Sunteți pe pagina 1din 79

InfiMONITOR

Technical User Manual

Table of Contents
1 Important Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1

Legal Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1.2

Statement of Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1.3

Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.4

Indication of the countries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.5

Limitation of Liability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

1.6

International Regulatory Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2 About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7


3 Getting started with InfiMONITOR User Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1

Document structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

3.2

Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

3.3

Document marks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

4 Description and working principles of InfiMONITOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11


4.1

InfiMONITOR Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.1.1

The polling subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

4.1.2

The " SNMP Trap" processing subsystem . . . . . . . . . . . . . . . . . . . . . . . . 12

4.1.3

The events generation subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

4.1.4

The detection subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

4.1.5

The web interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

4.1.6

The storage subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

5 Installation of InfiMONITOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.1

System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

5.2

Installation preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

5.3

Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.3.1

Step 1 - Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

5.3.2

Step 2 - The installation program launch . . . . . . . . . . . . . . . . . . . . . . . . . 17

5.3.3

Step 3 - The installation program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

5.3.4

Step 4 - The InfiMONITOR first start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

6 InfiMONITOR upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7 Configuration and management of InfiMONITOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
7.1

SNMP configuration on wireless devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26


7.1.1

7.2

7.3

How to add new device to monitoring network . . . . . . . . . . . . . . . . . . . . . 26

User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.2.1

Administrator account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

7.2.2

User adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

7.2.3

Group adding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

7.2.4

The users and groups accounts deletion and editing . . . . . . . . . . . . . . . . 35

Adding devices and links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

7.4

7.3.1

Automatic devices search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

7.3.2

Adding devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

7.3.3

Adding links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Events generation rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40


7.4.1

Group of rules creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

7.4.2

Rules creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

7.5

Notifications configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

7.6

License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7.6.1

HOW to obtain license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

7.6.2

License assign and revoke . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

8 Network Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
8.1

8.2

8.3

Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
8.1.1

Events review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

8.1.2

Event status change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
8.2.1

Links information review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

8.2.2

Transition to the events list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

8.2.3

Link tags management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
8.3.1

The device information review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

8.3.2

Transition to the events list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

8.3.3

Host tags management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

9 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
9.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

9.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

9.3

Time range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

9.4

CPU Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

9.5

9.6

9.7

9.8

9.4.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

9.4.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Memory usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
9.5.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

9.5.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Board temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
9.6.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

9.6.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
9.7.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

9.7.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Device status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
9.8.1

Linear graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

9.8.2

Data table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

10 Service mode of InfiMONITOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76


10.1

Network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

InfiMONITOR

InfiMONITOR is the wireless network monitoring system for the InfiNet Wireless equipment.
InfiMONITOR allows network Administrators to receive actual information about the network
conditon and certain devices operation, and of course to respond on emerging incidents.

1 Important Notice
1.1 Legal Rights
Copyright 2016 InfiNet Wireless. All rights reserved.
The information contained in this document is originated by, proprietary, confidential and owned
by InfiNet Wireless. No part of this document should be disclosed, reproduced or distributed
without the express written permission of InfiNet Wireless Ltd.
InfiNet Wireless Ltd. reserves the right to change the information contained in this document
without prior notice. No part of this document may be considered as a part of any contract or
warranty.

1.2 Statement of Conditions


InfiNet Wireless Ltd. shall not be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing, performance or use of this manual or
equipment supplied with it.

InfiMONITOR Technical User Manual

InfiMONITOR

1.3 Disclaimer
The software is sold on an "AS IS" basis. InfiNet Wireless, its affiliates or its licensors make no
warranties, whatsoever, whether express or implied, with respect to the software and the
accompanying documentation. InfiNet Wireless specifically disclaims all implied warranties of
merchantability and fitness for a particular purpose and non-infringement with respect to the
software. Units of product (including all the software) delivered to purchaser hereunder are not
fault_ tolerant and are not designed, manufactured or intended for use or resale in applications
where the failure, malfunction or inaccuracy of products carries a risk of death or bodily injury or
severe physical or environmental damage (high risk activities). High risk activities may
include, but are not limited to, use as part of on-line control systems in hazardous environments
requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation
or communication systems, air traffic control, life support machines, weapons systems or other
applications representing a similar degree of potential hazard. InfiNet Wireless specifically
disclaims any express or implied warranty of fitness for high risk activities.

InfiNet Wireless hereby declares that R5000-Omx(b), R5000-Mmx(b), R5000-Smn(c) and


R5000-Lmn are in compliance with the essential requirements and other relevant provisions of
Directive 1995/5/EC. The declaration of conformity may be consulted at http://infinetwireless.
com/products/materials#certifications

1.4 Indication of the countries


InfiNet Wireless equipment has no geographical limitations for selling and can be supplied to
any country of the world.

1.5 Limitation of Liability


InfiNet Wireless shall not be liable to the purchaser or to any third party, for any loss of profits,
loss of use, interruption of business or for any indirect, special, incidental, punitive or
consequential damages of any kind, whether arising under breach of contract, tort (including
negligence), strict liability or otherwise and whether based on this agreement or otherwise,
even if advised of the possibility of such damages.
To the extent permitted by applicable law, in no event shall the liability for damages hereunder
of InfiNet Wireless or its employees or agents exceed the purchase price paid for the product
by purchaser, nor shall the aggregate liability for damages to all parties regarding any product
exceed the purchase price paid for that product by that party (except in the case of a breach of
a partys confidentiality obligations).

InfiMONITOR Technical User Manual

InfiMONITOR

1.6 International Regulatory Information


This equipment has been tested and found to comply with the limits for a Class B digital device.
Hereby, InfiNet Wireless declares that this equipment is in compliance with the essential
requirements and other relevant provisions of Directive 1999/5/EC.

2 About This Manual


This manual provides detailed technical information about the capabilities, commissioning,
installation, configuration, management and monitoring of the InfiMONITOR system.
This manual is intended for the network and system administrators responsible for ensuring the
wireless network continuous operation. They must posses experience and knowledge of the
network technologies and wireless data transmission.

InfiMONITOR Technical User Manual

InfiMONITOR

3 Getting started with InfiMONITOR User Manual


3.1 Document structure
This document consists of the following chapters:
Getting started - Information about the documents purpose and structure
Description and working principles - Description of the key product elements, roles and
working principles
Installation - Description of the prerequisites and the installation process of the
InfiMONITOR system
Upgrade - Description of the InfiMONITOR upgrade
Configuration and management - InfiMONITOR management elements description
Network Monitoring - Description of the InfiMONITOR monitoring functions, elements
and their roles and capabilities
Reports - Description of the InfiMONITOR reports subsystem
Service mode - Description of the InfiMONITOR service mode and actions for the
network settings.

InfiMONITOR Technical User Manual

InfiMONITOR

3.2 Abbreviations
The following abbreviations are used in this document:
BIOS - Basic Input/Output System
BS - Base Station
CLI - Command Line Interface
CPE - Customer Premises Equipment
DNS - Domain Name System
HDD - hard disk drive
IP - Internet Protocol
MINT - Mesh Interconnection Networking Technology
RAID - redundant array of independent disks
RAM - Random Access Memory
SMTP - Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
SSH - Secure Shell
SSL - Secure Sockets Layer
Telnet - TrminaL Network
TLS - Transport Layer Security
UDP - User Datagram Protocol
VM - Virtual Machine

InfiMONITOR Technical User Manual

InfiMONITOR

3.3 Document marks


CAUTION
All caution warnings are marked with a special warning sign. One should pay a
great deal of attention to what is written in the Caution section.

NOTE
All notes are marked with a special note sign. Notes usually contain useful
comments or hints to the described section of the document.

InfiMONITOR Technical User Manual

10

InfiMONITOR

4 Description and working principles of InfiMONITOR


InfiMONITOR consists of the folllowing features:
Real-time monitoring of the InfiNet Wireless equipment
Real-time monitoring of the wireless links
Automatic device detection within the unified MINT network
Incidents tracking and notification sending about their occurence to the responsible
persons
Wireless network status reports.

NOTE
InfiMONITOR is intended only for the wireless devices by the InfiNet Wireless. Other
vendor units are not supported.

4.1 InfiMONITOR Architecture


The InfiMONITOR monitoring system consists of several subsystems:
The polling subsystem - is responsible for periodic polling of devices and reception of
their parameters values
The "SNMP Trap" processing subsystem- provides "SNMP Trap" reception, preliminary
processing and the subsequent transfer to the polling subsystem
The events generation subsystem- controls parameter's value change obtained by the
polling subsystem and subsequently generates events according to predefined rules set
The detection subsystem - automatically search and subsequently adds devices using
MINT protocol
The web interface - the graphical interface used for management by InfiMONITOR
operator
The storage subsystem - the database.

InfiMONITOR Technical User Manual

11

InfiMONITOR

4.1.1 The polling subsystem


Primary subsystem of InfiMONITOR - polling is responsible for sending requests to the devices
and receiving replies with their parameters values.
The subsystem is always-on. All polling requests to all devices are distributed in time within 5
minutes in order to prevent peak traffic load to the wireless network:
1. Estimates the time period required for the sequential polling of each device, depending

on devices quantity. In case of significant device count, the resulted time period for one
device polling could be less than minimal polling period. To overcome such issue, the
devices would be grouped, and the polling requests would be performed in parallel to all
devices of each group
2. The devices readiness for the polling is checked. The devices which have been polled

during previous cycle, would be polled foremost. The devices which has not been polled
during the previous cycle, would be scheduled to polling after all the others
3. In case the devices did not reply to polling requests during previous polling cycle, these

devices would be put into the pending list for the next polling cycle
4. All data received from the devices during polling goes into the storage subsystem.

4.1.2 The " SNMP Trap" processing subsystem


The device parameters values can also be received via "SNMP Trap" notification mechanism.
As a rule, with this tool InfiMONITOR get notified by the unit about the change of the
parameters, important for device and/or for wireless communication channel performance, for
example, data transmission rate change, unit's reboot, connection loss between the devices,
etc.
While the polling subsystem takes an active role, performing requests to the devices, the "
SNMP Trap" processing subsystem acts passively. It constantly waits to receive traps from the
wireless devices. Upon the reception of the trap, the subsystem immediately starts trap
message processing thus allows to timely react to changes, without waiting of the polling cycle
completion.

InfiMONITOR Technical User Manual

12

InfiMONITOR

4.1.3 The events generation subsystem


The subsystem task - to generate event in accordance with the rules created by the
InfiMONITOR administrator.
The events generation subsystem starts after device parameters data pushed into the storage
subsystem received via polling or "SNMP Trap" processing subsystem into the storage
subsystem. This subsystem applies events generation rules to the corresponding parameters.
In case of matched condition specified in any rule, the event is generated, which can then be
viewed by InfiMONITOR operators in the web interface.

4.1.4 The detection subsystem


The subsystem implements automatic search and devices addition. After the manual addition of
a device the detection subsystem performs the following functions:
Detect the neigbor device or devices in the same MINT segment as the added device.
The neighboring device should have established link to added device and this link is still
unknown and has not been added to InfiMONITOR
Creates a request for the polling subsystem to poll the neigbor device via the SNMP
protocol and use same SNMP authentication data specified by the InfiMONITOR
operator for the added device
The polling subsystem starts unscheduled poll request for neigbor device via "SNMP
Proxy" function. In case the specified authentication credentials do match the device
authentication, the neigbor device will be added automatically. In either case, the new
poll request would try other authentication credentials specified for the previously added
to the InfiMONITOR devices. Requests will be performed until any authentication
credentials would match the device authentication or until depletion of authentication
credentials variants.
When detected device has been added to the InfiMONITOR, it's the neigbor devices
search will be performed too. This process comes to the end when neigbor devices of all
added to InfiMONITOR devices have been found and polled. The devices with no correct
authentication credentials, wound not be added, however attempts to their addition
would be continued further.
Important feature of the detection subsystem is to search only within one MINT segment. In
case, there are multiple MINT segments in a wireless network, it is necessary to add at least
one device from each segment in order to enable automatic detection.

InfiMONITOR Technical User Manual

13

InfiMONITOR

4.1.5 The web interface


The graphical web interface used for management of the InfiMONITOR. The web interface
interacts with all subsystems.

4.1.6 The storage subsystem


The subsystem provides storage and data preparation to ensure fast access to all inforamtion
for the InfiMONITOR operators via web interface.

InfiMONITOR Technical User Manual

14

InfiMONITOR

5 Installation of InfiMONITOR
5.1 System requirements
InfiMONITOR can be installed both on the hardware and virtual platform (Oracle VM VirtualBox,
VMware ESXi, Microsoft Hyper-V, Citrix XenServer are supported).

NOTE

"PCnet-FAST III (Am79C970)", "PCNet PCI II (Am79C970A)" cards are not


supported in VirtualBox and VMware.

Below are the recommended system requirements for the platform depending on the devices
number to monitor by the InfiMONITOR:
Devices

Up to 50

Up to 2 000

Up to 10 000

CPU

Intel Core i3 3 GHz


level

Intel Core i7 3 GHz


level

Intel Xeon 3.6 GHz Quad Core


level

RAM

from 4 Gb

from 16 Gb

from 32 Gb

HDD

from 200 Gb

from 1 TB

from 50 TB

Additional

Hardware controller in RAID 10


level
Table - The platform system requirements

CAUTION
Mandatory requirement to CPU it must be x64 architecture.

InfiMONITOR Technical User Manual

15

InfiMONITOR

5.2 Installation preparation


The following will be required for InfiMONITOR deployment:
Platform for the deployment: the dedicated server or virtual machine conforming to the
system requirements
The ISO image with the latest InfiMONITOR software version from the official InfiNet
Wireless FTP server - ftp://ftp.infinet.ru/pub/INMS/. For the installation to the dedicated
server it is required to record the image to a CD or USB flash-drive.

5.3 Installation
5.3.1 Step 1 - Download
In case the InfiMONITOR installs to the virtual machine: connect the ISO image with the
installation program to it, in the virtual machine BIOS specify to boot from CD-ROM
In case the InfiMONITOR installs to the dedicated server: insert the compact disk or
USB flash-drive with the previously recorded installation program. In the BIOS specify to
boot from install device.

InfiMONITOR Technical User Manual

16

InfiMONITOR

5.3.2 Step 2 - The installation program launch


Start the server or virtual machine. In BIOS specify to boot from: CD-ROM or USB flash-drive.
After bootloader start the following menu will appear on the screen, select "Install
InfiMONITOR"

Figure - Step 2: Installation program launch

5.3.3 Step 3 - The installation program


After several seconds the InfiMONITOR installation starts, thus the corresponding prompt
message will appear.
Click the "Ok" button.

InfiMONITOR Technical User Manual

17

InfiMONITOR

Figure - Step 3: Installation program

Select timezone from the available list and click "Ok"

Figure - Step 3: timezone selection

Specify a NTP server and click "Ok".

InfiMONITOR Technical User Manual

18

InfiMONITOR

Figure - Step 3: NTP server selection

Select hard disk and click "Ok".

Figure - Step 3: hard disk selection

At this stage the installation program will find out all supported network adapters and prompts
to select the one to use for InfiMONITOR.
Select the desired adapter and click the "Enter" button.

Figure - Step 3: The network adapter selection

After the network adapter selection the network IP address for InfiMONITOR should be set.
Specify the IP-address selected for the the monitoring system and click the "Enter" button.

InfiMONITOR Technical User Manual

19

InfiMONITOR

Figure - Step 3: The network credentials: IP-address

Set the network mask, click the "Enter" button

Figure - Step 3: The network credentials: Netmask

Set default gateway IP-address, click the "Enter" button

Figure - Step 3: The network credentials: Default gateway

Set the DNS server IP-address, click the "Enter" button

InfiMONITOR Technical User Manual

20

InfiMONITOR

Figure - Step 3: The network credentials: DNS server address

Now, after finish with the network configuration, the installation program will notify about the
installation readinesss of InfiMONITOR.

CAUTION
The installation program will delete all the data on server or virtual machine hard
disk. Please, make sure that the disk has no useful information, after the installation
start, its recovery wil be impossible.

Figure - Step 3: Installation startup

If you want to proceed with InfiMONITOR installation, click the "Continue" button.
The installation procedure can take several minutes. After succeful install the installation
program will notify that InfiMONITOR has been installed and ready to start. Click the "Reboot"
button.

InfiMONITOR Technical User Manual

21

InfiMONITOR

Figure - Step 3: Installation completion

5.3.4 Step 4 - The InfiMONITOR first start


After installation has been finished, the system will reboot. Make sure the server or the virtual
machine has BIOS boot settings set to hard disk now.
The startup may take about 1-2 minutes, after which you will be prompted to enter the service
mode.

Figure - Step 4: Initial startup

NOTE
The InfiMONITOR first start - is an important stage for various procedures which
could not be performed at the installation stage. Therefore, right after the prompt
appearance access to the monitoring system can be impeded for about 1-2 minutes.

InfiMONITOR Technical User Manual

22

InfiMONITOR

6 InfiMONITOR upgrade
InfiMONITOR upgrade is performed automatically. It is mandatory to have access to the
Internet for this.

InfiMONITOR Technical User Manual

23

InfiMONITOR

7 Configuration and management of InfiMONITOR


InfiMONITOR could be configured and managed via the special web-interface.
Enter monitoring system web-interface IP-address : http://XXX.XXX.XXX.XXX,
where XXX.XXX.XXX.XXX - IP-address assigned at InfiMONITOR installation stage. In order to
change the IP-address, use the service mode .
System may announce you about unsecured connection while entering to the InfiMONITOR
web-interface. This is due to the fact that the required protection certificate is not assigned by
the certification authorities center. This error does not affect the InfiMONITOR security.

Figure - Certificate trust request

To prove the certificate trust expand the "ADVANCED" tab and click on "Proceed to XXX.XXX.
XXX.XX (unsafe)".

NOTE
This step may vary in different browsers.

InfiMONITOR Technical User Manual

24

InfiMONITOR

Figure - Trust proving

Afterwards y ou will be prompted to enter authorization data.

Figure - Authorisation window

InfiMONITOR Technical User Manual

25

InfiMONITOR

NOTE
By default, use the following web-interface authorization data:
Login - "admin"
Password - "admin"
It is mandatory to change "admin" password, before initial configuration of the
InfiMONITOR.

After the successful login, you will enter InfiMONITOR management interface. InfiMONITOR
management interface has the following sections:
SNMP configuration on wireless devices
User accounts
Adding devices and links
Events generation rules
Notifications configuration
License

7.1 SNMP configuration on wireless devices


InfiMONITOR polles devices via the SNMP protocol. Therefore each device in the network
should have SNMP agent running and configured to perform the devices management and
monitoring.

7.1.1 How to add new device to monitoring network


By default, "SNMP Agent" and "SNMP Trap" are disabled.
Make necessary changes to the device configuration to perform monitoring with InfiMONITOR:
enable "SNMP Agent" and configure the "SNMP Trap" parameters.
There are two ways:
1. Via the CLI command line interface (this option is faster)
2. Via the WANFleX web-interface.

InfiMONITOR Technical User Manual

26

InfiMONITOR

Via the CLI


Access the device via the Telnet or SSH protocols and execute the following commands
(replace USERNAME and PASSWORD with the desired values):

snmpd user USERNAME add pass PASSWORD security authNoPriv


accessRights
readWrite class admin

NOTE
Only protected mode "authNoPriv" is supported by InfiMONITOR

Start "SNMP Agent" and save the configuration

snmpd start
config save
In order to start and configure "SNMP Agent" simultaneously for all CPEs connected to the BS
(including BS too), on the BS execute the following commands

mint rf5.0 rcmd -node all -self -cmd "snmpd user USERNAME add
pass PASSWORD
security authNoPriv accessRights readWrite class admin"
mint rf5.0 rcmd -node all -self -cmd "snmpd start"
mint rf5.0 rcmd -node all -self -cmd "config save"
In order to enable "SNMP Trap" simultaneously for all CPE s connected to the BS (including BS
too), on the BS execute the following commands (replace "IP ADDRESS" with the InfiMONITOR
IP-address)

InfiMONITOR Technical User Manual

27

InfiMONITOR

mint rf5.0 rcmd -node all -self


mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self
enable"
mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self
typetrapdColdStartEvent enable"
mint rf5.0 rcmd -node all -self
snmpdAuthenticationFailureEvent
mint rf5.0 rcmd -node all -self
mint rf5.0 rcmd -node all -self

-cmd
-cmd
-cmd
-cmd

"trapd
"trapd
"trapd
"trapd

start"
dst IP ADDRESS:162/v2"
type topoGroup enable"
type radioGroup

-cmd
-cmd
-cmd
-cmd

"trapd type mintGroup enable"


"trapd type ospfGroup enable"
"trapd type linkEvent enable"
"trapd

-cmd "trapd type


enable"
-cmd "trapd type syslog enable"
-cmd "config save"

Configure the agent IP-address separately, for each device (replace"IP ADDRESS" with the
device IP-address value)

trapd agent IP ADDRESS


config save

Via the web-interface


NOTE
You can use the Web-interface "Command Line" section for running the commands
mentioned above.

Login to the device via Web-interface. Go to the "Basic Setting" page and then to the "SNMP"
menu. Click the "Access" option

InfiMONITOR Technical User Manual

28

InfiMONITOR

Figure - SNMP menu

Select the Start SNMP checkbox (in order to enable "SNMP Agent") and unselect the Version
1 enable checkbox (in order to disable the SNMPv1 version, which is enabled in the default
configuration). Click the Add SNMPv3 User button and insert the authentication data to
access the device via the SNMP protocol into the User Name and Password fields. Leave
the rest of the parameters intact:

InfiMONITOR Technical User Manual

29

InfiMONITOR

Figure - SNMP Access setting

Click the Traps option in the "SNMP" menu, where are following fields:
"Enable SNMP traps" - traps enable/disable, select the checkbox
"Agent IP" - set the device IP-address
"Destination" - the InfiMONITOR IP-address and UDP-port, which the "SNMP Trap"
processing subsystem use for reception by default 162:
"V2" - SNMP v2 enable/disable, select the checkbox
"Traps groups" - select the checkboxes for all traps groups, to be transmitted by
the device into the "SNMP Trap" processing subsystem.

InfiMONITOR Technical User Manual

30

InfiMONITOR

Figure - SNMP Traps configuration

Finalize the configuration, click the "Apply" button.

InfiMONITOR Technical User Manual

31

InfiMONITOR

7.2 User accounts


InfiMONITOR - the multiuser system with the access privileges assignment. For each operator
of the monitoring system separate authorization account for the web-interface can be created.
The access privileges can be assigned to a single account or to the group of accounts.
Account list of the users and groups is available in the section "Settings" -> "Users and groups".
For each account the following parameters values are set:
"Name" - account name most fully describing the user
"Email" - the user's email address
"Login" - the user's login
"Permissions" - access rights for the web-interface sections.

Figure - The users and group account list

7.2.1 Administrator account


By default, InfiMONITOR has an administrator account with the name "admin" and with the
following features:
The administrator account login can't be changed
The administrator account can't be removed.

7.2.2 User adding


In order to add a new user click the "Add user" button. The window with the following fields will
appear on display:

InfiMONITOR Technical User Manual

32

InfiMONITOR

"Full Name" - account name


"Login" - the user's login for authentication in the web-interface
"Email" - email address for automatic incidents notification
"Password" - authentication password
"Activated" - the account state: enable/disable. The disabled account doesn't allow to
pass authorization for the web-interface
"Permissions" - the access privileges to the InfiMONITOR sections, which are provided
individually or inherited from group including the account.

Figure - The user account addition

InfiMONITOR Technical User Manual

33

InfiMONITOR

7.2.3 Group adding


In order to add a new group click the "Add group" button. The window with the following fields
will appear:
"Group name" - the group name, for example, the department name
"Permissions" - the access privileges to the InfiMONITOR sections to be used within the
group

"Accounts in group" - the users accounts in group. In order to add a new account, find it
in the list and click the "Add Account" button.

Figure - The group addition

InfiMONITOR Technical User Manual

34

InfiMONITOR

7.2.4 The users and groups accounts deletion and editing


It is possible to delete a one account or several users and groups accounts simultaneously:
One account deletion - in the list mouse over the user or group account you want to
delete. The account will be highlighted and the "Edit" for editing and the "Delete" for
deletion buttons will appear in the line
Several accounts deletion - with a special checkbox in the list select those users or
groups accounts you want to delete. After that the following buttons will appear at the
bottom of the page:
"Delete" - to delete the selected users and groups accounts
"Move" - to move the selected users accounts to other group
"Exclude" - to exclude the users from the selected group.

7.3 Adding devices and links


In order start monitoring of wireless devices by InfiMONITOR it is necessary to add them to the
system, first. There are two methods:
The manual - each wireless device should be added to the monitoring system manually
The automatic - it is sufficient to add at least one or several devices, depending on a
network structure afterwards InfiMONITOR will automatically add all the rest connected
devices.

7.3.1 Automatic devices search


InfiMONITOR performs automatic search via the MINT technology (see Description and
working principles of InfiMONITOR). By default, the automatic search function is enabled, to
check it, proceed to the section "Settings" -> "Discovering".

Figure - Authorization in InfiMONITOR web-interface

In order to disable the automatic devices search and addition function, click the "Disable AutoDiscovering" button. It possible to re-enable at any time.

InfiMONITOR Technical User Manual

35

InfiMONITOR

7.3.2 Adding devices


In order to add the devices go to the section "Settings" -> "Devices". Here is the list of all
devices added earlier with the following parameters:

Host name
IP address
Device serial number
"Status" - the current device status. There are three possible options:
Up - the monitoring system has access to the device via the SNMP protocol
Unknown - the monitoring system has no access to the device via the SNMP
protocol at the moment, however the access has been recently lost
Unreachable - the monitoring system has no access to the device for
considerably long time period via the SNMP protocol
Deactivated - deactivated device, which is put out of action
Resticted - device without license.

Figure - The hosts added list

In order to add devices click the "Add host" button, the window with the following fields will
appear:

InfiMONITOR Technical User Manual

36

InfiMONITOR

"IP Address" - the added device IP-address which InfiMONITOR will use to poll the
device
"SNMP Port" - the network port for the SNMP service to be is available on the device. By
default, 161
"SNMP Version" - the SNMP protocol version, which has to be used by the monitoring
system for data receiving from the device. By default, v3
SNMP protocol authentication data:
"SNMP Community" - the group name for versions authentication. It is applicable
for the following SNMP Versions: v1, v2c
"SNMP Login" - the SNMP protocol user's account name. It is applicable for the
following SNMP Version: v3
"SNMP Password" - the SNMP protocol user's account password. It is applicable
for the following SNMP Version: v3.

InfiMONITOR Technical User Manual

37

InfiMONITOR

Figure - Adding the device

lick the "Create" button fter filling all the fields.

InfiMONITOR Technical User Manual

38

InfiMONITOR

Adding device procedure


The device would not be added instantly, only after its polling. The procedure to add the device
consist from the following steps:
1. The device is put into the polling pending queue after being added by the user. At this

stage it has not yet been added to the monitoring system and will not be displayed in the
common list
2. After a short period of time InfiMONITOR will start the device polling
3. If access to the device via the SNMP protocol has been received, the monitoring system

will receive all the necessary information and then perform its addition
4. If InfiMONITOR could not get access to the device via the SNMP protocol, the polling will

be postponed until the next polling cycle. This process will continue until gaining access
to the device.
To see the pending devices click the "Pending hosts" button

Figure - Pending devices

NOTE
If the device is pending for a long time, it can indicate the authentication credentials
are incorrectl and/or the SNMP server has not been started on the device. Check
the settings and correct them if necessary.

7.3.3 Adding links


InfiMONITOR automatically defines wireless links between the devices therefore there is no
need for their manual addition.
InfiMONITOR Technical User Manual

39

InfiMONITOR

7.4 Events generation rules


All events could be created only by specified rules. Rules in InfiMONITOR contains matching
conditions.
The events generation subsystem chart is shown below

Figure - The events generation subsystem organisation

Each rules group includes:


Devices - the devices list to be used for events generation
Rules - events would be generated according to rules conditions list
Notifications - notifications would be created to send notifications for the InfiMONITOR
operators about the events which has been generated for the selected devices
according to the devices rules conditions.

7.4.1 Group of rules creation


Rules management for the events accessible in the section "Settings" -> "Event rules" ->
"Groups of rules". In order to create a new group click the "Create Group" button, the form with
three sections will appear. By default, the section "Devices" is opened.

InfiMONITOR Technical User Manual

40

InfiMONITOR

Devices
The section "Devices" is used to select devices for the events generation. This section includes
the following parameters:
"Group name" - rules group name
"Assigned hosts" - devices list within the rules group. In order to exclude the device from
the group select it and click the "Remove selected" button or drag it with the mouse from
the "Assigned hosts" list into the "Available hosts" list
"Available hosts" - all available in InfiMONITOR devices. In order to add the device into
the rules group select it and click the "Assign selected" button or drag it with the mouse
from the "Available hosts" list into the "Assigned hosts" list.

NOTE
The devices can be added one by one and a group with a tag. If at least one device
in the section "Network Monitoring"-> "Hosts" has been assigned to at least one tag,
it will be available in the "Available hosts" list. If you want to add the device group
with the exception of some of them, such devices can be placed in the exclusion list.
To do this, find the corresponding devices and select in the " Available hosts" list,
and then click the "Exclude selected" button. Thus, the events will be generated for
all devices with the selected tag, but not for added to the exclusion.

InfiMONITOR Technical User Manual

41

InfiMONITOR

Figure - Adding devices into the rules group

Rules
After the devices selection it is necessary to assign the rules with the conditions to generate
events. The rules would be applied only to devices added to the rules group. Proceed to the
section "Rules", which list the following parameters:

InfiMONITOR Technical User Manual

42

InfiMONITOR

"Assigned rules" - selected rules list which added to the created rules group. In order to
exclude the rule from the group select it and click the "Remove selected" button or drag
it with the mouse from the "Assigned rules" list into the "Available rules" list
"Available rules" - available rules for InfiMONITOR. In order to add the rule into the
group rules select it and click the "Assign selected" button or drag it with the mouse from
the "Available rules" list into the "Assigned rules" list.

Figure - Adding rules into the rules group

InfiMONITOR Technical User Manual

43

InfiMONITOR

Notifications
After the selection of the devices and rules, it is required to choose InfiMONITOR operators to
receive events notification by email. Proceed to the section "Notifications", which has the the
following parameters:
"Assigned users" - list of the users and groups which require notifications. In order to
exclude the user from the group select it and click the "Remove selected" button or drag
it with the mouse from the "Assigned users" list into the "Available users" list
"Available users" - list of all users and groups available in InfiMONITOR. In order to add
the user into the group of rules select it and click the "Assign selected" button or drag it
with the mouse from the "Available users" list into the "Assigned users" list
"Send notifications" - enable/disable notifications for the selected users
"Severity" - the lowest priority for the event to send the notification. Thus, if the severity
is set to "Warning" the users would be notified with the "Warning" and "Critical" priorities.
If the event has the "Info" priority, the notification will not be sent
"Subject" - notification message subject. The text could include variables values with the
event parameters. To get the complete list of all variables click the "?" icon next to the
field
"Body" - the notification text. The text could include variables values with the event
parameters. To get the complete list of all variables click the "?" icon next to the field.

InfiMONITOR Technical User Manual

44

InfiMONITOR

Figure - Notification management in the rules group

Click "Create" button to finish creation of rules group.

7.4.2 Rules creation


The rule - is the key component of the events generation subsystem. Rule specifies the
condition whether to create the event or not. Rules can be managemed via in the section
"Settings"-> "Event rules"-> "Rules".

InfiMONITOR Technical User Manual

45

InfiMONITOR

Figure - The events generation rules list

Click the "Create rule" button to create new rule, the window form with two sections will appear:
"Settings" - common rules parameters
"Condition" - conditions to create event.
The "Settings" section is opened by default, it includes the following fields:
"Rule name" - rule name
"Severity" - priority assigned to the event, created by the rule
"Message" - message created by the event, formed by the rule. The variables replaced
with the real values of the corresponding event parameters can be used in the text. To
get the complete list of possible variables click the "?" icon next to the field
"Description" - rule description
"May be resolved automatically" - the checkbox indicating whether the status of the
event can be automatically changed into "Resolved" in a case of overcoming the
condition which have triggered the event. Such checkbox applicable for reversible
events, for example, communication loss/restore events. When the communication will
restore, and the checkbox is set, then the "Resolved" status would be automatically
assigned. However in a case of irreversible events this checkbox doesn't make any
sense. For example, in case of firmware version upgrade - the event only generate
single notification.

InfiMONITOR Technical User Manual

46

InfiMONITOR

Figure - The events generation rule main parameters

The "Condition" section list conditions, which execution will generate event. The "Condition"
section has three components:

InfiMONITOR Technical User Manual

47

InfiMONITOR

"The logical operator" - the operators "and", "or" and "not" indicate the parameters
comparison options specified in the condition. Logical operators can be nested into each
other
"And" - the condition will be executed in case the comparison results of all
parameters is true
"Or" - the condition will be executed in case the comparison result of at least one
parameter is true
"Not" - the condition will be executed in case the comparison results of all
parameters is false
"Parameter" - values of the various parameters belonging to device or wireless link,
which can be compared
"The comparison operator" - the operators "empty", "not empty", "equals", "not equal", "
changed", "not changed", "greater than", "greater than or equal to", "less than", "less
than or equal to" indicate comparison option:
"empty" - result of the operator execution will be true if the parameter value is
empty, otherwise - false
"not empty" - result of the operator execution will be true if the parameter value is
not empty, otherwise - false
"equals" - result of the operator execution will be true if the parameter value is
equal to the specified value, otherwise - false
"not equal" - result of the operator execution will be true if the parameter value
isn't equal to the specified value, otherwise - false
"changed" - result of the operator execution will be true if the parameter value
changed in relation to previous, otherwise - false
"not changed" - result of the operator execution will be true if the parameter value
didn't change in relation to previous, otherwise - false
"greater than" - result of the operator execution will be true if the parameter value
is greater than the specified value, otherwise - false
"greater than or equal to" - result of the operator execution will be true if the
parameter value is greater than or equal to specified value, otherwise - false
"less than" - result of the operator execution will be true if the parameter value is
less than the specified value, otherwise - false
"less than or equal to" - result of the operator execution will be true if the
parameter value is less than or equal to specified value, otherwise - false.

InfiMONITOR Technical User Manual

48

InfiMONITOR

Figure - The events generation rule conditions

To finalize the rule creation click the "Apply" button. Now it can be added to the rules group.

7.5 Notifications configuration


Notification mechanism is necessary to specify how InfiMONITOR tells users about events, like
communication loss between devices. In order to send notification e-mail, the monitoring
system should connect to a SMTP-server and provide the task to send. The credentials for
connection to this server should be specified in the settings, for this, go to the section "Settings"> "System", find the section "E-mail notification" with the following fields:

InfiMONITOR Technical User Manual

49

InfiMONITOR

"E-mail from" - an email address notifications will be sent from


"SMTP server" - the IP-address or domain name from which the SMTP-server is
available
"SMTP port" - SMTP - server network port, by default 25
"Secure connection SSL/TLS" - the checkbox indicating the necessity of a protected
connection to the SMTP-server using the SSL/TLS protocols
"Authorization type" - authorisation parameters:
"No password" - select in case SMTP-server allows InfiMONITOR to send an
email without preliminary authentication
"Simple password" - select in case SMTP-server requires additional authorization,
where the login and password are sent in clear text
"Encrypted password" - select in case SMTP-server requires additional
authorization, where the login and password are sent in ciphered text
"Login" - authentication login for the SMTP-server is mandatory, in case the SMTPserver requires authentication
"Password" - the authentication password for the SMTP-server.

Figure - E-mail notification setting

After the configuration have been completed, click the "Apply" button.

InfiMONITOR Technical User Manual

50

InfiMONITOR
It is recommend strongly to check configuration by sending test letter. For this click the "Send
test email" button, it will offer to specify the address to send the letter. If the email would be
received by the specified email, then the configuration is correct. Otherwise, If the letter has not
been received, check the configuration. Please don't hesitate to contact InfiNet Wireless
technical support service, in case you will experience difficulties with configuration.

7.6 License
License is a legal instrument governing the use of software. Type of license determines
software conditions usage.
Web interface section of InfiMONITOR "Setting" -> "License" could be used to upgrade license,
to check information about license type, to see license limitations and expiration and find
information about the current software version.

Figure - License

This section displays the following information:

InfiMONITOR Technical User Manual

51

InfiMONITOR

InfiMONITOR version
Expiration date
License type:
"Free" - free perpetual license for 20 hosts
"Trial" - time limited (for one month) license with unlimited number of hosts. A
license can be obtained for free via request to the Sales Department. After trial
license expiration, "Free" license takes effect
"Enterprise" - paid perpetual license with the specified hosts number
"The product is licensed to" - the company name

E-mail
Total hosts
Number of hosts limit
Licenses occupied
Licenses available.

7.6.1 HOW to obtain license


1. Contact the Sales Department for the cost and license distribution -

sales@infinetwireless.com
2. Click the "download the activation key" link to download file and send it to the Sales

Department - sales@infinetwireless.com
3. Get activation key
4. Click the "Extend license" link and upload activation key afterwards.

NOTE
The process above is the same for the license upgade.

7.6.2 License assign and revoke


InfiMONITOR operator can assign and revoke licenses from the hosts in case of "Enterprise"
and "Free" licenses.
To assign a license to the host, go to the "Settings" -> "Host management" section, select
desired host, right click on it.

InfiMONITOR Technical User Manual

52

InfiMONITOR
In the context menu choose "Assign license".

Figure - License assign

If there are no available licenses, an error message pops up. In this case it is necessary to
revoke the license from the host for which monitoring can be turned off, and assign it to the
desired host.

Figure - Error message

To revoke a license from the host, go to the "Settings" -> "Host management" section, select
desired host with other than "Restricted" status, right click on it.
In the appeared context menu choose "Revoke license".

Figure - License revoke

Select desired host, right click on it. In the context menu choose "Assign license".

InfiMONITOR Technical User Manual

53

InfiMONITOR

8 Network Monitoring
Monitoring - the main InfiMONITOR function, provides data for network administrators to
monitor the wireless networks status. The "Network Monitoring" section has the following
sections:
Events
Links
Hosts

8.1 Events
The "Events" subsection allows InfiMONITOR operator to receive information from all the
events generated according to events generation rules.
It is divided into several sections:
List - main section, which shows all links added to InfiMONITOR, including their main
parameters values
Accumulated events - the full list of all accumulated identical events, merged into one list
Events details - detailed information about the event
Affected rule - information about the rule, which have been used to generate event.

8.1.1 Events review


All events are displayed in two modes which could be switching by two buttons:
"Live" - a list of events in real time shown in strictly chronological order. By default, only
last 50 events are shown, but this view could be expanded up to 200 via "Max. show
count" switch
"History" - history track of all generated events shown in sequence specified by the
operator of InfiMONITOR.
For each event the following options are shown:

InfiMONITOR Technical User Manual

54

InfiMONITOR

"Status" - an event status. Each event receive certain status to help operator of
InfiMONITOR to resolve the issues:
"New" - is set automatically for all newly emerging events. It indicates that the
event has not been acknowledged or resolved
"Acknowledged" - is set manually by operator of InfiMONITOR. It indicates the
event has been acknowledged, also work on this event is in progress or the event
does not require any response
"Aged" - is set automatically for events that have not been acknowledged and
resolved within 24 hours. The "Aged" status also could be set manually. In case
the event has occured again before assignment of "Aged" status, then the
countdown for "Aged" status starts again
"Resolved" - is set automatically for the resolved events, because the occurrance
reason has been recovered. It also can be set manually
"Severity" - priority is set from the events generation rules which have been used to
generate the event
"Name" - object where the event has occurred. Only device or wireless link could be
used as object
"Rule" - rule which has been used to generate event
"Description" - event message, is set according to events generation rules
"First seen" - date and time when the event has occured for the first time
"Last seen" - date and time when the event has occured for the last time
"Count" - number of the event occurrences

Figure - Events list

InfiMONITOR Technical User Manual

55

InfiMONITOR

8.1.2 Event status change


To change the event status, right-click on it and select the "Set status" link, to set the desired
status.

Figure - Status change

8.2 Links
The "Links" subsection allows operator of InfiMONITOR to obtain status information of the
wireless links.
It is divided into several areas:
List - main area, which shows the list of all links added to InfiMONITOR, including their
main parameters values
Link properties - complete list of the selected links parameters
Host 1 properties - first device key parameters
Host 2 properties - second device key parameters.

InfiMONITOR Technical User Manual

56

InfiMONITOR

8.2.1 Links information review


For each link in the list the following parameters are shown:

"Link name" - link name, consisting from the devices names communicating via the
same link
"Type" - link type
"Status" - link status
"Bitrate, Mbps" - data rate, shows two values: first one - from the first to the second
device and second one - vice versa
"Current level, dB" - the device signal-to-noise value for the current value of "Bitrate"
"Retries, %" - percentage of retransmitted data, two values: first one - from the first to the
second device and second one - vice versa
"Errors, %" - percentage of lost data, two values: first one - from the first to the second
device and second one - vice versa
"RX Load, kbps" - number of kbits/sec received by the device radio interface, two values:
first one - from the first to the second device and second one - vice versa
"RX Load, pps" - number of packets per second transmited by the device radio interface,
two values: first one - from the first to the second device and second one - vice versa
"Tags" - tags, assigned to a link.

Figure - The wireless links list

InfiMONITOR Technical User Manual

57

InfiMONITOR

8.2.2 Transition to the events list


The system provides the ability to go to the events list from the selected link.
To do this, select the desired link, right-click on it.
In the context menu, choose "Go to <Link Name> events".

Figure - Go to the events list from the link

The events list for this link will appear

Figure - Events list for the selected link

InfiMONITOR Technical User Manual

58

InfiMONITOR

8.2.3 Link tags management


The tags allow to mark the links in order to speed up search and identification in future. To mark with the tag, select desired link,
right-click on it.
In the context menu, choose "Tags" -> "New Tag" for the first tag assignment or "Tags" -> "Existing Tag", in case the tag has
already been assigned to other links.

Figure - The tag set

To unset the tag select "Tags" -> "Existing Tag", select the tag you want to unset and click on it.
To delete the tag select "Tags" -> "Existing Tag", select the tag you want to delete and click on
the "X" icon on the right.

Figure - Delete and unset the tag

8.3 Hosts
The "Hosts" subsection allows operator of InfiMONITOR to obtain information about the hosts
status.
It has several sections:

InfiMONITOR Technical User Manual

59

InfiMONITOR

List - main section, which shows list of all hosts added to InfiMONITOR, including their
main parameters values
Host properties - general host parameters
Network properties - detailed information about the host network parameters.

8.3.1 The device information review


Each device has the following options:

Host name
Status
Reboot reason
Device model
Device serial number
Software version
Tags

Figure - The wireless devices list

InfiMONITOR Technical User Manual

60

InfiMONITOR

8.3.2 Transition to the events list


The system provides the ability to go to the events list from the selected host.
To do this, select the desired host, right-click on it.
In the context menu, choose "Go to <Link Name> events".

Figure - Go to the events list from the host

The events list for this host will appear

Figure - Events list for the selected host

InfiMONITOR Technical User Manual

61

InfiMONITOR

8.3.3 Host tags management


The tags allow to mark the hosts in order to speed up search and identification in future. To mark with the tag, select desired host,
right-click on it.
In the context menu, choose "Tags" -> "New Tag" for the first tag assignment or "Tags" -> "Existing Tag", in case the tag has
already been assigned to other hosts.

Figure - The tag set

To unset the tag select "Tags" -> "Existing Tag", select the tag you want to unset and click on it.
To delete the tag select "Tags" -> "Existing Tag", select the tag you want to delete and click on
the "X" icon on the right.

Figure - Delete and unset the tag

InfiMONITOR Technical User Manual

62

InfiMONITOR

9 Reports
Reports subsystem - provides InfiMONITOR users the possibility to analyze the wireless
devices conditions and status. Reports, presented in graphs and data tables, helps wireless
network operators to forecast changes and demands to scale the network.
"Reports" menu has the following sections:

Figure - "Reports" control panel

1) Parameter
"Parameter" section shows the following graphs:
2) View
Each graph can include several views:
Linear graph
Data table
3) Time range

9.1 Linear graph


"Linear graph" graphs shown only for the selected devices.
In order to select the devices do the following:
Click the "Select hosts to display" button
In the newly opened window select the device in the "Available hosts" column and click
the "Add selected" button or drag it with the mouse from the "Available hosts" to the "
Selected hosts" list
Click the "Save" button.
To exclude the device from the selected list, select the device and click the "Remove selected"
button or drag it with the mouse from the "Selected hosts" to the "Available hosts" list.

InfiMONITOR Technical User Manual

63

InfiMONITOR

Figure - Host selection

NOTE
The maximum number of the displayed in the graph devices - 20.

NOTE
Selected devices are saved when switching from one graph to another.

9.2 Data table


"Data table" graph generates for all available devices.

InfiMONITOR Technical User Manual

64

InfiMONITOR

9.3 Time range


The subsystem allows users to select the time range for the graphs generation. The arbitrary or
predefined date and time can be selected.

Figure - Arbitrary date and time

Figure - Predefined date and time

9.4 CPU Load


9.4.1 Linear graph
The graph generates using the following values:
X-direction - time range
Y-direction - CPU load value
Color line indication for each device provides better visualisation of the linear graphs.
The timestamp is fixed, thus when you select a point on the graph (vertical line), the parameter
values for all devices are displayed in new table:
top table row - selected time
first column - device name
second column - CPU load value.

InfiMONITOR Technical User Manual

65

InfiMONITOR

Figure - CPU Load linear graph

InfiMONITOR Technical User Manual

66

InfiMONITOR

9.4.2 Data table


The table generates from the following data:
first column - available devices list
next columns - CPU load values:

0%-20%
20%-40%
40%-60%
60%-80%
80%-100%.
The table cell indicates the time when the device "CPU Load" parameter had indicated value.

Figure - CPU Load data table

InfiMONITOR Technical User Manual

67

InfiMONITOR

9.5 Memory usage


9.5.1 Linear graph
The graph is generated using the following values:
X-direction - time range
Y-direction - memory usage value
Color line indication for each device provides better visualisation of the linear graphs.
The timestamp is fixed, thus when you select a point on the graph (vertical line), the parameter
values for all devices are displayed in the appearing table:
top table row - selected time
first column - device name
second column - memory usage value.

Figure - Memory usage linear graph

InfiMONITOR Technical User Manual

68

InfiMONITOR

9.5.2 Data table


The table is generated using the following data:
first column - available devices list
next columns - memory usage ranges:

0%-20%
20%-40%
40%-60%
60%-80%
80%-100%.
The table cell indicates the time when the device "Memory usage" parameter had indicated
value.

Figure - Memory uasge data table

InfiMONITOR Technical User Manual

69

InfiMONITOR

9.6 Board temperature


9.6.1 Linear graph
The graph is generated using the following values:
X-direction - time range
Y-direction - board temperature value
Color line indication for each device provides better visualisation of the linear graphs.
The timestamp is fixed, thus when you select a point on the graph (vertical line), the parameter
values for all devices are displayed in the appearing table:
top table row - selected time
first column - device name
second column - board temperature value.

Figure - Board temperature linear graph

InfiMONITOR Technical User Manual

70

InfiMONITOR

9.6.2 Data table


The table is generated using the following data:
first column - available devices list
next columns - board temperature values:

<-60
-60 -40
-20 0
0 +20
+20 +40
+40 +60
+60 +80
+80 +100
+100 +120
>+120
The table cell indicates the time when the device "Board temperature" parameter had indicated
value.

Figure - Board temperature data table

InfiMONITOR Technical User Manual

71

InfiMONITOR

9.7 Firmware
9.7.1 Linear graph
The graph is generated using the following values:
X-direction - time range
Y-direction - firmware version
Color line indication for each device provides better visualisation of the linear graphs.
The timestamp is fixed, thus when you select a point on the graph (vertical line), the parameter
values for all devices are displayed in the appearing table:
top table row - selected time
first column - device name
second column - firmware version.

Figure - Firmware linear graph

InfiMONITOR Technical User Manual

72

InfiMONITOR

9.7.2 Data table


The table is generated using the following data:
first column - available devices list
next columns - firmware versions.
The table cell indicates the time when the device had specific firmware version.

Figure - Firmware data table

9.8 Device status


9.8.1 Linear graph
The graph is generated using the following values:
X-direction - time range
Y-direction - device status:
"Up" - the system has an access to the device
"Unknown" - the system has no access to the device, however it was lost recently
"Unreachable" - the system has no access to the device for long time period.
Color line indication for each device provides better visualisation of the linear graphs.
The timestamp is fixed, thus when you select a point on the graph (vertical line), the parameter
values for all devices are displayed in the appearing table:

InfiMONITOR Technical User Manual

73

InfiMONITOR

top table row - selected time


first column - device name
second column - device status.

Figure - Device status linear graph

InfiMONITOR Technical User Manual

74

InfiMONITOR

9.8.2 Data table


The table is generated using the following data:
first column - available devices list
next columns - devise status:

Up
Unknown
Unreachable
The table cell indicates the time during which the device had a certain status.

Figure - Devise status data table

InfiMONITOR Technical User Manual

75

InfiMONITOR

10 Service mode of InfiMONITOR


The service mode is intended to restore the access to InfiMONITOR in case the network
access to the monitoring management system has been lost, for example, when replacing the
adapter or system migration to another network. The service mode distinction feature - it is
available directly from the server or virtual machine.
Connect a keyboard and monitor to the server or open the virtual machine. You will be
prompted to enter into the service mode click the "Service mode" button and then enter the
password for the "admin" account. Click the "Ok" button.

Figure - Login into the service mode

The access to the following sections is available i n the service mode :


"Network settings"
"Reboot InfiMONITOR".

10.1 Network settings


Select the section "Network settings" and click the "Enter" button. The current network settings
summary information will appear:

InfiMONITOR Technical User Manual

76

InfiMONITOR

Figure - The network settings summary information

Click the "Edit" button, if you want to change the settings for the network adapter .
Please, select the desired network adapter to provide the access for InfiMONITOR to your
network , click the "Enter" button.

Figure - The network settings: Network adapter selection

Enter a new IP-address, for the monitoring system , click the "Enter" button.

Figure - The network settings: IP-address

Enter the network mask, click the "Enter" button

InfiMONITOR Technical User Manual

77

InfiMONITOR

Figure - The network settings: Netmask

Enter the default gateway IP-address , click the "Enter" button.

Figure - The network settings: Default gateway

Enter the DNS server IP-address, click the "Enter" button.

Figure - The network settings: DNS-server

All specified parameters would be displayed for the final stage. Carefully check them and if they
are correct, click the "Confirm" button.

InfiMONITOR Technical User Manual

78

InfiMONITOR

Figure - Changes confirmation

InfiMONITOR Technical User Manual

79

S-ar putea să vă placă și