Smc EliteView User Guide

EliteView
SNMP-Based Network Management Software for Windows
User Guide
EliteView 6.10
SNMP-Based Network Management Software for Windows
6 Hughes Irvine, CA 92618 Phone: (949) 679-8000
June 2003 R02
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice.
Copyright © 2003 by
SMC Networks, Inc.
6 Hughes
Irvine, CA 92618
All rights reserved.
Trademarks:
SMC is a registered trademark; EliteView, EZ Stack, TigerSwitch and TigerStack are trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
Licence Agreement
The Purchaser MUST read this agreement before using the software provided in this package. As used in this Agreement the terms “You”, “Your”, “LICENSEE”, and “Purchaser” refer to the licensee of the SOFTWARE and accompanying written materials in this package, as described below. If you do not agree to the terms of this License Agreement, return the package, unused, to the point of purchase for a refund of any license fee which you paid.
1. Grant of license
SMC Networks, Inc. (SMC) grants to you a non-exclusive right to use one copy of the program (hereinafter the “SOFTWARE”). The SOFTWARE is provided by SMC on CD-ROM. SMC also grants to you a non-exclusive right to use the programs on the enclosed CD-ROM (hereinafter the “SOFTWARE”) on one local area network. SMC reserves all rights not expressly granted to the LICENSEE.
2. Ownership of license
All SOFTWARE, and each copy thereof, remains the property of SMC and/or one or more of its licensors. This license is not a sale of any SOFTWARE, or of any copy. You disclaim forever any rights of ownership in any SOFTWARE, or in any copy. The only rights that you obtain with respect to any SOFTWARE are those expressly set forth in this License Agreement.
3. Copy restriction
You acknowledge that the SOFTWARE and accompanying written materials are copyrighted and entitled to protection under the copyright laws of nations where the SOFTWARE is installed, and under international conventions. Except for the copying of SOFTWARE as expressly permitted in the next sentence, you may not copy any SOFTWARE or accompanying written materials, or any portion of any of them, or remove any copyright or proprietary notice from any of them; and you agree not to allow any other person or entity to do so. Subject to these restrictions, you may make copies of the SOFTWARE solely for backup purposes.
4. Use restriction
As the LICENSEE, you may physically transfer the SOFTWARE from one computer to another within a licensed local area network. You may not distribute copies of the SOFTWARE or accompanying written materials to others. Furthermore, the LICENSEE is not permitted to modify, disassemble, reverse or de-engineer, or create any derivative works based on the SOFTWARE.
5. Transfer restrictions
This SOFTWARE is licensed only to you, the LICENSEE, and may not be transferred to anyone without prior written consent of SMC. Any authorized transferee of the SOFTWARE shall be bound by the terms and conditions of this Agreement. In no event may you transfer, assign, rent, lease, sell or otherwise dispose of the SOFTWARE on a temporary or permanent basis except as expressly provided herein.
6. Termination
This license agreement is effective until terminated by SMC. This license may be terminated without notice by SMC if the LICENSEE fails to comply with any provision of this license. Upon termination, it is the LICENSEE’s obligation to destroy the written materials and all copies of the SOFTWARE. Further use of the SOFTWARE components will be in violation of this license.
Limited Warranty
The Warranty Period for the media on which the SOFTWARE is recorded is for 5 years from the date of its delivery to the original user as evidenced by a receipt.
You must give SMC prompt written notice within the Warranty Period of any warranty claim. Conditioned on your providing prompt written notice to SMC within the Warranty Period, SMC shall, as your sole and exclusive remedy, repair or replace media not conforming to this warranty, or accept return of any such nonconforming media. The election of whether to repair, replace, or refund shall be SMC’s, in its sole discretion.
EXCEPT FOR THE EXPRESS WARRANTY SET FORTH ABOVE IN THIS LIMITED WARRANTY SECTION, THERE ARE NO WARRANTIES, EITHER EXPRESS OR IMPLIED. THE SOFTWARE IS PROVIDED AS IS, WITH ALL FAULTS. SMC DISCLAIMS AND EXCLUDES ANY AND ALL WARRANTIES, INCLUDING WITHOUT LIMITATION ANY AND ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AGAINST INFRINGEMENT AND THE LIKE, AND ANY AND ALL WARRANTIES ARISING FROM ANY COURSE OF DEALING OR USAGE OF TRADE.
L
IMITED WARRANTY
YOU ACKNOWLEDGE THAT YOU ARE NOT RELYING ON SMC’S SKILL OR JUDGEMENT TO SELECT OR FURNISH SUITABLE GOODS.
PRODUCTS AND SERVICES PROVIDED BY SMC ARE NOT DESIGNED, INTENDED OR AUTHORIZED FOR USE IN ANY LIFE SUPPORT OR OTHER APPLICATION WHERE PRODUCT FAILURE COULD CAUSE OR CONTRIBUTE TO PERSONAL INJURY OR SUBSTANTIAL PROPERTY DAMAGE. IF YOU APPLY ANY PRODUCT OR SERVICE PURCHASED OR LICENSED FROM SMC TO ANY SUCH UNINTENDED OR UNAUTHORIZED USE, YOU SHALL INDEMNIFY AND HOLD SMC, ITS AFFILIATES AND THEIR RESPECTIVE SUPPLIERS, HARMLESS AGAINST ALL CLAIMS, COSTS, DAMAGES AND EXPENSES ARISING, DIRECTLY OR INDIRECTLY, OUT OF ANY SUCH UNINTENDED OR UNAUTHORIZED USE, EVEN IF SUCH CLAIM ALLEGES THAT SMC OR ANY OTHER PERSON OR ENTITY WAS NEGLIGENT IN DESIGNING OR MANUFACTURING THE PRODUCT.
Limitation of Liability and Damages
IN NO EVENT SHALL SMC BE LIABLE FOR INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES; OR FOR LOST PROFITS, SAVINGS OR REVENUES OF ANY KIND; OR FOR ANY ACTUAL DAMAGES IN EXCESS OF $100,000; REGARDLESS OF THE FORM OF ACTION, WHETHER BASED ON CONTRACT; TORT; NEGLIGENCE OF SMC OR OTHERS; STRICT LIABILITY; BREACH OF WARRANTY; OR OTHERWISE; WHETHER OR NOT ANY REMEDY IS HELD TO HAVE FAILED OF ITS ESSENTIAL PURPOSE, AND WHETHER OR NOT SMC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SMC Networks, Inc.
6 Hughes
Irvine, CA 92618
ABOUT THIS GUIDE
About This Guide
Welcome to EliteView network management software (version 6.10). This guide describes the procedures for installing and using this program. Detailed instructions on how to use every module and practical examples make it easy for you optimize the performance and efficiency of your network.
General Manual Coverage
This manual is your guide to using EliteView to manage all your network resources. It covers the following topics:
Introduction to EliteView Chapter 1 Software Installation Chapter 2 Getting Started Chapter 3 Mapping Out Your Network Chapter 4 Basic Management Tools Chapter 5 SNMP MIB Management Chapter 6 Logging Network Statistics Chapter 7 Managing Events Chapter 8 Using RMON Chapter 9
Conventions Used in this Manual
This manual uses a variety of editorial and typographical conventions to help you locate and interpret information easily. These conventions are:
italics Italicized words refer to keyboard keys you have to press, menu options you
have to select to invoke an action, or a section in this manual or another manual you can consult for reference.
For example: <Enter>, Reboot
Courier New Words shown in Courier New typeface are used to represent screen displays,
filenames, or commands you must enter to initiate an action.
Additional References
System Help
Help files may be accessed directly from EliteView via on-line help. To get help, select Help from the menu bar and then click on Index. Last-minute information regarding EliteView has been recorded in the README.TXT file.
i
ABOUT THIS GUIDE
ii
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION ............................................................................................ 1-1
General Description ...............................................................................................................1-1
Management Functions .......................................................................................................... 1-2
Application Interface .............................................................................................................1-2
Features of EliteView ............................................................................................................1-3
CHAPTER 2 INSTALLATION .............................................................................................. 2-1
Installation for EliteView .......................................................................................................2-1
System Requirements ...................................................................................................... 2-1
Using SETUP to Install EliteView ...................................................................................2-2
Software Installation ........................................................................................................2-2
CHAPTER 3 GETTING STARTED ....................................................................................... 3-1
Overview................................................................................................................................3-1
Network Interface ........................................................................................................... 3-1
Event-Driven, Modular Architecture .............................................................................. 3-1
EliteView Modules .................................................................................................................3-2
Data Logging and Event Management .................................................................................3-4
Starting EliteView ................................................................................................................... 3-6
CHAPTER 4 DEFINING THE NETWORK CONFIGURATION ........................................................ 4-1
Quick Guide to Map Building ..............................................................................................4-1
Discovery ................................................................................................................................4-2
Name Database Manager ...................................................................................................... 4-5
Creating Network Maps......................................................................................................... 4-7
CHAPTER 5 NETWORK TOOLS ........................................................................................ 5-1
Setting Addresses with the BOOTP Server .........................................................................5-1
Probing Devices with the Alive Test ...................................................................................5-5
Downloading Files with the TFTP Server ...........................................................................5-7
Telneting to Other Computers on the Network ..................................................................5-8
CHAPTER 6 SNMP MIB MANAGEMENT .......................................................................... 6-1
MIB Compiler ......................................................................................................................... 6-1
Starting the MIB Compiler ..............................................................................................6-2
MIB-2 Viewer.........................................................................................................................6-5
MIB-2 Directory ...............................................................................................................6-6
System Information .......................................................................................................... 6-6
Interface Administration ..................................................................................................6-7
Interface Statistics ............................................................................................................6-8
MIB Browser .......................................................................................................................... 6-9
Basic Functions of MIB Browser....................................................................................6-9
iii
T
ABLE OF CONTENTS
Menu Description ......................................................................................................... 6-10
Accessing Device Values ............................................................................................. 6-11
CHAPTER 7 COLLECTING DATA WITH LOG MANAGER ........................................................... 7-1
Overview................................................................................................................................7-1
Editing a Log Process ............................................................................................................. 7-2
Modifying a Log Process .................................................................................................7-3
Log Controls ............................................................................................................................7-4
Viewing Log Data ..................................................................................................................7-4
Using the Log Database Manager ..................................................................................7-4
Using the Graphic Display Dialog Box .........................................................................7-5
Defining Filter Formulas........................................................................................................7-6
Filter Formula ...................................................................................................................7-6
Filter Formula Syntax ...................................................................................................... 7-7
Defining Threshold Formulas ...............................................................................................7-9
Threshold vs. Filter Formula........................................................................................... 7-9
Accuracy ........................................................................................................................... 7-9
Threshold Formula ...........................................................................................................7-9
Threshold Formula Syntax ........................................................................................... 7-10
CHAPTER 8 MANAGING EVENTS ...................................................................................... 8-1
Understanding the Event Manager ....................................................................................... 8-1
Starting the Event Manager .............................................................................................8-1
Defining Events ......................................................................................................................8-2
Pre-Defined “System” Events .........................................................................................8-2
Defining “User” Events ...................................................................................................8-2
Defining Event Actions..........................................................................................................8-2
Using Special Text........................................................................................................... 8-4
Event Data ........................................................................................................................8-4
Receiving SNMP Traps with the Trap Manager.................................................................. 8-5
Limitations of Trap Messages .........................................................................................8-5
Trap Types .......................................................................................................................8-5
Trap Manager ................................................................................................................... 8-6
Posting Messages to the Report Window ............................................................................8-6
CHAPTER 9 USING RMON ........................................................................................... 9-1
Introduction............................................................................................................................. 9-1
A Brief Description of RMON ........................................................................................9-1
Starting the RMON Manager ........................................................................................... 9-2
RMON Utilities .......................................................................................................................9-3
Statistics Group ................................................................................................................9-3
History Group ..................................................................................................................9-8
Alarm and Event Groups .............................................................................................. 9-10
iv
T
ABLE OF CONTENTS
Host Group .................................................................................................................... 9-12
Host Top N Group........................................................................................................ 9-14
Matrix Group ................................................................................................................. 9-16
Filter and Capture Groups ........................................................................................... 9-19
APPENDIX A TYPICAL ELITEVIEW APPLICATIONS ................................................................ A-1
Adding a New MIB Using the MIB Compiler .................................................................... A-1
Managing a Third-Party Device Using the MIB Browser ................................................. A-2
Using the Log and Event Managers to Monitor the Network ........................................... A-3
Customizing EliteView to Receive Third-Party Traps ....................................................... A-6
Exporting Logged Data to Other Software ......................................................................... A-7
APPENDIX B CUSTOMIZING ELITEVIEW ............................................................................ B-1
EliteView’s Initialization Files .............................................................................................. B-1
Inside the NETMGR.INI File ................................................................................................ B-1
Changing Parameters in NETMGR.INI .......................................................................... B-2
The [system] Section....................................................................................................... B-3
The [device] Section ....................................................................................................... B-3
The [tools] Section .......................................................................................................... B-4
The [bitmaps] Section ..................................................................................................... B-6
The [util] Section ............................................................................................................. B-8
The [tftp] Section ............................................................................................................ B-9
The [startup] Section ..................................................................................................... B-10
The [discover] Section .................................................................................................. B-11
Inside the TRAP.INI File..................................................................................................... B-11
The [generic] Section ................................................................................................... B-12
The [enterprise] Section ............................................................................................... B-13
Specific Trap Sections .................................................................................................. B-13
APPENDIX C SNMP ENVIRONMENT ................................................................................ C-1
SNMP Roles ........................................................................................................................... C-1
Managing Data ......................................................................................................................... C-1
Objects .................................................................................................................................... C-2
table.index notation ............................................................................................................ C-2
iso origin ............................................................................................................................ C-3
Branches ............................................................................................................................ C-3
APPENDIX D TECHNICAL REFERENCES ............................................................................. D-1
RFC Reports ........................................................................................................................... D-1
Industry-Related Documentation ......................................................................................... D-2
APPENDIX E PERFORMANCE TIPS..................................................................................E-1
Optimize Your Computer System .........................................................................................E-1
Minimize Unnecessary Resources ........................................................................................E-1
Other Tips .............................................................................................................................. E-1
APPENDIX F SPECIFICATIONS .......................................................................................... F-1
v
T
ABLE OF CONTENTS
Product Overview .................................................................................................................. F-1
Features and Specifications ...................................................................................................F-1
APPENDIX G CODEBASE 6.0 DLL SUB-LICENSE AGREEMENT ............................................... G-1
APPENDIX H TROUBLESHOOTING ....................................................................................H-1
EliteView Map: Icon Stays Red ........................................................................................... H-1
Discovery: No Nodes Found ............................................................................................... H-2
Trap Manager: MIB Variable Not Found ............................................................................ H-2
APPENDIX I ERROR MESSAGES ........................................................................................ I-1
EliteView................................................................................................................................. I-1
BOOTP Server ....................................................................................................................... I-3
BOOTP.DLL ............................................................................................................................ I-4
Discovery ................................................................................................................................ I-6
Event Manager...................................................................................................................... I-10
ICMP.DLL ............................................................................................................................... I-10
IPX.DLL ................................................................................................................................. I-13
Log Manager ......................................................................................................................... I-13
MESSAGE.DLL....................................................................................................................... I-13
MIB Browser ........................................................................................................................ I-14
MIB Compiler ....................................................................................................................... I-16
MIB.DLL ................................................................................................................................ I-19
MIB-2 Viewer....................................................................................................................... I-20
Report.................................................................................................................................... I-21
TFTP Server .......................................................................................................................... I-21
TFTP.DLL............................................................................................................................... I-23
Trap Manager ....................................................................................................................... I-25
APPENDIX J PRODUCT SUPPORT SERVICES .......................................................................... J-1
Technical Support Questions ................................................................................................ J-1
GLOSSARY INDEX
vi
CHAPTER 1

INTRODUCTION

EliteView provides a user-friendly interface for managing SMC brand and third-party network devices. This software is specifically designed to support the efforts of the MIS manager, system administrator(s), technical staff responsible for network management and maintenance, and network operators who use the system on a daily basis.
EliteView provides all the tools you need to manage nearly any kind of network. You can readily monitor the traffic load throughout the network and make the changes required to avoid major crises ahead of time. This software is designed around an event-driven architecture, which allows you to define event-handling routines that can automatically manage a wide variety of common network tasks.

General Description

EliteView is based on the industry standard Simple Network Management Protocol (SNMP); and provides protocol support for UDP/IP and IPX. EliteView is a Windows-based application used to manage nearly every component in your network, from internetworking devices down to end-node computer resources.
EliteView manages network devices using the comprehensive Management Information Base. This MIB consists of various MIB modules which define basic system parameters for both general and specific device types.
EliteView is based on a broad conceptual interface that permits it to manage any network device that supports SNMP. By opening your network map and clicking on various objects, specific management interfaces and system information can be readily accessed.
Interface statistics and traffic load can be illustrated by line charts. This information can be automatically recorded by the Log Manager to maintain historical records. A powerful reporting feature is also provided for recording significant information from any management window. Reports can be edited, saved and retrieved again during a later session for subsequent analysis or comparison.
Event management is a key feature of EliteView. By defining specific data filters and thresholds, you can activate event-handling routines that help you keep the network functioning. You can easily shut down malfunctioning ports, switch to backup systems, or reconfigure network connections; and then restore system parameters back to normal values after component problems have been resolved or the traffic falls off.
1-1
INTRODUCTION

Management Functions

EliteView is a Windows-based software package. It provides state-of-the-art utilities which allow you to perform the following network management tasks:
• Generate a detailed hierarchial map of your entire network configuration. These maps display the current status of network nodes, and provide a hot link to the management module for each device.
• Maintain centralized boot services that provide network addresses and information on system files to download. Boot services are used to quickly reassign network addresses, and fetch filenames required for downloading frequently modified system software for test devices.
• Monitor and log significant events and statistics. EliteView provides access to common MIB variables, as well as specific parameters for SMC devices. Network statistics can then be displayed in tabular or graphic form.
• Automatically respond to network problems with a variety of actions. By defining thresholds for parameters based on device-specific criteria or traffic loading, you can invoke event handling routines designed to warn the network manager of potential system problems or automatically take corrective action.
• Quickly fetch or set MIB variables for network devices. Data in the Management Information Base (e.g., RFC 1213 for generic internetworking devices) can be managed on an item-by-item basis or with a user-defined profile that fetches or sets a group of related variables in a single action.
• Remotely manage or reconfigure network devices. SMC provides a wide variety of intelligent networking devices which can be remotely managed via an SNMP agent. Software modules based on an advanced graphic user interface are provided to manage every aspect of these devices including hubs and switches. Extensive management functions are also provided for third-party devices using the MIB Browser.

Application Interface

EliteView runs on a personal computer attached to the network you want to manage. Management actions normally occur via the network map, through which you can activate the appropriate software module simply by double-clicking on the concerned device or by selecting a target device and then invoking the appropriate module from the menus. By sending commands across the network, EliteView can directly manage a wide variety of SNMP-based devices.
Using this powerful management tool, you can generate a device map for a complete view of the network, where each device is represented as an icon. Network devices can be added or deleted manually, or located using Discovery. Device icons can be placed anywhere within a map using simple drag and drop. Object attributes can also be easily changed.
1-2
A full hierarchical representation can be generated by creating submaps that expand to a more detailed view when selected. Moreover, multiple submaps can be opened simultaneously. Each device included in the map can be checked periodically to verify that it is still attached to the network. When any device loses its network connection, its icon will change to indicate device state, and an alarm may be generated.
The standard method of starting EliteView is to double-click on the EliteView icon, open your network map, select a target device, and then invoke the required management module. However, you can directly invoke any of the modules displayed below.
The EliteView program group includes over twenty different modules. The main program, labeled EliteView Platform, serves as the platform through which you display the network map, manage the network, and access any of the other management modules.

Features of EliteView

INTRODUCTION
EliteView includes the following features:
• Windows-based SNMP network management.
• Manages unlimited number of network devices running SNMP agent software.
• Provides detailed information on device parameters, such as statistics for the overall SNMP agent, device component status, and network interface configuration/statistics.
• Management controls are displayed with graphic and text-oriented windows, which can be accessed via the network map, or from a pull-down menu, for better functional grouping and a more intuitive user interface.
• Hierarchical, interactive network management map with unlimited devices and network levels.
• Displays real-time graphical statistics for various counters including network traffic. Monitors the status and traffic load of each attached device, e.g., displaying the number of incoming, outgoing and discarded frames.
• Flexible event management allows you to log relevant factors on device status and traffic.
1-3
INTRODUCTION
1-4
CHAPTER 2

INSTALLATION

This chapter describes setup procedures for EliteView network management software (version 6.10). EliteView can manage any of SMC’s network devices via standard and private MIB definitions; and also manage any third-party device that has a resident SNMP agent via standard MIB definitions. Installation of EliteView software designed to manage specific devices is covered in the corresponding manuals. (Refer to “Additional References.”)

Installation for EliteView

EliteView can be readily installed on most Windows-compatible personal computers. The EliteView setup program will guide you through this step-by-step procedure.

System Requirements

Before installing EliteView, please review these minimum computer and network system requirements for a “dedicated” network management system (NMS).
Hardware:
PC with an 80486DX2-66 CPU and 16MB memory
3.5-inch floppy drive and hard drive
VGA adapter and display
Mouse
Network adapter
Software:
• Microsoft Windows 95
• Microsoft Windows 98
• Microsoft Windows NT 4.0
Microsoft Windows 2000
Microsoft Windows XP
2-1
INSTALLATION
If you frequently use multiple Windows-based applications, you may need a more powerful environment to run EliteView along with other applications. Otherwise, you may not be able to take advantage of EliteView’s full range of management capabilities. Advanced system requirements include:
Personal computer with a Pentium-133 processor (or higher)
Local hard disk with a minimum of 40 MB free disk space
SVGA color monitor with accelerated video adapter
Minimum 32 MB of memory (RAM) Note: Although EliteView uses about 20 MB of disk space, additional disk space is required for
user files.

Using SETUP to Install EliteView

The SETUP program will install EliteView from the distribution CD-ROM. This program decompresses files and copies them to a location you specify on your hard disk.
To Start SETUP:
1. Start Windows.
2. Insert the EliteView installation CD-ROM in your drive.
3. From the Program Manager, choose File menu and select Run.
4. Type D:SETUP in the dialog box.
5. Click on OK to start SETUP.
6. Follow the on-screen instructions to install the software.
7. Follow the instructions to setup the network interface.
2-2
CHAPTER 3

GETTING STARTED

Welcome to the EliteView network management program for Microsoft Windows. EliteView is a powerful network management product that provides detailed device management functions, along with a sophisticated graphic interface. The complete package is marketed as EliteView, which includes the main EliteView program and over twenty core program modules. This chapter provides an overview of the structure, and explains how the various EliteView modules are related.

Overview

EliteView is a flexible network management system based on international and industry standards. It is a Windows-based program that runs on an inexpensive PC platform. This full-featured network management software allows management of SMC or third-party network devices. In addition, it supports an open platform for the development of any kind of management application.
EliteView can manage various SMC network devices and examine the management information base in third-party devices.
EZ Stack 10
TigerSwitch 100

Network Interface

EliteView can function on various network protocol stacks for greater flexibility and efficiency. In the Windows environment, EliteView can be configured to run on a Windows TCP/IP package with a standard WINSOCKET interface. At the application level, network devices are managed via SNMP over IP or IPX.
TigerSwitch 8
TigerStack II
EliteView

Event-Driven, Modular Architecture

Designed around an event-driven, multi-tasking architecture, EliteView consists of the main program and supplementary modules. Each module works independently or in conjunction with other modules. Running any module is as easy as invoking it from the main EliteView program, or by simply double-clicking on the corresponding icon from the EliteView program group.
Network
Management Station
3rd Party IP/IPX/Ethernet Node
3rd Party SNMP Node
3-1
GETTING STARTED

EliteView Modules

EliteView includes support for many SMC products, including the EZ Stack, TigerStack, and TigerSwitch, series. This section briefly describes the basic support modules included in EliteView. The modules for specific SMC products are described in the on-line help files.
Alive Test
This module tests the connection to any network node with ICMP messages. It sends an echo request to the specified network node and gathers replies to determine device existence, round trip delay time, and the ratio of successfully returned packets.
BOOTP Server
The BOOTP Server maintains a database of network addresses and a list of corresponding boot files. BOOTP protocol runs on the UDP/IP stack. It is used by network devices to find out their own IP address and the device initialization file(s) to download.
Discovery
This module is used to automatically detect active devices on the network by polling within a specified network address range or community. Discovery sends commands out to the network and waits for responses. When a device responds, EliteView queries its functionality. If it responds correctly, a corresponding bitmap icon is added to the Discovery window.
EliteView Main Program
The main EliteView program provides the primary interface to all EliteView modules. The Tools and Utilities menus provide access to nearly every module under EliteView. The main program also provides all the tools you need to generate a detailed map of your network via menus and tool buttons. Moreover, it supports MDI (Multiple Document Interface) which allows you to simultaneously manage several submaps. After locating the required device on your map, simply double-click on it to invoke the relevant management application.
3-2
Event Manager
This module serves as the management center for all events generated under the main EliteView program, Log Manager and Trap Manager. In response to input from these modules, the Event Manager can define and dispatch responses in various forms. Actions may range from sounding an audible signal, displaying an on-screen message, logging the event into the report window, running a user-specified program such as a beeper, fax, pager, email, etc. or logging the event into a database for later analysis.
Log Utilities
The Log Manager can collect the current value of SNMP MIB variables at a specified interval. A wide range of parameters on device status and network traffic can be sampled for selected nodes and stored in the database for long-term analysis. This information is displayed with the Log Database Manager in numeric form (including date, time and data).
GETTING STARTED
MIB Browser
This module is a generic SNMP management tool used to browse device MIBs. By browsing MIBs, you can send commands to get or set information defined in the MIB. Y ou can also set up profiles which are used to fetch or set selected MIB variables as a group.
Information to be recorded into the Log Manager can be selected directly from the MIB. Moreov er, the MIB Browser also provides a convenient editing tool which can be used to quickly extract information from the MIB and store it for future reference or prepare it as a technical report.
MIB Compiler
This application compiles textual MIB files into database files specifically formatted for EliteView , which allows relevant EliteView modules to access required information.
MIB-2 Viewer
This module provides an easy-to-use windowed interface to the MIB II (RFC 1213) management information database. MIB II is maintained by each device that includes a resident SNMP agent. The traditional approach displays information directly from the MIB , which requires a good understanding of the overall hierarchial tree structure to locate the variables you need. The MIB-2 Viewer, on the other hand, organizes this information in a set of commonly referenced items which are displayed in a convenient and easily understood format.
Name Database Manager
This module provides a convenient means to map an easily remembered mnemonic name to each device in the network. These names are then used in many other EliteView modules, which allows you to conveniently specify any network device or view data using the name associated with each device.
Report
This module displays any system events or user-defined events specified in the Event Manager. The Report window shows all network alarm messages in chronological order. Each entry is stamped with a time and date.
RMON Manager
Remote Network Monitoring allows you to instruct a remote device to collect information or respond to specified events on an independent basis. An RMON-capable device can independently perform a wide range of tasks, significantly reducing network management traffic. It can continuously run diagnostics and log network performance. If an event is triggered, the remote device can automatically notify the network administrator of a failure and provide historical information about the event. If the remote device cannot connect to the management agent, it will continue to perform any specified tasks and pass data back to the management station the next time it contacts the remote device.
3-3
GETTING STARTED
TFTP Server
This module is used to download agent software to the requesting device. It can be used to download software to any EZ Stack, TigerStack, and TigerSwitch management module. For all other SMC devices, downloading is performed via out-of-band mode. The TFTP server is also used to perform file transfers between any two stations running EliteView.
Trap Manager
Trap Manager has no tangible user interface. It is only used to pass events to the Event Manager. This module receives trap messages and converts them into events. By default, the
Trap Manager generates a “Trap” event and outputs a text message to the Event Manager according to the pattern specified in TRAP.INI. These events are then handled according to the options selected in the Event Manager.
Network Device Management Modules
Each of these modules supports advanced management functions for the corresponding device. On-line help is provided for each of these devices. EliteView currently includes device management modules for the EZ Stack, TigerStack and TigerSwitch series.

Data Logging and Event Management

The Log Manager and Event Manager modules play a key role in network management. The following diagrams depict how they work.
3-4
Log Data Manager
EliteView Application
Database
Filter
Log Manager
Threshold
send request
Trigger Event
get reply
network
GETTING STARTED
The Log Manager periodically sends requests to target devices according to a fixed polling interval. The target device receives the requests and send replies to the Log Manager.
The Log Manager then processes data in two different ways:
• Data passes through the filter you set; it may be saved in the database depending on the condition specified in the filter.
• Data is checked against a threshold formula. If conditions are satisfied, the Log Manager automati­cally triggers the event associated with the log process.
How the Event Manager Works
EliteView Application
trigger event
Event Manager
database management
Run Program
Action
Beep
Message Box
Display Message in Report Window
The Event Manager receives input from EliteView applications such as the main EliteView program, the Log Manager and the Trap Manager. Any named event may be triggered simply by satisfying the user-defined threshold formula. Any triggered event is passed on to the Event Manager, which activates the proper response, such as running a program, sounding an audible alarm, displaying a message on screen, displaying a message in the Report window, or writing to the event database.
3-5
GETTING STARTED

Starting EliteView

The main EliteView program provides an intuitive interface to other program modules. You can invoke specific management applications (by clicking on the appropriate device icon in the network map), verify current network connections with Discovery, check device response (via broadcast/search) with the Alive Test, or fetch information about selected devices using the MIB Browser.
Each module is closely integrated with the main EliteView program, and can be quickly invoked by selecting the required function from the Utilities menus. For certain device-specific applications, first select a target device from the network map and then select the required function from the Tools menu. The overall relationship between the main EliteView program and its submodules is depicted below.
Using the Main EliteView Program
To invoke the main EliteView program click on the EliteView icon. Many functions under the main program provide support for network mapping. These functions include most of the toolbar buttons, along with the File, Edit and Windows menus. Network mapping is described in the next chapter, Defining the Network Configuration. After you map out your network, you will want to use the other functions listed below.
EZ Stack 10
Alive Test
Bootp Server
TFTP Server
Discovery
Telnet
The menu items and tool buttons used on a regular basis are described below. The items used to construct and maintain your network map are described in the next chapter.
TigerStack II
EliteView
Platform
TigerSwitch 8
TigerSwitch 100
Log Manager
Log Database
Event Manager
Trap Manager
MIB Browser
MIB-2 Viewer
Report
3-6
Menu Label Description
(not shown here)
(not shown here)
GETTING STARTED
Tools Zoom - Opens the management module for the selected device.
Alive Test - Opens the Alive Test for the selected device. MIB Browser - Opens the MIB Browser for the selected device. MIB-2 Viewer - Opens the MIB-2 Viewer for the selected device. Telnet - Opens a connection to another computer on the network through
which you can execute programs or access data as though attached locally. RMON Manager - Provides access to to all nine RMON groups for recent SMC products that support RMON.
Window Cascade - Arranges all open EliteView windows in cacaded fashion.
Tile - Arranges all curretly open EliteView windows in tiled fashion. Arrange Icons - Arranges all EliteView icons on the screen.
select window - Switches to the selected EliteView window.
Utilities Accesses most EliteView modules. Options Change Settings - Allows you to define the default map, SNMP community,
polling interval, default timeout, default retries, and whether or not to save the desktop when EliteView is closed.
Change Password - Changes the password required to display the map. Map Information - Displays all user-defined parameters for each device
included in the current map. Search Object - Searches for a network device by address or label (the later of which must be defined in the network map).
Toolbar & Status Bar - toggle buttons to display or hide these items. Config Toolbar - Utility used to specify toolbar layout.
floating By clicking anywhere in the background of the EliteView program you can open
a menu that includes various functions relevant to the current module.
Many of the items included in the menu bar are also provided in the toolbar. The following table describes a few of the buttons found in the main EliteView program. The other buttons, which are used for creating network maps, are described in the following chapter.
Button Label Description
Shuts down the main EliteView program and all subordinate
Exit
modules.
About Displays the version number for this module. Help Provides on-line help for this module.
Configuring Polling Parameters
Before directly accessing devices from the network map, y ou should specify the default settings. These defaults are provided as a convenience for you, and are used by both the Add Object command and the device management modules. Open the Default Settings dialog box by selecting Change Settings from the Options menu. Set an SNMP
3-7
GETTING STARTED
community name and polling parameters which are applicable for your particular network environment. Depending on your current configuration, you may need to provide any of the following information.
1. Define a Community describing the administrative relationship between SNMP entities.
2. Specify Version; SNMPv1 or SNMPv2c.
3. Specify the Polling Interval between sending requests, the Default Timeout to wait for a response, and number of Default Retries to make contact. The settings displayed here (i.e., 5, 3, 3) should be suitable for most environments.
Status Bar
The Status Bar serves two basic functions. It displays the status of any currently executing command, and indicates the function of selected toolbar buttons. T o display the description for any toolbar button (in the status bar at the bottom of the screen), position your mouse over the toolbar button, and hold down the left mouse button. After viewing the description, slide your mouse off the interface button (without releasing the mouse button). Note that descriptions for toolbar buttons are also provided in relevant sections throughout this manual.
Configuring the Toolbar
The main program and other modules include an option that allows you to modify the toolbar layout to suit your specific needs. Simply drag the icons you want from the Available Tools list into the required position in the Tool Bar list.
Select any object from the Available Tools list on the left and drag it into position in the Tool Bar layout on the right.
3-8
CHAPTER 4

DEFINING THE NETWORK CONFIGURATION

Before running any EliteView device management tools, first define the device interconnection hierarchy, network addresses, and mnemonic names for each network node. If you don’t already have this information mapped out, then use Discovery to help identify each device in your network. This technique may also be used periodically to incorporate changes in the network configuration.
After identifying the basic network configuration, use the Name Database Manager to assign easily remembered names to each network device. And finally, in the last step, create a detailed network map including all intermediate network hierarchy and subordinate devices. This map can then be used to quickly open relevant device management tools by simply double-clicking on a map object.
All the tools and techniques required to define your network configuration are described in this chapter.

Quick Guide to Map Building

The simplest approach to creating a network map is listed below:
1. Use Discovery to locate network devices.
2. Move selected objects from Discovery onto the map by either of the following methods -
• Drag objects directly onto the appropriate map.
• Use the Get Objects command to fetch objects based on
protocol type from the queue of discovered devices.
3. Use the Add Object command to define additional symbolic ob­jects, such as a LAN Segment or Submap.
4. Draw in network connections using the toolbar in the EliteView Platform program.
5. Save your map under an appropriate filename.
Command Menu
Discovery Add Object(s) to
Name Database Get Objects Add Object Modify Object Draw Network
Connection Save Map As
Utilities
Edit Edit Edit
File
4-1
DEFINING THE NETWORK CONFIGURATION

Discovery

EliteView can automatically discover any device using a specified protocol (i.e., SNMP over UDP/IP or IPX) by polling within a specified network community or address range.
EliteView’s Discovery module sends commands out to the network and waits for responses. Devices are classified based on whether or not they have a resident SNMP agent. When a device responds, EliteView queries for SNMP functionality. If a device has no resident SNMP agent, EliteView adds a generic bitmap (to the window for discovered devices) based on protocol type. However, if a device has an agent then EliteView tries to identify the device type. If the device is recognized, it adds an object icon based on device type, otherwise it adds a generic bitmap to indicate that the object has an SNMP agent and to show the associated protocol type.
Using Discovery
Use Discovery to build your initial network map or to locate a specific device. After you have located the concerned devices, drag them onto a network map where they can be used to conveniently monitor your network.
You can select Discovery from the Utilities menu in the main EliteView program, or activate it by clicking on the Discovery icon in the EliteView program group. Specify the required protocol and then use Broadcast or Search to locate attached devices.
Using Discovery, EliteView can automatically identify responding devices and label them with the correct address (based on the selected protocol). This indicates the status of current network connections, and also serves to validate the accessiblity of devices for subsequent management. Once a device has been found, simply drag it onto a map and then initiate the relevant management module by clicking on the device icon.
When looking for devices using broadcast, you may need to press the Broadcast button several times to ensure that all attached devices have responded. For nodes that do not respond to broadcast queries, use the Search function. In general, it may be necessary to search for devices not located in the same network with the EliteView management station.
1) Select the appropriate network protocol.
2) Broadcast or Search for attached devices.
3) And drag key devices onto the
configuration map for later use.
4-2
DEFINING THE NETWORK CONFIGURATION
Menu Description
The menus provided for Discovery are briefly introduced below. Toolbar buttons are also described in this section.
Menu Definitions
Menu Label Description
File Exit current module - Closes the Discovery window and exits to the
calling program (i.e., EliteView platform or Windows Program Manager).
Protocol
Protocol selection and advanced settings
Select the devices to display based on network prototocol -
UDP/IP - IP & ICMP, SNMP over UDP/IP agent IPX - IPX, SNMP over IPX agent
Setup menu - Toggles display of devices without an SNMP agent; also
sets the scan rate and retry count.
Name Name database management - Provides editing functions for the
name database, including adding or modifiying object data. You can also dump all the information gathered by Discovery into the Name database.
Tools
Alive Test - The Alive Test is used to directly test device response.
Help Help and Version information - Provides detailed on-line help and
displays the version number for this software module.
To automatically discover devices:
1. From the Edit menu, choose Discovery.
2. Choose the appropriate network protocol.
3. If you need to change the search criteria for devices, open the Setup dialog box using the toolbar.
Field Description for Discovery Setup Menu
Field Description
Display IP Node Display IP Nodes without an SNMP agent. Display IPX Node Display IPX Nodes without an SNMP agent. Display Novell Server Display Novell Servers. Scan Rate The scan rate between broadcast requests. Retry The number of times to query for device response. Auto Set as default when Protocol changes
Save the current setup as default when restarting Discovery.
For TCP/IP Nodes -
1) Broadcast within same network.
2) Search for nodes across routers.
3) Many IP nodes without SNMP can respond to ICMP queries.
For IPX Nodes -
1) Broadcast is sufficient.
2) Search is not available.
3) NetWare Servers use IPX protocol.
4-3
DEFINING THE NETWORK CONFIGURATION
4. Click on Broadcast to transmit a query message and wait for responses from the local network. Broadcast is also adequate for gathering global responses from IPX or Ethernet nodes located on different networks.
However, to find IP nodes on other networks, use the Search command and provide a specific address range. If you are only interested in a specific range of stations or need to search for stations that are difficult to reach, then click on the Search button, specify the address range, and adjust the scan rate if required. Discovery will search for devices within the specified range.
5. The status line at the bottom of the Discovery window shows the status of the search. To temporarily halt the process, press the Pause button; press Resume to continue.
6. The message End of Search will appear when the discovery process is completed.
7. Move selected objects from Discovery onto the map by either of the following methods -
Drag objects directly onto the appropriate map.
Use the Get Objects command (under the Edit
menu) to fetch objects based on protocol type from the queue of discovered devices.
8. Draw in the existing connections and save the updated map. (Refer to Creating Network Maps for detailed information on building a network map.)
Adding Community Strings to Discovery
Insert access control string for authorised community members
Discovery will search for devices within the specified communities. To include any communities other than “public,” add the appropriate name to the Community dialog box. You can include all the communities defined for your network in a broadcast or search command. However, be aware that a blind search creates excess traffic. Using a more conservative search will have less impact on network performance.
To automatically discover devices in a community:
1. Click on Community to display a list of community strings.
2. To add or modify a community string, click on an entry in the list and edit the entry in the Edit field. Click OK to continue or Cancel to abandon the new entry.
3. Click on Broadcast to begin searching for devices.
4-4
Loading...
+ 149 hidden pages