Sign In
Upload
Manuals
Brands
Raritan Manuals
Modem
CommandCenter NOC 2500N
Raritan CommandCenter NOC 2500N Manuals
Manuals and User Guides for Raritan CommandCenter NOC 2500N. We have
2
Raritan CommandCenter NOC 2500N manuals available for free PDF download: Administrator's Manual, Quick Start Manual
Raritan CommandCenter NOC 2500N Administrator's Manual (156 pages)
Raritan Computer Modem User Manual
Brand:
Raritan
| Category:
Modem
| Size: 2.1 MB
Table of Contents
Fcc Information
3
Safety Guidelines
4
Table of Contents
5
Chapter 1: Introduction
13
Stand-Alone Appliances
13
Distributed 2500 Series Appliances
13
Commandcenter Secure Gateway (CC-SG)
13
User PC Preparation
14
Remote Authentication
14
Local Authentication
14
Intended Audience
14
Features Described in this Document
14
Terminology/Acronyms
15
Licensing Explained
18
Infrastructure
18
Server
18
Workstation
19
Promoted Workstation
19
Chapter 2: General and Advanced Administration
21
Power down CC-NOC
21
Appliance Shutdown/Restart
21
Appliance Network Settings
21
Figure 1 Appliance Shutdown/Restart
21
Configure Date and Time
22
Figure 2 Configure Date and Time
22
Change the ISP Gateway Address
23
Configure Network Connection
23
Figure 3 Configure Network Connection
23
Figure 4 Configure Network Connection
24
Figure 5 Configure Outgoing Email Communication
24
Outgoing Email Communication
24
Change Nameserver Addresses
25
Network Management Configuration
25
Edit Discovery Ranges
25
Figure 6 Configure Nameserver Addresses
25
Figure 7 Edit Discovery Ranges
26
Edit SNMP Ranges
27
Configure Scheduled Outages
28
Figure 8 Edit SNMP Ranges
28
Figure 9 Defining SNMP Ranges
28
Figure 10 Configuring Scheduled Outages
29
Figure 11 Edit Scheduled Outages
29
Configure Pollers
30
Figure 12 Configure Pollers
30
Manage, Unmanage, Rescan, or Delete Devices
31
Figure 13 Manage, Unmanage, Rescan, or Delete Devices
32
Figure 14 Device Totals
32
Configure Performance Thresholds
33
Figure 15 Configure Performance Thresholds
33
Configure Outage Report
34
Figure 16 Configure Outage Report
34
Figure 17 Navigating to Outage Report
34
SNMP Reparenting Exclusion List
35
Associate Commandcenter Secure Gateway (CC-SG)
35
Configure a CC-SG
35
Figure 18 SNMP Reparenting Exclusion List
35
Figure 19 Associate a Commandcenter Secure Gateway
35
Figure 20 Configure a Commandcenter Secure Gateway
36
Figure 21 Commandcenter Secure Gateway in Sidebar
36
Figure 22 Commandcenter Secure Gateway in Notification Browser
36
Create a CC-SG Peer Via a Secure Channel
37
Figure 23 Associate a Commandcenter Secure Gateway
37
Figure 24 Create a CC-SG Peer
37
Disconnect a CC-SG
38
Delete a CC-SG
38
Map CC-SG User Groups to Local User Roles
38
Figure 25 Disconnect a Commandcenter Secure Gateway
38
Figure 26 Delete a Commandcenter Secure Gateway
38
Multi-Site Management
39
Figure 27 Map CC-SG User Groups to Local User Roles
39
Configure Event Forwarding
40
Figure 28 Configure Event Recipients
40
Figure 29 Adding Event Recipients
40
Configure Trap Relaying
41
Figure 30 Configure Event Severities to Forward
41
Discover a Single Device
42
Figure 31 Configure Trap Relaying
42
Figure 32 Specifying Trap Recipient
42
Figure 33 Discover a Single Device
42
Edit Performance Thresholds (Per Device)
43
Figure 34 Configure Performance Thresholds (Per-Device)
43
Administrator Tools
44
Export and Download Configuration Files
44
Download Log Files
44
Check Disk Utilization on Appliance
44
Figure 35 Export & Download Configuration Files
44
Figure 36 Download Log Files
44
Send Incident Report
45
Figure 37 Check Disk Utilization on Appliance
45
Figure 38 Send Incident Report
45
Generate Diagnostics File
46
Establish Support Connection
46
Figure 39 Generate Diagnostics File
46
Figure 40 Establish Support Connection Via SSH
46
Download Data Archives
47
Advanced Administration
47
System Software & Signature Updates
47
Figure 41 Download Data Archives
47
Figure 42 System Updates
48
Figure 43 Download Updates
48
Figure 44 Install Updates
49
Figure 45 View Installed Updates
49
Figure 46 View All Updates
49
Figure 47 View All Updates
50
Appliance Database Administration
51
Data Backup and Restore
51
Figure 48 Appliance Database Administration
51
Manage Routes
52
Figure 49 Download Backup Files
52
Figure 50 Install Backup Files
52
Prune Unused Performance Data
53
Figure 51 Manage Routes
53
Figure 52 Add a New Network Route
53
Figure 53 Prune Unused Performance Data
53
Delete Management Settings and Data
54
Delete Traffic Analysis Performance Information
54
Figure 54 Delete Management Settings and Data
54
Install CC-NOC License
55
Figure 55 Delete Traffic Analysis Performance Data
55
Figure 56 Install a New License File
55
Installed Appliances List
56
Figure 57 Installed Appliances List
56
Chapter 3: Configuring Intrusion Detection
57
Configure a Spanned or Mirrored Port
57
Ethernet TAP
57
Benefits
57
Deployment
58
Configure Appliance Home Networks
58
Figure 58 Ethernet TAP Deployment
58
Figure 59 Selecting an Intrusion Detection Appliance for Home Network Configuration
58
Configure Port Scan Detection
59
Figure 60 Configuring Home Network for Intrusion Detection Appliance
59
Figure 61 Selecting an Intrusion Detection Appliance for Portscan Detection
60
Figure 62 Configuring Portscan Detection for an Intrusion Detection Appliance
60
Enable/Disable Signature Types Via Signature Profiler
61
Select Intrusion Detection Appliance(S)
62
Figure 63 Selecting Intrusion Detection Appliances for Signature Profiler
62
Select Types of Signatures to Monitor
63
Figure 64 Selecting Signature Types
63
Load Default Signatures or Settings from Another Appliance
64
Delete Intrusion Detection Performance Data
64
Figure 65 Load Intrusion Detection Settings
64
Figure 66 Deleting Intrusion Detection Performance Data
64
Advanced Intrusion Detection Administration
65
Manage Signatures
65
Figure 67 Selecting an Intrusion Detection Appliance for Changing Signature Set
65
Figure 68 Generating New Signature Set
65
Upload Custom Signatures Tool
66
Figure 69 Selecting an Intrusion Detection Appliance for Changing Signature Set
66
Figure 70 Selecting an Intrusion Detection Appliance for Changing Signature Set
66
Chapter 4: Configuring Windows Management
67
Windows Management Instrumentation (WMI)
67
Configure an External Windows Proxy
67
External Proxy Host Requirements
68
Overview
68
Download and Run Proxyinstaller
68
Configuring the CC-NOC to Communicate with the Proxy
69
Open Ports on External Proxy Host
69
Figure 71 Configure an External Proxy for Windows Management
70
Figure 72 Specifying Proxy Host Information
70
Figure 73 Specifying Proxy Host Information
71
Figure 74 Specifying Proxy Authentication Credentials
72
Figure 75 List of Windows Management Proxies
73
Configuring a WINS Server or LMHOSTS File
74
Figure 76Selecting Internet Protocol (TCP/IP) for WINS Settings
74
Figure 77Selecting WINS Tab
75
Authenticate Windows Computers
76
Manage, Unmanage, or Rescan Devices
76
Figure 78 Change Authentication Usernames and Passwords for Discovered Targets
76
Figure 79 Manage Devices
76
Configure Windows Performance Thresholds
77
Configure WINS Server or LMHOSTS File on 2500M
77
Edit WINS Settings
77
Figure 80 Configuring Windows Performance Thresholds
77
Figure 81 Edit WINS Settings
78
Figure 82 WINS Server IP Address
78
Edit LMHOSTS File
79
Figure 83 Commandcenter NOC 2500M Options
79
Figure 84 Edit LMHOSTS File
79
Chapter 5: Configuring Vulnerability Scanning
81
Accessing Vulnerability Scanning
81
Figure 85 Vulnerability Scanning Warning
81
Vulnerability Scan Levels
82
Figure 86 Type IP Addresses for Vulnerability Scanning
83
Specify IP Addresses and Schedule the Scan
83
Figure 87 Create a Vulnerability Scanning Schedule
84
Chapter 6: Configuring Notifications
85
Enable/Disable Notifications
85
Figure 88 Notification Status
85
Figure 89 Admin Status
85
Configure Event Notifications
86
Add/Edit a Notification
86
Figure 90 a Configuring Event Notifications
86
Figure 91 Adding a New Event Notification
87
Figure 92 Specifying an Interface/Service Rule for Event Notification
87
Figure 93 Validating an Interface/Service Rule
89
Figure 94 Entering Notification Recipient Information
89
Configure Notification Groups
90
Figure 95 Special Values for Email Subject and Text Message Fields
90
Figure 96 Arranging Event Notifications
90
Add/Modify a Notification Group
91
Figure 97 Configure Notification Groups
91
Figure 98 Assigning a Name to a Notification Group
91
Figure 99 Assigning Users to a Notification Group
92
Configure Notification Paths
93
Add/Edit a Notification Path
93
Figure 100 Configuring a Notification Path
93
Figure 101 Configuring a Notification Path
94
Figure 102 Configuring a User Target in Notification Path
94
Figure 103 Configuring a Group Target in Notification Path
95
Figure 104 Configuring an Email Target in Notification Path
95
Figure 105 Modify Notification Paths
95
Figure 106 Define Escalation in Notification Path
96
Figure 107 Configuring a User Target for Escalation in Notification Path
96
Figure 108 Configuring a Group Target for Escalation in Notification Path
97
Figure 109 Configuring an Email Target in Notification Path
97
Configure TAP Paging
98
Figure 110 Configuring TAP Paging
98
Add a New TAP Service
99
Figure 111 Editing TAP Service
99
Edit Modem Parameters
100
Revert to Original Configuration
100
Figure 112 Editing Modem Parameters
100
Figure 113 Editing Modem Parameters
100
Chapter 7: Managing Assets
101
Manage Assets
101
Import Assets
101
Figure 114 Importing Assets
102
Export Assets
103
Map Unassociated Assets to Nodes
103
Figure 115 Exporting Assets
103
Figure 116 Mapping Unassociated Assets to Nodes
103
Clear All Asset Records
104
Figure 117 Clear All Asset Records
104
Chapter 8: Creating Users, Categories, Views
105
Create, Modify, Delete Users
105
Add a New User
105
Figure 118 Managing Users
105
Figure 119 Adding a New User
105
Edit a User
106
Figure 120 Editing a User
106
Figure 121 Creating/Editing a New User
106
Adding/Editing a Duty Schedule
107
Figure 122 Create a Duty Schedule
107
Figure 123 Specifying Duty Schedule Times
107
Configure Categories
108
Figure 124 Edit, Delete, or Reset a Duty Schedule
108
Figure 125 Configure Categories
109
Configure Views
111
Figure 126 Configure Views
111
Add/Modify an Existing View
112
Figure 127 Add/Modify Views
112
Figure 128 Map Users to Views
113
Map Users
113
Appendix A: Specifications
115
V1 Platform
115
General Specifications
115
Hardware Specifications
115
Remote Connection
115
Environmental Requirements
115
Electrical Specifications
116
Appendix B: Troubleshooting
117
The Raritan Support Structure
117
The CC-Noc's Ability to SSH to Raritan
117
Checking Appliance Database Settings
118
RAID Array Failure
118
The CC-NOC Services
118
Discovery
118
Capability Scanning
119
Pollers
119
Notifications
119
SNMP Data Collection
120
Vulnerability Scanning
120
Events, Historic Data, and Graphs
120
Windows Management
120
Your Network
121
Raritan Support Structure
121
Contacting Raritan
121
Discovery
121
Why Don't I See the Machine Name for My Windows 2000 Systems
122
Capability Scanning
122
Scanning Interfaces
122
Re-Parenting
123
Do the Netbios Node Names Match
123
Are both IP Addresses in the SNMP Interfaces Table
123
Why Can't My CC-NOC Manage X Service
124
Pollers
124
Notifications
125
Why am I Not Receiving Notifications
125
What Conditions Cause a Notification to be Sent
126
SNMP Data Collection
126
SNMP - What It Is and What It Does
126
Troubleshooting SNMP Data Collection
127
Getif
128
Vulnerability Scanning
128
Historic Data and Graphs
129
How Is Performance Data Summarized
129
How Are Service Level Availabilities Calculated
129
Why Isn't SNMP Part of My Service Level Availability Calculations
129
How Do I Interpret the SNMP Graphs/Reports
130
Additional Support
130
The Tools Discussed in this Chapter
130
Documentation
130
How Do I Get Help
130
Appendix C: Performance Monitoring
133
Overview
133
SNMP Data Collection
133
SNMP Data Collection Enhancements
136
Windows Performance Metrics
136
Leveraging Performance Data in Network Management
137
Thresholding
138
How It Works
138
SNMP Performance Metric Thresholds
139
Windows Performance Metric Thresholds
140
Appendix D: Setting up WMI on Target Machines
141
Configuring a Windows 98/ME Box for Remote WMI Management
141
Configuring a Windows Proxy Details
142
Registry Changes [Configuration]
143
Appendix E: Managing and Responding to Intrusion Detection Events
145
How the Intrusion Detection Works
145
Reducing False Positives with the Signature Profiler
145
Signature Profiler and the Rules Engine
145
Responding to Events and Notifications
146
Event Categories
146
What Do I Do When
146
What if I Have Been Hacked
147
Security - an Elusive Goal
147
Appendix F: Notification Parameters
149
Notification Parameter Substitution
149
Available Values
149
Notification
149
Events
149
Assets
150
Appendix G: Network Traffic Overhead: Network Management's Necessary Evil
151
ICMP Pings
151
TCP Socket Reachability
151
HTTP Synthetic Transaction
152
SNMP Data Collection
152
Additional Notes
154
Advertisement
Raritan CommandCenter NOC 2500N Quick Start Manual (2 pages)
Brand:
Raritan
| Category:
Switch
| Size: 0.32 MB
Advertisement
Related Products
Raritan CommandCenter NOC 250
Raritan CommandCenter NOC 2500S
Raritan CommandCenter NOC 100
Raritan COMMANDCENTER NOC
Raritan CommandCenter CC-SG
Raritan commandcenter secure e1
Raritan CommandCenter Secure Gateway
Raritan COMMANDCENTER 2.20 -
Raritan Categories
Switch
Power distribution unit
Toilets
Gateway
Network Hardware
More Raritan Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL