE identification, the current domain and network are shown as eligible ASEs are processed.
Errors, such as an unreachable ASE or an invalid login, are shown. A message at termination indicates
whether all ASEs were identified or if any failures occurred. The IdentifyASE.txt log file (located in the
same folder as the Identify ASE tool) is updated with the list of ASEs processed and errors.
Table 28 Identify ASE Commands
Command
Definition
server name
username
password
/domain XYZ
/UpdateIPCoS
/UpdatePolicing
/verbose
/logfile filename
Enter a new target path and filename for log output. You must
specify a new target if you run multiple copies of the Identify
ASE program at the same time.
116
Managing Domains
Identifying ASEs
If errors occurred during ASE identification error return codes are generated when the program
terminates (see Table 29). These can be used by a parent application or script.
Table 29 Identify ASE Assigned Values
Value
Definition
Success
Login failure
117
6. Managing Users
As the system administrator, you can configure servers, domains, user groups, and user accounts. You
can set up user groups to control permissions for each user.
Topics in this chapter include
Typical uses of access controlVPM provides flexible ways of controlling user access.
Managing user groupsA user group is a set of access permissions shared by multiple VPM users.
You can view members of user groups, create and edit groups, and assign group capabilities.
Managing user accountsA user account is a login name and password that identifies a VPM user
and determines what features the user can access in VPM. You can create or copy user accounts,
assign or change user passwords, select domains, lock or unlock user accounts, set login
requirements for PAC users, delete user accounts, and generate a report of user accounts.
For more information on Web portal access permissions, see the Visual Performance Manager User
Guide.
Managing Users
Controlling Access to VPM Features
to a central server and configure licensing for that server locally, then remotely configure licensing for
every other server in the service providers NOC.
A service provider needs to define custom classes of service for configuring its ATM customer
circuitsThe server administrator can log in to the central server at the NOC and configure custom
classes of service for the local and any remote servers.
119
User Capabilities
User capabilities include event acknowledgment, Web portal password changes, feature access, and
reports-related privileges.
Table 30 User Group CapabilitiesUser
Capability
Event Acknowledge
Change Password
Change his or her own password. This is enforced only on the Web portal
Traffic Capture
Portal Page Management Access option to modify and delete default Web portal pages if these pages have not
been set to read-only by an administrator. Users that do not have the Portal Page
Management permission cannot modify default pages.
Connex Performance
Allow a (non-power) user access to the VPM Connex API performance data.
120
Managing Users
Managing User Accounts
Table 30 User Group CapabilitiesUser
Capability
Data
Share Reports to Other
Groups
Allow a (non-power) user to share a custom report with other groups within the
domain. The Share Report criteria is defined in each individual report.
Application Summary
Access the Visual UpTime Select Application Summary tab. Application Summary
shows application and application server performance data.
VoIP Summary
Report Scheduling
Schedule reports. This includes scheduling the date and time when all reports in a
report group are generated and the output format and destination.
E-mail Notification
Connex Configuration
Data
Allow a (non-power) user access to the VPM Connex API configuration data.
Port Reporting
Access port and circuit performance reports. Users can also create or delete port
report subgroups and create, edit, or delete port reports.
NPM Reporting
APM Reporting
Share Reports
Allow a (non-power) user to share custom reports to other users within the same
group. Other users can run or schedule the original report but can not edit it.
Table 31 lists required licenses and group capabilities for report types.
Table 31 Required Licenses and Group Capabilities for Reports
Report Type
Report Settings
License
Group Capability
Application Performance
Management (for APA)
APM
Application Performance
Management
APM Reporting
Application Performance
Management (for NPA)
NPM
Network Performance
Management
NPM Reporting
Application Performance
Management (for ASE)
Application Management
Server Performance
Application Server
AppSummary
121
Report Type
Report Settings
License
Management
Capacity Planning
Capacity Planning
VoIP Performance
Management
VoIP
VoIP
Group Capability
For port reports: Port
Reporting
Performance
Port Reporting
Network Performance
Management (for NPA)
NPM
Network Performance
Management
NPM Reporting
WAN Optimization
NPM
Network Performance
Management
NPM Reporting
Capability
Network Configuration
Access the PAC Network Configuration toolset to map the topology of WANs into the
network performance database. Access ASE trap destinations on the PAC
Performance
Monitoring
Access the PAC Performance Monitoring toolset, which allows the user to configure
which network events will be reported by each ASE.
ASE Inventory
122
Managing Users
Managing User Accounts
Table 32 User Group CapabilitiesNetwork Configuration
Capability
NPM Configuration
APM Configuration
Poller Configuration
Administration Capabilities
Users with Administration capabilities can perform administrative tasks at the server and domain levels.
Table 33 User Group CapabilitiesAdministration
Capability
Server Settings
Modify global Service Summary settings, ATM CoS settings, and server-level access
control settings (such as password expiration). This permission also allows the user
to control whether Application Summary users can e-mail reports or save them on a
file server. For more information, see Chapter 7, Configuring Server Settings.
Create user groups, edit the permission settings of user groups, and configure user
group membership.
Note: Because this permission enables the user to change his or her own access
permissions, grant this permission only to those users who require no other
restrictions.
IP Class of Service
Configure IP CoS settings (in the domains with which the user is associated).
License Administration
Enter license keys for ASE evaluations, partner devices (agents), feature licenses,
and a backup server license. Also permits the user to activate or deactivate feature
licenses. For more information, see Configuring Licenses and Managing Licenses
for a Domain.
Notification
Activate, deactivate, and configure alarms and events from the Alarm Notifications
administrative tool on the Web portal. Activate, deactivate, and configure the
forwarding of events from the local VPM server to other hosts running third-party
event managers (HP OpenView for example).
Domain Options
Modify the following: ASE SNMP community string name, ASE data collection
settings, database maintenance settings, and global event priorities.
Domain Management
Delete, rename, and copy domains. For power users, this capability also permits the
user to create new domains.
Note: Copying domain settings may allow a user to change settings that he or she
does not otherwise have permission to edit. For example, if a user can copy domain
settings but cannot edit IP CoS settings, the IP CoS settings are still copied along
with the other settings. For this reason, the Domain Management permission should
be granted only to users who also have IP CoS and Domain Options permissions.
123
Capability
Configure Services
Exclusion List
Edit the list of excluded services in the Visual UpTime Select Service Summary view.
By placing an item in the exclusion list, users can prevent the status of that item from
affecting the status of other items that contain it. For more information, see the Visual
UpTime Select User Guide.
Portal Administration
Access the Panel Permissions and User Group Templates administrative tools in the
Web port. For more information, see the Visual Performance Manager User Guide.
Troubleshooting Capabilities
Users with Troubleshooting capabilities can access various Troubleshooting views.
Table 34 User Group CapabilitiesTroubleshooting
Capability
Basic Troubleshooting
Access the Visual UpTime Select Troubleshooting toolset for analysis of network
performance data.
Burst
VoIP Calls
Back-in-Time
Trace File
Service Advisor
Application Flows
IP Class of Service
124
Managing Users
Managing User Accounts
Figure 34 User Group Members
To see which users are associated with this group when using specific domains, click the Users tab.
To see which users have this group as their default group, click the Default Users tab.
In Server Administration, expand the server where the group should be created and select the
Groups sub-item.
Select Action > Add Group. Server Administration creates a new group.
In Capabilities for, enter a name for the user group. The name must be unique among all groups on
the server. Group names are not case-sensitive.
Select all permissions to be granted to members of this group. See Error! Reference source not
found. for details about permissions.
Click OK to save the new group. To add users to this group, see Assi
To rename the group, enter a new name in Capabilities for. The name must be unique among all
groups on the server. Group names are not case-sensitive.
Edit the permission settings as needed. To grant a permission, check the box. To deny a permission,
clear the box. See Error! Reference source not found. for details about permissions.
Click OK. To make changes to the members of the group, see Assi
126
Managing Users
Managing User Accounts
Figure 35 List of Users on a Server
To view or edit the properties of a specific user account, select that user in the left pane (or double-click
the users name in the right pane). User account properties are organized under two tabs: User Settings
(see Figure 36) and Domain Group Association.
Figure 36 User Settings - VPM Authentication
After defining domains on the server, you can configure user accounts within each domain. You can
Create or copy user accounts.
127
Creating an Account
To create a user account:
1
In User Name, enter the login name for the new account. This name must be unique on the server.
User names are case-sensitive. The name you enter must:
Contain 50 or fewer characters.
Not be the same as a domain name.
In Password, enter an initial password. Because passwords are confidential, they display as
asterisks (*). See Table 5.
In Description, enter a description to identify the user, such as his or her full name.
The user will not be able to log in from other IP addresses. This restriction applies only in the PAC.
Web portal users are not restricted by IP address.
128
Managing Users
Managing User Accounts
7
In Default Group, select the user group to be applied to this user account by default. For power
users, this setting determines their group in all domains.
To lock the account, check Account Locked. To allow the account to log in, leave the box clear.
To designate the user as a power user, granting access to all domains on the server, check Power
User. To grant access to specific domains only, leave the box clear and:
a
In Groups, select the user group with access permissions to be applied to the new user in the
context of the selected domain.
Repeat steps 9b-d for each domain to be associated with the new user account.
Copying an Account
To copy a user account:
1
Select Action > Copy User. Server Administration creates a new user account and assigns the same
description, default group, power user status, IP address settings, and domain memberships.
In User Name, enter a login name for the new user account.
129
In Server Administration, select the user account. Click the User Settings tab.
In Password, delete the existing password (if any) and enter the new password.
130
Managing Users
Managing User Accounts
Figure 37 Managing Domain Access and Group Membership
To delete an existing
association, select it from the
list and click Delete
Association
In Server Administration, select the user account. Click the Domain Group Association tab.
In Groups, select the user group to be applied to the user account when accessing the selected
domain.
Click Add Association. The domain/group association appears in the list at the top.
Repeat steps 2 and 3 to adjust the list of associated domains as needed. When you are finished, click
OK.
131
Click OK.
Click OK.
In Server Administration, select the user account. Click the User Settings tab.
To lock the account, check the Account Locked checkbox. To unlock the account, clear the box.
132
Managing Users
Managing User Accounts
Power users are automatically associated with any new domains created.
To designate a user as a power user:
1
In Server Administration, select the user account. Click the User Settings tab.
Check the Power User checkbox. A message states that the user will be automatically added to all
domains and that current associations for the user will become void.
In Default Group, select a user group for the account. The permissions of the selected group will
apply to the power user in all domains.
Click OK.
Specifying Authentication
When setting up a user account, if external authentication is enabled for the VPM server on the Server
Settings External Authentication tab, you can set whether the users login information will be
authenticated by the VPM server or an external LDAP or RADIUS server in the User Settings tab for a
user account.
If external authentication is enabled for the server, note:
The password field is not available for editing.
External is the default for new users.
Existing users retain VPM authentication, but this can be changed.
To specify the authentication mode:
1
In Server Administration, select the user account. Click the User Settings tab.
Click OK.
This chapter explains how to configure global settings that apply to all domains on the server. Topics
include:
Setting login and password policiesEnforce password expiration, implement password text
complexity, and lock user accounts automatically under certain conditions.
Configuring general settings for the serverThese include report publishing and delivery settings,
VoIP call quality settings, and logo customization for reports.
Defining Classes of Service for use with ATM circuits.
Enabling external authentication.
Configuring licensesSet up licenses for VPM features and feature evaluations, agents (partner
devices), ASE evaluations, and backup servers.
See also:
Configuring Service Summary Settings.
Managing Licenses for a Domain.
134
In Server Administration, expand the server and select Server Settings. Click the Access Control
Settings tab.
To activate password expiration, check Passwords expire after. To deactivate password expiration,
clear the box.
In the days field, enter the maximum number of days to allow users to keep a password.
To require all new users to change their passwords the first time they log in, check Change
password on first login.
Click OK. If password expiration is activated, the systems expiration clock starts counting days
beginning with the current date. After the specified number of days has passed, users will be
prompted to change their passwords the next time they log in to VPM.
In Server Administration, expand the server and select Server Settings. Click the Access Control
Settings tab.
To require a minimum number of characters in each new password, check Enforce minimum
password length and enter the desired number of characters. To allow passwords of any length,
clear the box.
To require passwords to contain both numbers and letters and to prevent passwords that contain the
user name or form part of the user name, check Enforce password complexity rules. To deactivate
these restrictions, clear the box.
To keep a password history for each user and prevent the recycling of passwords:
a
In Retain history of ___ passwords, enter the number of passwords for VPM to store and
prevent users from recycling. This setting includes the current password. To retain the current
password and 10 previous passwords in the history, enter 11. The default setting, when
activated, is 12.
136
In Password reuse allowed after ___ days, enter the maximum number of days you want to
keep each old password in the history list. Passwords older than this limit will be discarded from
the history, and available for use.
To stop keeping a password history, clear the Password History Settings box.
5
137
In Server Administration, expand the server and select Server Settings. Click the Access Control
Settings tab.
To lock user accounts automatically after one or more days of inactivity, check Disable account if no
login within ___ days and enter the desired number of days. To deactivate automatic locking of idle
accounts, clear the box.
To lock user accounts automatically when they are used in failed login attempts:
a
In Lock after ___ login failures in ___ minutes, enter the maximum number of login attempts to
allow and the number of minutes for VPM to track each login failure.
To automatically unlock accounts that have been locked because of login failures, check Unlock
after __ minutes and enter the number of minutes for the account to be locked. To deactivate
automatic unlocking, clear the box.
To deactivate automatic locking based on login failures, clear the Lock/Unlock Accounts box.
4
Click OK.
138
To allow users to save reports to a file server, check Users may save reports to file server. To
forbid this, clear the box.
To allow users to send reports by e-mail, check Users may e-mail reports. To forbid this, clear the
box.
Click OK.
139
Clear the Warn users if feature licenses will expire soon checkbox.
140
Select a call quality metric from the dropdown menu. Options are:
LQ MOSListening quality mean opinion score.
CQ MOSConversational quality mean opinion score.
CQ R-FactorConversational quality R-Factor.
In the Change Default Report Logo dialog, select a .jpg file to use as a logo and click OK.
141
In Server Administration, expand the server and select Server Settings. Click the ATM Class of
Service tab.
To include a pre-defined CoS, check its box in the Pre-Defined ATM Class of Service area. To
exclude a CoS, clear the box.
Select either PCR or SCR from the list at the right of the text box.
142
Click OK.
143
In Server Administration, expand the server and select Server Settings. Click the External
Authentication tab (see Figure 41).
If the directory server is a Windows Server running Active Directory, select Microsoft Active
Directory. If the directory server is a Linux/UNIX machine running OpenLDAP, select OpenLDAP.
Select the LDAP version. For most LDAP servers, select v3 (the default setting). For users of legacy
systems, which support only v2 protocol, select v2.
Select the BindMethod, either Simple or GSS Negotiate (if the Directory Server supports Kerberos
GSS (Generic Security Service)). GSS Negotiate is not available if OpenLDAP is selected as the
Directory Server.
Enter the LDAP server IP address or DNS name and the port number on which the server is
activated.
Enter the base DN information of the LDAP server. For OpenLDAP, if users are present under more
than one base DN, provide all possible base DNs, separated by semicolons.
10 For OpenLDAP, configure the name attribute by which users are identified on the LDAP server.
11 (Optional) Test the LDAP connection to verify settings. Enter the username and password of the test
connection and click Test. A dialog shows the status of results:
The LDAP/AD server cannot be reached.
The LDAP/AD server can be reached but authentication failed.
The LDAP/AD server can be reached and authentication passed.
The LDAP/AD server is the wrong version.
If the LDAP server cannot be reached, is the wrong version, or authentication failed, verify that the
settings are correct and retest the connection.
144
In Server Administration, expand the server and select Server Settings. Click the External
Authentication tab (see Figure 42).
Enter the RADIUS server IP address or DNS name and the port number on which the server is
activated. (Port 1812 is the typical RADIUS reserved port.)
(Optional) Test the RADIUS connection to verify settings. Enter the user name and password of the
test server and click Test. A dialog shows the status of results:
The RADIUS server can be reached and authentication is successful.
The RADIUS server can be reached but authentication failed.
The RADIUS server cannot be reached.
If the RADIUS server cannot be reached or authentication fails, verify that the settings are correct and
retest the connection.
You can now specify External authentication in the User Settings. Refer to Specifying
Authentication.
145
Configuring Licenses
As administrator, you set up and manage the distribution of licenses in VPM. VPM provides a range of
licensing options and features. The options available to you depend on the licensing mode (default or
domain) and licensing features your organization has purchased.
Note
Domain-fixed and domain-flexible licensing modes are available for service providers only.
This section explains how licensing works and provides step-by-step instructions on each aspect of
licensing. Topics include:
Licensing modesCompare licensing features available in the default and domain-fixed and domainflexible licensing modes.
Managing feature licensesAssign permanent feature licenses or use feature evaluation licenses to
temporarily evaluate features. Service providers can also assign features only for use by power
users.
Managing ASE evaluationsUse ASE evaluation licenses to temporarily evaluate VPM ASEs.
Managing agent licensesUse agent licenses for supported partner devices in VPM.
Configuring a backup server licenseEnable a backup server for use when your primary server is
unavailable.
Using LAN Visibility licensesUnderstand how to apply and manage LAN Visibility licenses, which
are directly linked to LAN Visibility ASEs.
To view and edit server-based licensing information in Server Administration, you need License
Administration permission. For more information, see Administration Capabilities.
Licensing on both local and remote servers can be configured using Server Administration. Because the
servers database stores license key data for each server, you can administer this data remotely using
Remote Server Administration. This enables you to manage license keys for multiple servers from a
single console.
Note
From the point at which feature, feature evaluation, ASE evaluation, and agent, licenses are
created, you have 30 days to enter these into VPM.
When upgrading to the current VPM version, all licenses are returned and the new LAN Visibility license
is disabled by default.
For information about domain-level licensing options, see Managing User Groups.
146
Licensing Modes
Options for applying feature licenses depend on the licensing mode:
Default licensing modeApply feature and other licenses at the server level uniformly to all domains.
Create Service Summary domains with no features.
Domain-fixed or domain-flexible licensing modesApply feature licenses uniquely to each domain on
the server for a specified number of ASEs. Domain-fixed and domain-flexible modes provide different
options for handling licenses. Feature modules can be enabled or disabled at the server, domain, and
power-user levels.
Note
Domain-fixed and domain-flexible licensing modes are available only for service providers.
Table 35 provides a comparative analysis of licensing modes.
Table 35 Licensing Features and Options by Mode
Feature/
Option
Default
Domain-Fixed
Domain-Flexible
Feature
Licenses
Feature
Evaluation
Licenses
Single domain.
Single domain.
Server-wide.
Server-wide.
Server-wide.
Server-wide.
Backup
Licenses
Not applicable.
Not applicable.
Power Users
Supported.
Supported.
Server-wide.
147
Feature/
Option
Default
Domain-Fixed
Domain-Flexible
Summary domains.
Service
Summary
Domains
Supported. No power
users are permitted.
Rename
Domain
Feature licenses are lost. PowerAll licenses and duplicate ASEs are
user and feature evaluation licenses unaffected.
and duplicate ASEs are unaffected.
Disabled
Domains
Count in licensing.
Count in licensing.
Delete Domain
New Domain
Add ASEs
Delete ASE
Inactive ASE
Count in licensing.
Inactive ASEs in any domain do not Inactive ASEs in any domain do not
consume licenses.
consume licenses.
148
Warning
If no permanent licenses are entered after the initial 30-day evaluation period, all domains on
the server will become Service Summary domains.
When working in default licensing mode, note:
When adding an ASE, features are enabled on all domains (except Service Summary domains) for
regular users. Power users may have additional features enabled. To add an ASE, feature licenses
for regular and power users are required for all enabled features.
Domains can be specified as Service Summary, which means that all features beyond Service
Summary are unavailable to all ASEs in the domain. For more information, see Creating a Service
Summary Domain.
If you have power-user licenses on your system, you cannot create a Service Summary domain.
When you change a Service Summary domain to a standard domain, unused and active feature
evaluation licenses are lost.
When you delete a standard domain, a license is returned for each unique ASE, both for regular-user
and power-user licenses. When you delete an ASE or domain, licenses are recovered for reuse.
When an ASE is duplicated in the same domain and in no other domain (whether once or more
times), only one license is recovered.
You can enter duplicate ASEs in any domain without consuming additional licenses.
For more information, see .
150
Note
Each server stores its own feature license key. If your organization uses multiple servers, you must
obtain a feature license key for each server and repeat the following procedure for each server.
To add feature licenses:
1
Contact Fluke Networks to obtain a license key. You will need to provide a server ID. Be sure to
specify whether you want the license for all users or for power users only.
In Server Administration, select a server from the tree and select Licenses.
Click the Feature License tab. The total ASE count, all available features, the current feature license
count, and license status are shown (see Figure 43). Refer to the Fluke Networks website for more
information.
151
To add feature evaluation or permanent licenses, enter the license key number and click Add. New
licenses are added and counts are shown in the Available and Total columns. Feature evaluation
licenses are checked and expiration dates are shown.
Note
In default licensing mode, you can enter feature or feature evaluation license keys. In domain
licensing mode, you enter only feature license keys at the server level. Feature evaluation keys are
entered at the domain level (see Managing Licenses for a Domain.).
To enable regular-user or power-user licenses at the server-wide level, select the All Users and/or
Power Users checkboxes.
Click Save. Click Cancel to cancel selections in the feature license list only. Once a license key is
entered, it cannot be canceled.
152
153
Contact Fluke Networks to obtain the ASE evaluation license key. You will need to provide the server
ID.
In Server Administration, select a server from the tree and select Licenses.
Click the ASE Evaluations tab. The current ASE evaluation license count is shown (see Figure 44).
To add licenses, enter a valid license key and click Add Key. The number of ASE evaluations is
shown in the Initial Count and Available columns along with the expiration date.
154
Contact Fluke Networks to obtain an agent license key. You will need to provide a server ID.
In Server Administration, select a server from the tree and select Licenses.
Click the Agents tab. Initial and available agent license counts, a description of each class, and the
expiration date (if applicable) are shown (see Figure 45). For permanent licenses, None is shown.
When no license is defined, Unknown is shown. When the expiration date passes, you must enter a
new agent license key for that class.
In the Agent License dialog, enter the number of licenses you have purchased and the new license
key for that class. Click OK.
155
Repeat steps 1-5 for each new license key you have obtained.
156
Warning
To use backup licensing on a new or upgrade system, first deploy permanent licenses on the
primary server. Then, on the backup server, enter the backup license key before migrating
license data from the primary server. For information about managing an upgrade with a
backup server, see the Software Installation Guide.
For information about setting up data replication for the backup server and for converting a backup
server to a primary server, contact TAC (see Technical Support). Fluke Networks does not provide
utilities for ensuring data replication. You must use SQL Server tools to replicate the data.
When creating a new backup server, you must enter the backup license key into the new backup
server before loading the databases from the primary server to the backup server. If you have loaded
the primary servers data first, contact TAC for steps to set the backup license key separately.
Network configuration operations are supported on a backup server. You can add and remove ASEs
based on your available licenses. However, on backup servers, you cannot add or edit any form of
licenses.
157
Backup server ID
Get primary server ID
from the ser s
Licensing tab in Server
Administration
Enter backup license key
purchased from Visual
Network Systems
Contact Fluke Networks to obtain the backup license key. Do this while the primary server has its own
valid license and before loading the databases from the primary server to the backup server. You will
need to provide the server ID of the primary server. See Error! Reference source not found. for
more information.
At the backup server, open Server Administration and select a server from the tree. Select
Licenses.
Note
You cannot enter a backup server license key from Remote Server Administration. You must do this
on the backup server itself.
In Primary Server ID, enter the server ID for the primary server of which this server is a backup.
To edit an existing backup server license based on purchased updates, click Edit and make the
changes. Click OK.
158
Click Save. The Expiration Date area updates to indicate the new expiration date of the backup
server license.
To view a remote server ID, click Get Remote ID. In the Remote Server dialog, enter the name (or
IP address) of the remote server and click OK.
159
Web users access data over the Internet using HTTP or HTTPS connections to the web server. The web
server, which may be on the VPM server computer or installed on a separate server, sits behind a firewall
and supports concurrent access from multiple users (see Figure 48).
Figure 48 System Communication
As system administrator, your responsibilities for enabling the Visual UpTime Select web application
users capabilities are to:
Configure permissions to use the Troubleshooting toolset for the appropriate domains for all users.
Use the Server Administration application to configure user group permissions, as described in
Managing User Groups.
Configure options for the Service Summary application. You can control how often Service Summary
updates its performance information, and what priority thresholds it uses for determining performance
warnings and performance errors. See Error! Reference source not found. below.
Configure each web server to communicate with one or more VPM servers, and configure global
options on each web server. See Configuring a W
Provide users with the web servers host name or IP address to use as the URL in the form:
http://Web_Server/VisualUpTimeSelect/default.aspx
(where Web_server is the DNS hostname or IP address of a VPM web server).
In Server Administration, expand the server and log in. For more information, see Logging in to
Server Administration.
161
In Service Summary polling interval, enter the number of minutes that you want the server to wait
between status polls. To disable polling, enter 0 (zero).
In Performance time period, enter the number of hours to consider when identifying recent
performance warnings and performance errors.
In Performance warning priority threshold, enter the minimum priority level that indicates a
warning. To disable performance issue warning detection, enter 0 (zero).
In Performance error priority threshold, enter the minimum priority level that indicates an error. To
disable performance issue error detection, enter 0 (zero).
The web portal queries the web server based on a configurable refresh interval. Use the configuration tool
on the web server to set a minimum interval. For more information, see Configuring the Service Summary
Auto-Refresh Interval
.
162
Click OK.
163
The list of servers is sorted by name. To reverse the list, click the arrow in the Name column heading.
Each web server has one designated primary VPM server. The primary server stores user configurations
for the web server.
Adding a Server
Use the following procedure to add a server to the list. Because each web server maintains its own server
list, be sure to repeat this procedure on every web server that requires access to this server.
To add a server to the list:
1
At the bottom of the server list, in Name, enter a name for the new server.
Click Add.
In the server list, select the server that you want to designate as primary.
164
Click Edit. The servers properties appear below the server list.
Check Primary Server. Because the primary server must always be enabled, the Enabled checkbox
fills in automatically.
Click Update.
In the server list, select the server you want to disable or enable.
Click Edit. The servers properties appear below the server list.
To disable the server, clear Enabled. To enable the server, check Enabled.
Click Update.
Removing Servers
Use the following procedure to remove one or more servers from a web servers server list. (This action
does not affect the server itself, only the web servers communication with it.)
To remove one or more servers from the list:
1
Click OK.
Click the checkbox of the server you want to edit. You can edit only one server at a time.
Click Edit. The bottom of the page shows the properties of the server you selected.
Click Update.
166
Click Configure Global Options. The Configure Global Options page appears (see Figure 51).
In URL1, enter the URL that you want to be the destination of the link.
In URL1 Name, enter the link text as you want it to appear in the Visual UpTime Select user interface.
In URL1 Description, enter a brief description of the web resource that the link will load. This
description will appear when users move the mouse pointer over the link.
Click Apply.
Click Configure Global Options. The Configure Global Options page appears (see Figure 51).
In Minimum refresh interval for Service Summary Status, enter the minimum number of seconds
to wait before Service Summary attempts to refresh. The default setting is 300 seconds (5 minutes).
The minimum is 10 seconds.
Click Apply.
167
Click Configure Global Options. The Configure Global Options page appears (see Figure 51).
In Additional Licensing Information Text, enter the text that you want to include with licensing
messages.
Click Apply.
168
Parameter
Description
username
The login name of the VPM user account to use when logging in.
password
domainname
Parameter
Description
username
The login name of the VPM user account to use when logging in.
password
domainname
appid
networkname
sitename
The name of the site you want to select. You must also specify a
networkname.
portname
The name of the port you want to select. You must also specify a
networkname and sitename.
aseipaddress
ifindex
The interface index of the interface you want to select. The value
must be a positive integer. You must also specify an
aseipaddress.
eventindex
The event index of the event you want to display. The value must
be a positive integer.
pvcname
dlci
The DLCI number of the frame relay or HDLC circuit you want to
display. The value must be a positive integer. (This parameter
cannot be used with pvcname or vpi.)
169
The VPI number of the ATM circuit you want to display. The
value must be a positive integer. (This parameter cannot be used
with pvcname or dlci.)
vci
The VCI number of the ATM circuit you want to display. The
value must be a positive integer. You must also specify a vpi.
layer
For example, your web page might include HTML markup like this:
<form id="LaunchForm" method="post"
action="http://host/WebApplicationClient/URLLaunch/URLLaunch.aspx">
<input type="hidden" name="username" value="webuser">
<input type="hidden" name="password" value="p455w012d">
<input type="hidden" name="domainname" value="MyDomain">
</form>
And JavaScript to submit the form instantly:
<script language="JavaScript"><!-document.forms[0].submit();
// --></script>
170
This chapter covers Frequently Asked Questions (FAQs) that may come up when administering a Visual
Performance Manager server. Please consult this appendix before calling your Visual Performance
Manager vendors technical support.
172
173
Licensing FAQs
Q: How can I view licensing information for the Visual Performance Manager server?
A: The License Summary report shows license data for the server and all domains on the server. For
more information, see Licenses Report.
Q: How do I know what licensing mode is active?
A: In Server Administration, select a server. On the Server Status page, in Server Information, for
Domain Licensing, you will see the term: Flexible, Fixed, or None. Domain-fixed and domainflexible licensing modes are for service providers only. For more information on these licensing
modes, see Configuring Licenses.
Server ID
Q: Where does the server ID come from?
A: The server ID is the MAC address of the LAN adapter. The server picks the first one of the eligible
MAC addresses. If you re-configure the server so that one Ethernet adapter is disabled, the server
may begin using a new ID, which would invalidate its license keys.
Q: What happens with laptops and docking stations?
A: If a laptop uses one Ethernet adapter when operating as a disconnected laptop, and another adapter
when connected to a docking station, the server ID will be different depending on whether the laptop
is docked or not. Thus, licenses may be valid only in one mode or the other.
Q: How do I move my licenses to another server?
A: A backup license is available for temporary moves. For permanent moves to a new server, contact
Fluke Networks sales.
174
ASE Limits
Q: What is the ASE limit if I have a power-user license and a per-server license?
A: Whichever ASE limit is smaller. For example, if you have a per-server license for 1000 and a power
user license for 1500 ASEs, the servers limit is 1000, and that is shown in Server Administration.
Q: Can I enter a license key for fewer ASEs than I already have?
A: Only if features are disabled. To enable features you will need at least as many feature licenses as
ASEs.
Q: Do inactive ASEs count against the ASE limit?
A: No. If you make an inactive ASE active again, the server checks that the server has not reached its
ASE limit.
Q: How can I restrict the number of ASEs in a specific domain?
A: In domain-fixed or flexible licensing modes you can control the feature sets of individual domains. For
more information, see Managing Licenses for a Domain. In default licensing mode, all domains have
all features available on the server.
175
Power Users
Q: What defines a power user?
A: A power user is a user account that is associated with all domains on the server. Power users can
access all domains and, as a result, they do not need explicit associations as other users do. For
more information, see Designating Power Users.
Q: Must I have a power user license?
A: No. If all users should see the same features in whatever domains they can access, then you only
need a per-server license for the features. You only need a power user license if some users should
have access to additional features beyond what the standard user gets.
176
Sharing Licenses
Q: I want to manage an ASE from multiple servers. Do I need a license for each server?
A: Yes, you need a feature license for each server with capacity for an additional ASE. Visual ASEs do
not require an agent license. A partner device would require an agent license of the proper license
class on each server.
Restoring Databases
Q: Can I restore my databases to a server other than the original server?
178
A: For information about performing this operation, see TAC. Because license keys are issued for a
specific server, you will need to obtain a new set of license keys for the new server. If this restoration
is performed improperly, licenses will be invalid and features will not work.
VPM stores data about your network performance in short-term and long-term databases. (See Data
Storage for a description of both databases.) This chapter describes how to maintain these databases,
making the data available for reports and ensuring the smooth operation of the VPM system. Topics
include:
Scheduling data collections and database maintenanceCollect network performance data from
ASEs and set database maintenance times on the server.
Moving domains to a new serverDisable domains before migrating and reset destination addresses
and enable domains after migration.
Backing up and restoring databasesBack up the VPM databases to archive media such as a
backup tape drive and restore them from a backup using SQL Server utilities (outside of VPM).
Note
Make sure that your SQL Server license is accurate and valid. Each VPM user requires a user CAL
(Client Access License). Depending on your VPM usage, you may need to purchase additional user
CALs or a per-processor license. For more information about SQL Server licensing, see:
http://www.microsoft.com/sql/howtobuy/default.mspx
Domain administrators can perform database maintenance for a specific domain. If you are an
administrator for the entire server, you should also familiarize yourself with that information. See
Performing Database Maintenance for a Domain. See Chapter 2, Server Overview for a description of
the component databases in the network performance database.
Collect ASE dataDo this first to make sure the short-term database contains the most recent
network performance data available. (See Chapter 5, Domain Functions, in the PAC User Guide.)
180
Perform database maintenanceDo this second to make sure the long-term database contains the
most recent network performance data available and the short-term database is in the best possible
condition. (See Error! Reference source not found.)
Note
To make sure that scheduled database maintenance is properly coordinated with ASE data
collection, schedule database maintenance to occur at least one minute after data collection is
scheduled to start. Data collection will delay database maintenance until all scheduled collection for
the domain has completed.
Back up the databasesDo this last to make sure the backup contains the most recent data available
and that the databases are in good condition. (See Error! Reference source not found.)
Warning
If you initiate on-demand ASE data collection and then initiate on-demand database
maintenance, VPM will queue these actions properlyyou do not have to wait for data
collection to complete before initiating database maintenance. Do not initiate or schedule
database backup during ASE data collection or database maintenance. Do not initiate ASE
data collection or database maintenance during database backup. Otherwise, the backup
may contain inconsistent data.
Select Action > Collect Data. A message states: Data collection was requested. It will
proceed in the background now.
Click OK.
Select Action > DB Maintenance. A message states: Data collection was requested. It
will proceed in the background now.
Click OK.
182
In the left pane of Server Administration, expand the server and log in. For more information, see
Logging in to Server Administration.
183
184
Warning
Make sure that a scheduled backup does not begin until the server has completed scheduled
ASE data collection and database maintenance. (See Sche)
Warning
When backing up and restoring databases, notify all Web portal and PAC users that the
server will be shut down.
To back up SQL databases on the VPM server:
1
From the server, open SQL Server Management Studio and select a database to back up:
fnet_portal, master, msdb, ReportServer, ReportServerTempDB, VAdmin, VUpTime,
VUpTimeLT, VUpTimeNF, or VUpTimeDC. Right-click the database name and select Tasks >
Backup. Determine the name and location and perform the database backup.
In SQL Server Management Studio, select any database except the master database. Right-click and
select Tasks > Restore > Database.
To restore from backup select From Device and, under General, select the database file from
the backup location.
To overwrite the existing database file, under Options, select Overwrite.
Under Select the backup sets to restore, check the database.
Click OK to begin the restore. A message indicates that the restore has successfully completed.
Place SQL Server into single-user mode and restore the master database. For more information
about setting SQL Server into single-user mode, see the TAC Knowledge Base.
Warning
SQL Server must be placed in single-user mode when restoring the master database.
a
From the Services window, stop the SQL Server (MS SQL Server) service and close SQL
Server Management Studio.
From the Windows task bar, select Start > Run and type services.msc. Click OK.
Open a DOS window and go to the directory on the drive where SQL Server is installed:
C:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQLSERVER\MSSQL\Binn
Run the command sqlservr.exe -m to start a server instance in single-user mode that is
required. The following message is shown:
SQL Server started in single-user mode ...
Open a second DOS window and go to the directory on the drive where SQL Server is installed:
C:\Program Files\Microsoft SQL Server\MSSQL10_50.MSSQLSERVER\MSSQL\Binn
Type the command sqlcmd -S <server name> to start the sqlcmd utility.
For line 1>, type RESTORE DATABASE master FROM DISK = '<location of
master>\master.bak'
From the Services window, restart the SQL Server (MSSQL Server) service so that SQL Server
restarts in multi-user mode and uses the newly restored master database.
For detailed procedures on backing up and restoring SQL Server databases, see:
http://msdn.microsoft.com/en-us/library/ms177429.aspx
186
Click Start > Programs > Accessories > System Tools, and then click Backup.
Label the disks and store them in a safe location for emergency use.
187
When using VPM with firewalls in place between VPM components, you must configure the firewall
software to allow communication on the ports indicated in Firewall Port Settings.
Note:
All communication to ASEs goes through the server.
If Windows Firewall is enabled on server, make sure all ports listed in Firewall Port Settings are open. If
you cannot connect to the server, turn off the firewall and test the connectivity. Once connectivity is
established, reconfigure the firewall settings.
Open the secure and non-secure TCP and SSH ports between the VPM server and APAs. By default
these ports are 80, 443, and 22 but they can be reconfigured on the APA.
For communication between the server and the PAC and Web server, you can configure the port
range for proxied SNMP and TFTP communication and set the RPC port to static by modifying a
registry setting (the default is dynamic). See the TAC Knowledge Base for more information.
When using secured ASE communications, if a firewall is configured to block Transport Layer
Security (TLS) communications to an ASE, you may see response time issues when identifying ASEs
on the PAC. To resolve this, open port 2359 on the firewall.
Table 38 Firewall Port Settings
Settings Between...
Application
Layer 4
Port
Source
Destination
HTTP
TCP
80
Web
server
HTTP
TCP
80
Web
Web server
Portmapper
TCP
111
PAC
server
RPC
TCP
server
1024-65535
server
PAC
Settings Between...
Application
Layer 4
Port
Source
Destination
PAC Notifications2
UDP
1024-65535
server
PAC
SNMP
UDP
161
server
ASE
SNMP Traps
UDP
162
ASE
server
TFTP3
UDP
69
server
ASE
SSL
TCP
2359
server
ASE
Telnet4
TCP
23
client
ASE
SSH4
TCP
22
Web
ASE
Non-secure TCP
TCP
80
server
APA
Secure TCP
TCP
443
server
APA
SSH
TCP
22
client
APA
80
client
APA
TCP
NPA port
configured for
Web access
server
NPA
NTP Time
Synchronization
UDP
123
Internet time
server
server
SQL Server
TCP
1433
Microsoft RPC
endpoint mapper
TCP
135
Remote Server
Administration and Server
<selected
ports>
1024-65535
Microsoft RPC
endpoint mapper
135
TCP
Web server
server
189
Settings Between...
Application
Layer 4
Port
<selected
ports>
SQL Server
TCP
1433
.NET Remoting
TCP
8086
WCF Services
TCP
8005
Source
Destination
You can configure and limit the proxied SNMP and TFTP port range via registry settings. For more information, see the
TAC Knowledge Base.
2
The PAC still operates if these ports are blocked, but Collect Data Now, ASE Setup, and Identify ASEs take
longer.
3
ASE models 200-203 switch UDP ports after the initial request is received on port 69, so that subsequent traffic uses
UDP 1024 or above on the ASE side.
4
ASEs support SSH or Telnet connectivity, but not both at the same time.
To use HTTPS for all VPM server to NPA communication, use port 443 or 8443.
You can configure port numbers for RPC via registry settings. For more information, see the TAC Knowledge Base.
190
B. Reestablish Reporting on a
Renamed Server
Renaming a VPM server affects the communication between SQL Reporting Services and the server.
Therefore, before renaming a server, first verify that scheduled and unscheduled reports are successfully
running on the server. Once you have renamed a VPM server, take the following steps to make sure that
reports will run on the server.
Note:
You must know the sa user password for SQL Server (default is VPM@dmin1) and the password for
the Windows vuptime user (default is visual). If a user other than vuptime will be used for Reporting
Services configuration, you must know that user password.
Other computers that refer to this computer by name may need to be refreshed.
To re-establish reporting on a renamed server:
1
Stop the Visual Performance Manager Server and Visual UpTime Select Web Application services.
Open SQL Server Management Studio. Connect using the new server name and the sa account.
Use the master database.
Close SQL Server Management Studio and restart the SQL Server (MSSQLSERVER) service.
Open SQL Server Management Studio and execute the following query
Select @@servername
191
Start the Reporting Services Configuration tool and connect to the report server that uses the
ReportServer database on the renamed server.
In Server Name, type or select the new SQL Server name and click Connect. (Use SQL Server
Account credentials and enter the user name sa and its password in the SQL Server Connection
dialog.)
Click Apply. (Use SQL Server Account credentials and enter the user name sa and its password in
the dialog.) Exit the panel.
Run the VPM server prerequisite installation tool located on the VPM CD. From Windows Explorer,
navigate to the CD drive ServicePacks folder and open VisualPerformanceManagerPrerequisite.exe. This will reconfigure SQL Server Reporting Services for the server.
or
To manually reconfigure SQL Server Reporting Services for the VPM server, select Start > Run to
open a command prompt and execute the following two commands:
cmd> rsconfig -e -m localhost -s localhost -d ReportServer -a Windows u <NewMachineName>\vuptime -p <password>
cmd> rsconfig -e -m localhost -s localhost -d ReportServerTempDB -a
Windows -u <NewMachineName>\vuptime -p <password>
Substitute the proper login, if the default vuptime is not correct.
When the process is complete, reboot the server or restart the two services stopped earlier. Check
that reports, including scheduled reports, execute properly.
192
Supported Standards
C. Supported Standards
Visual Performance Manager complies with the following standard Simple Network Management Protocol
(SNMP) platforms or methods:
Standard MIB SupportVisual Performance Manager complies with RFCs 1213 (MIB II), 1406 (DS1),
1315 (frame relay DTE), and 1757 (RMON), which provide configuration and statistical information.
Data from these Management Information Bases (MIBs) can be gathered directly from Visual ASEs
through any SNMP management system.
SNMP Trap ExportAll events generated by Visual ASEs may be sent to other managers that add
details such as source network, access line, PVC name, and event descriptions. This export
capability avoids the need to compile the Fluke Networks MIB onto other systems and simplifies
integration with existing event and alarm management systems.
Table 39 shows supported RFCs and MIBs.
Table 39 Supported RFCs and MIBs (continued)
RFC or MIB
Supported Group
System group
Interfaces group
Transmission group
(see DS1 MIB support and Frame Relay DTE MIB support below)
TCP group
IP group
ICMP group
UDP group
SNMP group
DLCMI group
Circuit group
Error group
193
RFC or MIB
Supported Group
DS1 MIB
Configuration group
Fractional group for configuration
NearEnd Stat group
DDS MIB
MIB.
RMON (RFC 1757)
(RMON is a LAN
monitoring standard.
However, these groups,
which are relevant to
WAN monitoring, have
been implemented. The
remaining groups deal
specifically with LAN
statistics and are not
relevant to WAN
analysis.)
A Visual UpTime Select event has an enterprise address of visual (1.3.6.1.4.1.1246) and an event type of
7. The event will contain ten variables that hold the forwarded event information. Table 40 lists these
variables and their associated OIDs.
Table 40 Fluke Networks SNMP Event Variables and OIDs
OID
1.3.6.1.4.1.1246.4.6.1
vnForwardTrapEventIndex
1.3.6.1.4.1.1246.4.6.2
vnForwardTrapElementName
1.3.6.1.4.1.1246.4.6.3
vnForwardTrapEventDesc
1.3.6.1.4.1.1246.4.6.4
vnForwardTrapDataTime
1.3.6.1.4.1.1246.4.6.5
vnForwardTrapTime
1.3.6.1.4.1.1246.4.6.6
vnForwardTrapPriority
.1.3.6.1.4.1.1246.4.6.7
vnForwardOriginalEnterprise
194
Supported Standards
OID
.1.3.6.1.4.1.1246.4.6.8
vnForwardOriginatingAgent
.1.3.6.1.4.1.1246.4.6.9
vnForwardOriginalGenericTrap
.1.3.6.1.4.1.1246.4.6.10
vnForwardOriginalSpecificTrap
195
Glossary
Click the letter in the table of contents to find terms beginning with that letter.
A
APA (Application Performance Appliance)
Device installed at the data center or other hub sites in an enterprise network that monitors data passing
through core switches. APAs monitor application traffic and measure application performance and usage.
Application
A software program that receives and responds to requests. One application can have multiple
application servers (for example, an organization may deploy e-mail servers on multiple computers). Also,
a single computer can host multiple applications (for example, a Web server and database server can
both be installed on the same computer).
Application flow
A collection of traffic across a network that is exchanged between two hosts for a single application. By
monitoring application flows it is possible to measure application performance and to detect the
application hosts - including clients and servers.
The Visual UpTime AppFlows and AppSummary feature modules monitor IP application flows for
both client/server and peer-to-peer applications running over either TCP or UDP.
Application server
A software program that receives and responds to requests for a single client/server application. One
application can have multiple application servers (for example, an organization may deploy e-mail servers
on multiple computers). Also, a single computer can host multiple application servers (for example, a Web
server and database server can both be installed on the same computer).
196
The Visual UpTime AppFlows and AppSummary feature modules automatically discover the servers
for IP applications.
B
Burstiness
In the context of a packet network, data that uses bandwidth only sporadically. During pauses, channels
are idle, and no traffic flows across them in either direction. Visual UpTime Troubleshooting examines
burstiness in 1-second granularity.
C
CAR (committed access rate)
Indicates the amount of bandwidth allocated to IP traffic on a port from the customer edge router to the
provider edge router. If CAR is set to 0 in the Network Configuration toolset, then calculations will be
based on line speed.
CIFS
The Common Internet File System is a protocol that lets programs make requests for files and services on
remote computers on the internet.
Client
A host computer that sends out requests for an application.
Connections
The number of new socket connections established between the client and server.
197
D
Data Rate
Data Volume
Device
A network element of some kind.
DRE
Data Redundancy Elimination is an advanced form of network compression that allows Cisco WAAS to
maintain a database that has been seen previously traversing the network. This information is used to
remove redundant transmission patterns from having to utilize network bandwidth.
E
EPM
EndPoint Mapper is a Cisco WAAS accelerator that allows WAAS to classify MS-RPC traffic flows that
use dynamic ports assigned by a port mapper.
Event
A significant network occurrence that can be reported by the ASE to Visual UpTime or forwarded to
another event management system. You configure ASEs to monitor the network for statistical threshold
and state-change events in the Performance Monitoring toolset on the Visual UpTime PAC.
198
H
HTTP
HyperText Transfer Protocol is an application protocol used for transferring files on the World-Wide Web.
Hysteresis
In the Visual UpTime Performance Monitoring tool, indicates how far from a threshold a statistic must
move before the same event can be generated again.
I
IP Connection
The number of new socket connections established between the client and the server. See also Error!
Reference source not found.
IP Piggyback
A setting where an ASE has the same IP address as the router to which it is connected. (The ASE is said
to piggyback on the routers IP address.) The ASE must be assigned special port numbers so that it is
possible to distinguish between messages intended for the router as opposed to messages intended for
the ASE.
L
LinkSafe
Protective bypass relay that causes an inline ASE to maintain the flow of network traffic in the event of an
ASE operational or power failure. All inline probe ASEs feature the Linksafe relay and protective
bypass mechanisms.
199
LZ
Persistent Lempel-Ziv compression is a standards-based compression with a long-lived, connectionoriented compression history that can be used to further minimize the amount of bandwidth consumed by
a TCP flow.
M
MAPI
Messaging Application Program Interface is an email protocol used extensively by Microsoft Exchange
Server and Outlook clients.
N
N-tier application
Application program distributed among three or more separate computers in a distributed network. Visual
Performance Manager supports n-tier application monitoring using APAs.
NetFlow
A network protocol for collecting IP traffic information.
NetFlow Tracker
See Network Performance Appliance.
NFS
Network File System is a client/server application that allows a user to access a file on a remote
computer.
NPA
See Network Performance Appliance
200
NPM
See Network Performance Management
P
PAC (Platform Applicable Client)
Windows-based client software in the Visual Performance Manager client-server architecture. From the
PAC, users configure networks and perform ASE management tasks in a domain.
Panel
A panel is discrete component of a Web portal that has its own content source and behavior and operates
within the portal framework. Each portal view is a combination of one or more panels.
Portal
Also known as Web portal. A Web site or service that offers a broad array of resources and services. The
Visual Performance Manager Web portal allows the user to view data and use data and resources from a
variety of sources and applications.
Promiscuous mode
Refers to the circuit auto-discovery or circuit detection feature of an ASE. This setting is configured in the
Network Configuration toolset on the PAC.
Multi-Protocol frame relay ASEs in promiscuous mode will auto-discover circuits without employing the
LMI polling protocol.
201
R
RTD (round trip delay)
The SLA measurement that indicates how long (in milliseconds) it takes for a packet to travel from the
near-end ASE to the far-end ASE on a circuit and back. The measurement calculates only the time the
packet is on the circuit. The turnaround time at the far-end ASE is removed from the measurement.
S
Server
A host computer which receives requests for an application and sends back responses. See also Visual
Performance Manager
Site
A location on the network. A site can be characterized by one or more IP subnets.
SSL
Secure Sockets Layer is a protocol for establishing authenticated and encrypted sessions between web
servers and clients.
State-change event
Any of the following network events that ASEs can be configured to report back to the PAC:
202
Link Layer ChangePort (access channel) up or down; circuit endpoint active, inactive, or invalid.
Access Line Signal LossPhysical line up or down.
SNMP Authentication FailureIncorrect SNMP community name is used in attempts to contact the
ASE.
ASE Reboot and Data Collection Poll Failure events are always reported and are not configurable.
T
TCP Connection Reuse
A WAAS acceleration technique. Connection reuse decreases the load time for complex pages or pages
with numerous embedded objects.
TCP Resets
The Reset (RST) bit in the TCP header is designed to allow a device to abort the TCP connection.
TCP Retransmissions
The sending device transmits packets and waits for acknowledgement of receipt. It acknowledgement is
not received in a certain timeframe, the sender resends that packets.
TFO
Transport Flow Optimization. Cisco Wide Area Application Services (WAAS) uses a variety of TFO
features to optimize TCP traffic intercepted by WAAS devices. TFO protects communicating clients and
servers from negative WAN conditions, such as bandwidth constraints, packet loss, congestion, and
retransmission.
Total Bytes
Number of bytes sent by the client and server (includes packet header and payload).
203
Transaction
An individual request and response exchange for a single application between a specific client and a
specific server. A single application flow can contain multiple transactions.
Transaction type
A classification used to differentiate different transactions. Transaction types include values such as
SELECT, UPDATE, INSERT and DELETE for relational databases and GET and POST for Web
applications.
U
URI
Uniform Resource Identifier is a string of characters used to identify a resource on the internet.
V
Visual Performance Manager
A comprehensive system for enabling and monitoring enterprise applications deployed over a network.
Visual Performance Manager (Visual Performance Manager) is comprised of a server that stores and
processes data, Web and Windows-based clients that display data, and ASEshardware devices
deployed on a wide area network to gather application and network performance data.
W
WAE
Cisco Wide Area Application Engine (WAE) platforms are a portfolio of powerful, scalable network
appliances that host Cisco WAN optimization and application acceleration solutions that enable branchoffice server consolidation and performance improvements for centralized applications and provide
remote users with LAN-like access to applications, storage, and content across the WAN.
Web portal
Browser-based, single access point through which users interact with data in Visual Performance
Manager. From the Web portal, users can create and organize personalized views of data based on their
workflow, interact with data from a range of perspectives, and access data from multiple sources.
204
Index
A
access
controlling 32
database 37
group permissions 123
reporting capabilities 105
storage of settings 34
user accounts required for server 40
Web server 175
access lines 11, 69, 73
configuring 35
report permissions 105
adding
agent licenses 165
ASE evaluation licenses 163
domains 116
feature licenses
for all domains 160
for single domain 111
LAN Visibility licenses 166
users 133
administrative tasks 35, 86
for web access 171
scheduling data collection 196
Administrators group 122
Adobe Acrobat Reader, Web access to xi
Advanced Users group 122
agent licenses 165
classes 166
Alarm Notifications report 68
alarms
permission to notify 127
206
B
backing up databases 36, 86, 117, 200
scheduling 201
tapes and tape drive 203
timing of 196
Back-in-Time Troubleshooting
group permission 127
backup
licenses 167
server, converting to primary 168
Basic Users group 122
BGP Exclusion list 94
Burst, group permission 127
C
capabilities, user 124, 126, 127
Capacity Planning reports
domain and network 107
port 108
circuits 22
service level metrics for 29
Cisco
NetFlow data 1
router polling 10
class of service
ATM 151
IP 98
collecting ASE data 28, 31, 34
colors
applications shown in report 68
server status 54
community string, SNMP 90, 98
user access to modify 127
complexity rules, password 143
components, Visual UpTime Select 11
Configuration Changes report 72
Configure Services Exclusion List group permission 127
configuring
authentication for ASE communication 90
BGP Exclusion list 94
class of service
208
ATM 151
IP 98
event priorities 89
events 32
firewalls 50
networks 35
report permissions 105
server ports 51
Service Summary settings 172
user and group associations 104
Web Server 174
Connex Configuration Data group permission 124
Connex Performance Data group permission 124
consistency checks, database 201
contacting Fluke Networks xiii
copying
domains 116
users 134
creating
domains 81, 93
user groups 129
users 133
customizing
logo for reports 98
module support 97
Web navigation link 179
D
data
analysis 19
application performance 24, 26
collection 31, 34, 36, 84
and storage 19, 25, 26, 28, 31
by ASEs 28
on-demand 85
permissions 127
scheduled 84
scheduling 196
long-term 32
management in Visual UpTime Select 11
network performance 28
storage 26, 31, 34
database 28, 34
access to 37
209
210
E
editing
domain properties 83
server properties on Web server 178
user account passwords 134
user groups 129
emergency repair disk, creating 203
Ethernet ix
LAN Visibility 10
211
F
FAQs 36
feature evaluation licenses 162
adding to domain 111, 113
managing on domain 111
feature licenses 159
adding 160
managing on domain 111
firewall
configuring 50
configuring for Web server 176
port settings 52
fnet_portal 201
G
GetServerID.exe 170
H
hardware
APAs 12
NPAs 13
server 19
help xii
HP OpenView 103
HTTP 174
POST parameters for launching Web applications 182
HTTPS
restricting Web server communication to 174
Web server type 19, 171
212
I
IdentifyASE.exe 118
installing
upgrade system 156
Visual UpTime Select 35
IP class of service 98, 99
configuring 98
delete 102
group permission 126, 128
policing threshold 101
setting jitter 100
IP connectivity, server-to-server 56, 58
IP SLA Router Polling 10
polling interval 92
IPFIX 7
IUSR_Name, finding 41
J
jitter
setting for class of service 100
L
LAN Visibility 10, 166
ASEs 10
launching
Remote Server Administration 57
Web applications remotely 181
LDAP authentication
enabling 152
specifying for user account 138
License Administration group permission 126
License Summary report 73
licenses 155, 155170
adding text to Web interface 180
agent 165
ASE evaluation 163
backup 167
deactivating feature expiration warning 148
default mode 158
domain licensing 158
feature 159, 160
feature evaluation 162
key storage 191
LAN Visibility 166
213
M
master database 201
maximum
password ages and lengths 44
MIBs 211
Microsoft
IIS documentation 174
Product Security Notification Service 33
Windows versions supported xiii
minimum password length, setting 143
monitoring
APA data flow 77
servers 53
msdb database 201
N
names
domain 82
SNMP community 90
NetFlow 7
NetFlow data 1, 13
Network Configuration group permission 126
Network Configuration toolset 20, 36
network performance database. See database.
Network Performance Manager
214
P
PAC 19
administrative tasks on 35
communication with server 51
configuring
ATM class of service 151
IP class of service 99
data collection from 34
IP address login restrictions 133
restricting user access by IP address 137
Panel Page Management group permission 124
partner devices
and interface differences 32
definition of 32
licenses 165
TFTP authentication 91, 92
passwords 40
assigning 42
configuring
expiration 142
settings 141
text restrictions 143
editing users 134
expiration 142
215
216
R
RADIUS authentication, enabling 152
recycled passwords 143
registry 49
specifying port numbers 51
remote management software 33
Remote Server Administration 34, 35, 57, 155
and backup server 169
starting 57
repair disk, creating 203
Report Scheduling group permission 124
reporting
and long-term database 85
APM reports 110
domain and network reports 106
NPM reports 110
permissions 105
port reports 108
site reports 109
reports 10
administrative 6776
deleting 67
scheduling 65
Alarm Notifications 68
APM server summary 75
Applications 68
ASE image updates 69
ASE models 70
ASE summary 71
changing delivery settings 150
changing logo for
domain 98
server 150
configuration changes 72
configuring access to 35, 105
domain and network report categories 106
license summary 73
permissions 105
publishing options 147
server summary 74
users and groups 65, 76
VoIP 9
ReportServer database 201
ReportServerTempDB database 201
217
S
security
ASE communications 95
audit policy 45
log 45
default settings 46
passwords
expiration 142
text restrictions 143
provided by Visual Performance Manager services 32
server 40
software updates on server 33
verifying effective password enforcement 44
server ix, 32
adding 58
adding to Web server list 176
administrative tasks 35
applications 34
backup license for 167
changing logo on reports for 150
communicating with
PAC 51
Web server 174
communication with NPAs 27
configuring
ATM class of service 151
ports 51
data collection and storage 19, 28, 31, 34
defined 19
disabling on Web server list 177
downloading documentation from xii
editing properties for Web server 178
firewall 50
ID 170
identifying active users 64
license expiration 60
licensing 155
list of (on Web Server), sorting 176
logging in 63
218
managing
domains 79
feature licenses 160
monitoring APA data flow to 77
monitoring status 54, 55, 58
details 59
polling status 62, 63
removing 59
removing from Web server list 178
restricting access to 49
security 39
server settings permission 126
setting primary for Web server 177
setting up ASE communication 90
software 17
status color 54
Unreachable message 56
uses of 32
verifying IP connectivity 56
Visual Performance Manager services 31
launching at startup 37
restarting 38
stopped on domain deletion 117
stopping 201
Web server access to 175
Server Administration 34, 35, 36
adding server 58
closing 58
configuring
ATM class of service 151
IP class of service 98
domains
adding feature evaluations 113
assigning event priorities 89
configuring IP class of service 98
copying 116
creating 81
data collection 84
database maintenance 85
deleting 117
forwarding events 103
managing licensing 111
Service Summary 93
user and group associations 104
viewing 80
219
220
T
TCP 51
technical support xiv
third party software 32
templates
ASE configuration 35, 36
for ASEs 32
TFTP 17
authentication 91
timing, administrative events 86
TOS bitmask and data, IP class of service 101
Trace File group permission 127
Traffic Capture 10
group permission 124
training xiv
221
U
unreachable server 56
updating ASE software 35, 56
upgrading
managing licenses 156
server 35
user groups created 123
URL for server 172
user groups 121, 122
creating 129
deleting 130
editing 129
generating report 65
permission to create 126, 129
setting capabilities 123
viewing members 128
users 21, 121, 130
assigning to domains 135
capabilities for 124, 126, 127
configuring
associations for domain 104
lockout settings 144
passwords 142, 143
copying 134
creating 133
groups 129
default 40, 41
deleting 139
groups 130
editing groups 129
editing passwords 134
generating report 65
groups 122
identifying active 64
locking accounts 137
PAC login restrictions 133
passwords 142, 143
permissions 123
power users 138
restricting access to PAC by IP address 137
viewing in group 128
viewing properties of 131
Users and Groups report 76
222
V
VAdmin 201
Fluke Networks, contacting xiii
Visual Performance Manager 1, 2
access control 121
administrative tasks 35
architecture 11, 19
databases 200
default users 40
documentation ix
features 3
help xii
licenses 155
agent 165
ASE evaluation 163
backup server 167
feature 159, 160
feature evaluation 162
LAN Visibility 166
licensing options 10
passwords 40
server applications 34
services 31, 37, 57
software supported xiii
system communication 171
upgrading 156
Visual UpTime Select 8
Application Flows 10
Application Summary 9
feature modules 810
reports 105
Service Summary 3
events 89
Traffic Capture 10
Troubleshooting 9
turning off feature 97
VoIP 9
VoIP 9
changing call quality metric 149
report publishing options 147
reports
domain and network 107
port 109
site 110
223
W
Web access
administrative tasks related to 171
to Adobe Acrobat Reader xi
to documentation xii
Web browsers xiii
Web portal 2, 19
custom navigation link, configuring 179
global settings for 178
launching from URL 181
password change permission 124
Web server 19
adding server to list 176
configuring 174
controlling access to server 175
disabling server on list 177
editing server properties 178
global settings for Web users 178
logging in 174
managing system from 19
removing server from list 178
setting primary server 177
Windows
auditing 45, 46
firewall 205
passwords
assigning 42
lockout policy 44
registry 49, 51
repair disk, creating 203
securing login 42
security options 39
Server 2003, default users 41
services 31, 57
username and password 40
versions supported xiii
224
WWW service 43
225