Monitor one Help - Table of contents About this Manual/Help file Chapter 1. Introduction About FineConnection About Network Management About this manual Copyright Notice Trademarks What is new? Version FP1.109.404 Version FP1.107.403 Version FP1.107.401 Version FP1.106.391 Version FP1.105.391 Version FP1.102.390 Version FP1.101.383 Version FP1.99.379 Version FP1.99.375 Version FP1.98.372 Version FP1.94.370 Version FP1.92.365 Version FP1.92.360-RC3 Version FP1.91.355-RC2 Version FP1.89.343-RC1 Version FP1.85.333-Beta1 Version FP1.78.316 Version FP1.75.315 Chapter 2. System requirements and recommendations System requirements Recommendations Installation tasks The installation directory structure: Rights The License information window Chapter 3. The Graphical network map About the Graphical network map The Monitor one control panel Objects Operator and Designer mode Switching between modes Setting the Designer password Projects Creating a new Project Changing the default Firebird username and password / Securing your project Adding, Modifying, Removing or Moving a Device- or Virtual object. Adding a new Device- or Virtual object to the map Modifying a Device- or Virtual object Removing a Device- or Virtual object Moving a Device- or Virtual object Building network maps using IP-nodes found by Discovery. Adding, Resizing, Removing or Moving a Shared Medium object Adding a shared medium object to a network map Resizing a shared medium object Removing a shared medium object Moving a shared medium object Adding, Modifying, Removing or Moving a Free-Text object Adding a Free-Text object Modifying a Free-Text object Removing a Free-Text object Moving a Free-Text object Adding or Removing links between objects Selecting a link type Adding a link between objects Removing a link between objects Background images Adding a background image to a network map Background image requirements: Removing a background image from a network map Building a hierarchical multi-level map structure Creating a child map (sub-map) Moving between maps Error control About error control How Error Control determines the root-cause of a "No response from device" event Enabling Error control Verifying Error Control activity Verifying network paths used by Error control The Desktop feature Saving a Desktop setup Updating a Desktop setup Removing a Desktop setup Opening an existing project Opening a project via the GUI Monitor one commandline switches Database maintenance Making a backup Midnight backups Instant backups Restoring a backup Database reorganization The Event control window Chapter 4. Classes Understanding Classes Adding, Modifying or Removing a Class Adding a new Class Adding, Modifying or Removing a custom menu-item Defining your own Class images Modifying a Class Removing a Class Class files / Class Packages About Class packages Creating a Class file or Class package Importing a Class package Chapter 5. SNMP data retrieval with Shooters About Shooters Shooter Types Table shooter Graph shooter Threshold shooter History shooter Set shooter Meter shooter SnipMon Gauge and SnipMon Graph shooters Pie Shooter Shooters – Glossary and terms Starting Shooters Starting Foreground Shooters Using SpeedShooters Setting the "SpeedShooter" property of a Shooter Starting Background Shooters Starting a Background Shooter at the device level Starting a Background Shooter at the Class level Creating Shooters Creating a Shooter with the wizard Creating a new Shooter directly from the MIB tree Manually creating a new Shooter About Formulas Adding a formula to a Shooter Example 1. Manually building a Shooter that monitors port 7 of a switch. Modifying or Removing Shooters Using SNMP for status polling Chapter 6. Logging SNMP data for trending and long-term analysis About logging SNMP data The native Monitor one history database versus the RRD Accessing the native Monitor one database The History control window Showing History data from the native database in a graph Exporting History information to a *.txt file How to import an export file into Microsoft Excel Automatic database cleanup Accessing the RRD RRDTool Location, Format and Fields in an RRD Showing History data from the RRD in a graph Building new Graph definitions Exporting RRD History information to a *.txt file The epoch UTC issue Chapter 7. Alerting About Alerting Defining when to Alert Customizing Alerting Defining how to Alert Configuring audible alerting Configuring e-mail alerting About Recipient Groups and Addresses Defining Alert-groups and Recipients Executing a program or script triggered by an event Parameters and Passing mode Examples Send (SMS) messages to Pagers, Cell phones or Handhelds triggered by an event. Generic Messaging Gateway PageGate Messaging Gateway How long does Alerting remain active? Reverse Alerting Example 2. Sending an email alert message triggered by a Threshold exceeded event. Chapter 8. The WEB interface About the Monitor one WEB interface Setting up the Monitor one WEB server Managing WEB interface users Web user roles Accessing the WEB interface Working with the Web interface Zooming-in on device objects and executing Shooters using the web interface Chapter 9. Traps, the Monitor one Trap receiver About traps Trap versions Enabling the Trap receiver Viewing received Traps Defining Trap filters / Adding trap filter rules Unblocking traps / Removing Trap filter rules How Monitor one Trap filtering exactly works Chapter 10. Discovery and Extensive Monitoring About Discovery and Extensive Monitoring Running Discovery and Extensive Monitoring version 1 (EM1) periodically Discovery and Intrusion Detection systems Working with Discovery Viewing the discovered nodes in a range Associating discovered IP nodes with Monitor one classes Adding, Modifying or Removing IP ranges Discovering an IP range Building network maps using IP-nodes found by Discovery. Working with Extensive Monitoring (EM1) How does EM1 work? Which potential problems is EM1 able to find Viewing EM1 messages Chapter 11. Utilities FinePing Using FinePing via its GUI One by one mode Generator mode Using FinePing on the commandline or in a command file FineTrace The system Logbook TFTP server Configuring the TFTP server Viewing TFTP server activity MIB Compiler About compiling MIB files and the default Monitor one MIB tree Compiling new MIB files Compiling multiple MIB files in one action MIB resources on the WWW Backing-up or Restoring the default MIB tree Syslog server About the Syslog server Viewing syslog messages Filtering Syslog messages Syslog messages and alerting Chapter 12. How to get the best out of monitoring your network with Monitor one Network monitoring - a six step guide Step one: visualize your network. Step two: setup Alerting and logging. Step three: collect historic information for baselining and trending purposes. Step four: set up threshold monitoring. Step five: define real-time graphing. Step six: stay alert! Checklist Appendix A. What you need to know before you start building Shooters. Part 1. SNMP SNMP key terms Examples Part 2. The Monitor one Shooter concept About Examples Example 1. Querying a device’s name and description Example 2. Querying the whole system branch Example 3. Querying the whole interfaces branch and showing the values in a simple table. Example 4. Querying all ifInOctets and ifOutOctets fields from the interfaces branch and showing the values in a multicolumn Table (rows and columns). Example 5. About Tables and complex instances Example 6. A simple Graph Shooter that retrieves the incoming and outgoing bytes per second of the second interface of a host. Example 7. Using the formula option in a Graph Shooter. Example 8. Graph Shooters and the use of the keywords: "All instances" or "On runtime". Example 9. The Alternate Legend option Example 10. Threshold Shooters The IDFFS ("Is different from first sample") and the HCF ("Has Changed From") operators Example 11. Special Formula options for SnipMon Shooters. Example 12. The "Instance Filtering" option for Threshold and History Shooters. Appendix B. Various program windows The network map Adding a new device to the map Adding a shared medium (thin/thick coax) to the map Adding Free Text to the map Building hierarchical network map structures by using "Network objects" Adding links/connections between objects Removing a device, Free text or Shared medium. Removing a network map Removing a link between objects Moving a device, Free text, Shared medium or network object Resizing a shared medium object Adding a background image to a map Removing a background image Working with objects on the map The <DeviceName> a closer look window The Manage Classes window Customizing the Status poller The Customizing Trap management window The Customizing Threshold management window The Syslog server The Customize Alerting window The TFTP server log window The Add/Modify a Shooter window The Namelist The Define <ClassName> Shooters window The Add/Modify a <ClassName> Shooter-target window The Add/Modify formula: <FormulaName> window The Threshold control window Getting started About Getting started First project Step1. Creating the initial database and the root network map. Step2. Creating a new Class. Step3. Adding a device object to your network map. Step4. Move the added device to the exact location on the network map. Step5. Check if the newly added device responds to Status- and HealthPoller requests. Verify whether the device responds to StatusPoller requests (ICMP Ping). Verify whether the device responds to HealthPoller requests (SNMP). Step6. Now we will create a Shooter to retrieve some SNMP data. Step7. Final step! Test the Shooter. Second project Step1. Add a second Workstation. (see step 3 of the First project page). Step2. Add a virtual hub. (see step 3 of the First project page). Step3. Link the first workstation to the hub using fiber. Step4. Add a link between the second workstation and the hub using UTP/STP. Third project Step1. Create a submap. Step2. Add a router and a workstation to the new submap. Step3. Add a shared medium to the 'Submap1' map. Step4. Link the hub of the root map to the router on the submap. Step5. Link the third workstation to the router using the shared medium. Fourth project Step1. Follow these steps to create the shooter that retrieves the ICMP subtree: Step 2. Follow these steps to create the 'Threshold' shooter: Step3. We'll now start the 'MyThreshold' shooter: Step4. We can now check the status of the activated Threshold shooter: Step5. We can force a 'threshold exceeded' event by pinging a device on the network: Step6. To acknowledge this alert: Step7. View the logbook.