Safety Guidelines To avoid potentially fatal shock hazard and possible damage to Raritan equipment: • Do not use a 2-wire power cord in any product configuration. • Test AC outlets at your computer and monitor for proper polarity and grounding. •...
IGURES Chapter 1: Introduction ... 1 Stand-alone Appliances...1 Distributed 2500 Series Appliances...1 CommandCenter Secure Gateway (CC-SG) ...1 User PC Preparation...2 Remote Authentication...2 Local Authentication ...2 Intended Audience...2 Features Described in this Document ...2 Terminology/Acronyms...3 Licensing Explained...6 Infrastructure...6 Server ...6 Workstation...7 Promoted Workstation ...7 Chapter 2: General and Advanced Administration ...
Page 6
Add/Modify a Notification Group ...79 Configure Notification Paths ...81 Add/Edit a Notification Path ...81 Configure TAP Paging...86 Add a new TAP Service ...87 Edit Modem Parameters ...88 Revert to Original Configuration ...88 Chapter 7: Managing Assets ... 89 Manage Assets ...89 Import Assets...89 Export Assets...91...
Page 7
IGURES Map Users ...101 Appendix A: Specifications ... 103 V1 Platform ...103 General Specifications ...103 Hardware Specifications ...103 Remote Connection ...103 Environmental Requirements...103 Electrical Specifications ...104 Appendix B: Troubleshooting ... 105 The Raritan Support Structure...105 The CC-NOC’s Ability to SSH to Raritan ...105 Checking Appliance Database Settings ...106 RAID Array Failure ...106 The CC-NOC Services ...106...
Page 8
viii Configuring a Windows 98/ME box for Remote WMI Management...129 Configuring a Windows Proxy Details ...130 Registry Changes [configuration]: ...131 Appendix E: Managing and Responding to Intrusion Detection Events ... 133 How the Intrusion Detection works ...133 Reducing False Positives with the Signature Profiler...133 Signature Profiler and the Rules Engine ...133 Responding to Events and Notifications ...134 Event Categories ...134...
INTRODUCTION Chapter 1: Introduction The primary function of a CommandCenter NOC (CC-NOC) is to manage nodes in your network. Nodes are discovered automatically if their IP address is within the managed range of addresses. In addition to network discovery, a CC-NOC also provides service management, a database of network information, a rules engine, a notification engine, and a web server.
Tasks that are available to users with a User or Executive User role are described in Raritan’s CommandCenter NOC User Guide, which describes tasks such as viewing intrusion detection events, window management events, etc.
HAPTER INTRODUCTION • Vulnerability Scanning • Event Viewing and Searching • Performance Monitoring per category or device • Integration with CC-SG where CC-SG is notified of events within the subscribed discovery range. • Scheduled Outages • User, Views, and Category Configuration •...
Page 16
Signature – a fingerprint of network traffic that signals an attack. • SMB – (Server Message Block) The communications protocol used by Windows-based operating systems to support sharing of resources across a network to discover systems. COMMANDCENTER NOC ADMINISTRATOR GUIDE 792.
Page 17
HAPTER INTRODUCTION • SSO – Single Sign-On. With Single Sign-on (SSO) access to CC-SG targets, CC-NOC users can connect to targets seamlessly, without having to sign onto CC-SG as long as remote authentication has been configured. • System Vulnerabilities – unpatched systems, older known vulnerable server daemons on your system that can be exploited by harmful network traffic.
You can transition a device with a Server license to any of the following licensed states: • Workstation • Infrastructure (if the device is a node) • Promoted Workstation • Unmanaged COMMANDCENTER NOC ADMINISTRATOR GUIDE SMTP Oracle LDAP Sybase MSExchange Informix Citrix SQLServer...
HAPTER INTRODUCTION Workstation A Workstation license can be assigned to any type of device, be it a Windows or non-Windows system. For example, a Linux box which is discovered as a node and which does not support any of the infrastructure services will be assigned a Workstation license. Similarly, a desktop Windows system will be assigned a Workstation license.
You can also shutdown and restart a CC-NOC while using a serial connection – see Raritan’s CommandCenter NOC Deployment Guide. While the CC-NOC is designed to be an appliance, it must store information about your environment in a local database. Thus, it should be treated with the same sensitivity as a database server.
Note: If you select Use NTP servers, you should install a NTP server in your environment. 8. Click save changes. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 2 Configure Date and Time...
This page allows you to change the fixed IP address associated with this appliance. This IP address was configured when setting up the initial configuration using a serial connection – see Raritan’s CommandCenter NOC Deployment Guide. The CC-NOC mimics the traffic generated by a user trying to access various services throughout the network.
If you do not provide a value here, a default will be used (root@localhost.com). 6. The admin email address specified in Admin Email Address should be the email address of the person in your organization who will be responsible for CC-NOC administration. This COMMANDCENTER NOC ADMINISTRATOR GUIDE...
HAPTER GENERAL AND ADVANCED ADMINISTRATION email address is a required field and will be used to send status information on the CC-NOC itself. 7. Clicking test SMTP settings sends a test email to the email address specified in the Admin Email Address field using the specified SMTP server.
To exclude a specific IP address, type the address in "Begin" and leave "End" blank. Click add to excludes to add it to the list. It is recommended to exclude DHCP ranges since they can change IP addresses, which can appear as false outages. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 7 Edit Discovery Ranges...
HAPTER GENERAL AND ADVANCED ADMINISTRATION Important! Ensure your discovery range is not too wide, for example, entering multiple Class B address ranges. This consumes large amounts of resources and may reduce the performance of CC-NOC. Also, it is recommended to keep the default “Automatically license and manage new devices discovered via the ranges and addresses listed below”...
1. Click on the Admin tab in the top navigation bar. 2. Click Network Management Configuration. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 8 Edit SNMP Ranges Figure 9 Defining SNMP Ranges...
HAPTER GENERAL AND ADVANCED ADMINISTRATION 3. Click Configure Schedule Outages. Figure 10 Configuring Scheduled Outages 4. Type a name for the scheduled outage and click add new scheduled outage. 5. Type a name for the scheduled outage. 6. Select a node label, that is, a DNS hostname or IP address, from the Included Node Label drop-down list and click add.
The Port column shows the ports at which the service will be polled. • This panel also allows the admin user to configure polling intervals, the timeout period between retries, and number of retries before an outage is declared. Adjusting polling COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 12 Configure Pollers...
HAPTER GENERAL AND ADVANCED ADMINISTRATION intervals (they were initially set at 5 minutes for a reason), timeouts and/or retries without proper planning or forethought runs the risk of: • Having the pollers get behind • Adding unreasonable amounts of network traffic in the environment •...
This can be corrected by either clicking the ‘Change Device Label’ link on the device page or the administrator of the “Unknown” device can assign a meaningful name to the sysName value. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 14 Device Totals...
HAPTER GENERAL AND ADVANCED ADMINISTRATION Configure Performance Thresholds This page displays the current values at which SNMP performance metrics are considered problematic and events are generated. You have complete control over these thresholds, including their value, their re-arm values, and the number of consecutive data samples, for example, "triggers"...
5. Using the check boxes, select the working days you wish to include in the report. 6. Click apply changes. 7. Click Outage Report in the right-hand side of the page to generate a report. Figure 17 Navigating to Outage Report COMMANDCENTER NOC ADMINISTRATOR GUIDE...
HAPTER GENERAL AND ADVANCED ADMINISTRATION SNMP Reparenting Exclusion List This page allows you to specify addresses that should be excluded from SNMP reparenting. This feature is useful if you have multi-interface SNMP devices that have identical IP addresses to other multi-interface devices. The most common example of this is if you are managing several routers that each act as gateways to separate private networks.
CC-SG appliance's user interface or to the CC-SG target itself if remote authentication has been configured. This link will also be present in the Notification Browser and while viewing individual notices. Figure 22 CommandCenter Secure Gateway in Notification Browser 8. Click save. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
HAPTER GENERAL AND ADVANCED ADMINISTRATION Create a CC-SG Peer via a Secure Channel After configuring the CC-SG with CC-NOC information, for example, specifying its IP address, and configuring CC-NOC with CC-SG information, you can create a secure channel between CC- SG and CC-NOC.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Important! To successfully connect, you must enter the passcodes in CC-NOC within five minutes after they are generated on CC-SG. This will minimize the window of opportunity for intruders to breach the system with a brute-force attack.
HAPTER GENERAL AND ADVANCED ADMINISTRATION Important! Configuring these mappings is required in order for remote authentication to work. Although you may have several CC-SG’s connected to this CC-NOC via a secure connection, only one can be the remote authentication and authorization source. If a user is mapped to a CC-NOC user role but they do not have appropriate permissions to view a channel on CC-SG as defined in the CC-SG’s user group’s policy, they will not be able to access the CC-SG target.
Raritan appliance you are sending the trap to. On this platform or appliance resides an SNMP agent that listens for the traps. This Host can be either an IP COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 29 Adding Event Recipients...
HAPTER GENERAL AND ADVANCED ADMINISTRATION address or a hostname that this appliance can resolve. Example: Protocol=Trap, Host= 192.168.51.150, Port=162. 8. Type protocol, host, and port for the Path Back URL which is the IP address or hostname of this CC-NOC. The Host entered is the web address that a user of the external event recipient can use to connect back to this appliance via a web browser.
Figure 33 Discover a Single Device 3. Enter either a NetBIOS name, a hostname, or an IP address. 4. Click discover. Note: If two devices have the same NetBIOS name, only one will be discovered. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 31 Configure Trap Relaying...
HAPTER GENERAL AND ADVANCED ADMINISTRATION Edit Performance Thresholds (Per Device) In addition to configuring performance values per category–see section Configure Performance Thresholds earlier in this chapter, you can also configure performance thresholds on a per-device basis. Per-device thresholds will override those set per category. Note: Performance thresholds can be configured on a per-device basis only for devices with Infrastructure, Server, or Promoted Workstation licenses.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Administrator Tools Administrator tools help you diagnose and fix problems with the CC-NOC. These tools allow you to backup configuration files, download logs, check the disk usage of your CC-NOC, and establish connections to Technical Support. Access administrator tools either from the Tools tab or from the Admin tab.
HAPTER GENERAL AND ADVANCED ADMINISTRATION 3. Click Check Disk Utilization on Appliance. Figure 37 Check Disk Utilization on Appliance The Disk Usage section lists the current free space percentages for different areas of the storage within the CC-NOC appliance. The disk storage inside this CC-NOC appliance is used to store logs of system activity, performance information for the devices that you are monitoring, and a database of collected management information that includes event and notification records.
COMMANDCENTER NOC ADMINISTRATOR GUIDE 4. Type a description of the problem you are experiencing in the text box. 5. Type an email address in Confirmation Email: so that when the incident report email is received, you will get a confirmation message.
HAPTER GENERAL AND ADVANCED ADMINISTRATION Download Data Archives Every 24 hours, the previous day’s events are placed into an event archival file and made accessible. Download this archival file or unzip it to access a comma-separated value (CSV) file, which can be opened with any spreadsheet application to view the events for that day. 1.
This option allows you to select which updates you want to install. The updates should have already been downloaded. 1. Click on the Admin tab in the top navigation bar. 2. Click Advanced Administration. 3. Click System Software & Signature Updates. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 42 System Updates Figure 43 Download Updates...
HAPTER GENERAL AND ADVANCED ADMINISTRATION 4. Click Install Updates. 5. Click install to install any of the updates that are listed. If an update is listed as downloading, it will be available for installation once it is fully downloaded. Check for new updates by accessing the Download Updates page –...
1. Click on the Admin tab in the top navigation bar. 2. Click Advanced Administration. 3. Click Browse: 4. Select the file to upload and click Open. 5. Click upload. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 47 View All Updates...
HAPTER GENERAL AND ADVANCED ADMINISTRATION Appliance Database Administration This page allows you to clean out unnecessary or unused information stored in the database, including node information, events, outages, etc. These operations are necessary if you would like to purge some of the data and start over with a clean database. You will not lose any management information if you recreate your database but the CC-NOC will need to stop its management services and web user interface while the database is unavailable.
The local network and loopback routes are not deletable. 1. Click on the Admin tab in the top navigation bar. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 49 Download Backup Files Figure 50 Install Backup Files...
HAPTER GENERAL AND ADVANCED ADMINISTRATION 2. Click Advanced Administration. 3. Click Manage Routes. 4. To delete a user-defined static route, click remove in the row of the unwanted route. 5. To change the default gateway route, revisit the Configure Network Connection page – see Configure Network Connection earlier in this chapter for additional information.
However, unlike resetting the appliance to a factory default that you can do while connected to a serial connection – see Raritan’s CommandCenter NOC Deployment Guide, this option keeps the current version of software, the license file, and the network settings of this appliance, for example, IP address.
This page allows you to upload a new license file to the CC-NOC. You were asked to do this during installation of the CC-NOC or when configuring the network – see Raritan’s CommandCenter NOC Deployment Guide). If you have not yet received the appliance license, please contact Technical Support.
3. To change the name or note associated with any given appliance, click the current name of the appliance to be redirected to a page where this change is possible. Note that this functionality is only available to the admin user. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 57 Installed Appliances List...
For 3Com switches, see the appropriate manuals for configuration of the "Roving Analysis Port". To ensure that the CC-NOC is passing packets correctly, you can view your network traffic – please see Raritan’s CommandCenter NOC User Guide for additional information on viewing network traffic. Ethernet TAP Instead of using a spanned or mirrored port, an Ethernet tap could be used that may be considered a more secure method in which to listen to network traffic than a spanned port.
All of the Intrusion Detection appliances that can communicate with this system are listed in the box. The Last Change field indicates the last time that the home network for the appliance was changed. Figure 59 Selecting an Intrusion Detection Appliance for Home Network Configuration COMMANDCENTER NOC ADMINISTRATOR GUIDE Router Ethernet TAP Managed...
HAPTER CONFIGURING INTRUSION DETECTION 4. Choose the appliance that you wish to configure by clicking Configure next to it. Figure 60 Configuring Home Network for Intrusion Detection Appliance 5. To include an entire subnet in your home network, use the Add Addresses box. Type in the network address and select the subnet mask from the list that is provided.
COMMANDCENTER NOC ADMINISTRATOR GUIDE All of the Intrusion Detection appliances that can communicate with this system are listed in the box. The Last Change field indicates the last time that the home network for the appliance was changed. Figure 61 Selecting an Intrusion Detection Appliance for Portscan Detection 4.
HAPTER CONFIGURING INTRUSION DETECTION Determining which ports are open on a target machine is often the first step towards a successful attack on a network system. Attackers generally use port scanning utilities to probe a target system and make a list of all open ports on the device. After they have this list, they will send specific attacks to the open ports with the hope of exploiting a vulnerability on the target.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Select Intrusion Detection Appliance(s) All of the Intrusion Detection appliances that can communicate with the system hosting this Web Console are listed in the Intrusion Detection Appliance box. The Last Configuration field indicates the last time that the detection scheme for the Intrusion Detection was changed or the last time that a security patch was used to update the signatures on the Intrusion Detection.
HAPTER CONFIGURING INTRUSION DETECTION Select Types of Signatures to Monitor When in doubt, enable detection. There is no disadvantage to enabling extra detection, except that you may receive extraneous events from your Intrusion Detection appliances. You should usually never disable detection of General Security on the Network. This category includes a variety of attacks that can affect any network, regardless of the devices and services on it.
3. Click Delete Performance Information. Figure 66 Deleting Intrusion Detection Performance Data 4. From the list or appliances, highlight the CC-NOC from the selection box and click delete. The intrusion detection performance data will be deleted and reset. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
HAPTER CONFIGURING INTRUSION DETECTION Advanced Intrusion Detection Administration Advanced administration assists in fine tuning the set of signatures that an intrusion detection application will use to detect intrusion traffic on the network. Manage Signatures The Manage Signatures page allows you to disable specific signatures on a per-appliance basis. This allows you to disable signatures that may produce false-positive alerts because of conditions on your network.
After you have uploaded new custom rules, it will take several minutes for the rules to be activated by the Intrusion Detection service. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING WINDOWS MANAGEMENT Chapter 4: Configuring Windows Management This chapter describes procedures to configure a CC-NOC so it can use Microsoft’s WMI (Windows Management Instrumentation) to monitor and manage Windows servers and workstations in your network. WMI information is collected from the Windows systems and is used to extract and report on inventory and event information.
250, or CC-NOC 2500N from the following URL: http://<Your_CommandCenter_NOC_IP>/public/cfgproxy.exe b) Remove legacy proxy settings, run the cfgproxy.exe program with the “uninstall” option: c:\> cfgproxy.exe -u 3. Download the newest proxy configuration program, http://<address_of_noc>/public/ProxyInstaller.zip COMMANDCENTER NOC ADMINISTRATOR GUIDE , from this location: ProxyInstaller...
CHAPTER CONFIGURING WINDOWS MANAGEMENT 4. Unzip the archive on your Windows machine and move the directory to a ProxyInstaller location where you would like to keep the program. For example, a good location could be: C:\Program Files\Raritan\ProxyInstaller 5. Double-click on ProxyInstaller.exe 6.
CommandCenter 2500N, in the navigation tab bar at the top click on the Admin tab, then CC-NOC 2500M Configuration. Click CommandCenter NOC 2500M Configuration Wizard or click configure next to the appliance you are currently configuring.
CHAPTER CONFIGURING WINDOWS MANAGEMENT 6. Type the IP address for the proxy host. This should be the same host that the configuration tool was run – see section Download and Run information. Note: Hostname values in this field must be resolvable via DNS or must be a numeric IP address. 7.
As a part of its systems discovery, the CC-NOC identifies target machines as members of a Workgroup, if applicable. For those machines, you may specify a local user on those machines to use for authentication purposes. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING WINDOWS MANAGEMENT Note: Any local user defined must be a member of the Local Administrators group to authenticate and allow data collection to occur. Trusted Domain-based authentication is used when the target machines are part of a domain other than the domain to be used for authentication, yet there exists a trust relationship between the two domains.
3. Click on the network interface that is connected to the external proxy, for example, Local Area Connection. 4. Click the Properties button. 5. Scroll down and select Internet Protocol (TCP/IP). Figure 76Selecting Internet Protocol (TCP/IP) for WINS Settings 6. Click the Properties button. 7. Click the Advanced button. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING WINDOWS MANAGEMENT 8. Click on the WINS tab. 9. Click the Add… button and specify the address of the WINS server for the remote appliance to use for Windows computer name resolution and click add. Command Line Interface Alternatively, you can issue this command on the command line interface: netsh interface...
1. Click on the Admin tab in the top navigation bar. 2. Click Windows Management Configuration. 3. Click Manage, Unmanage, or Rescan Devices. 4. Using the check boxes, select the devices in the list that you want to perform management operations on. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 79 Manage Devices...
CHAPTER CONFIGURING WINDOWS MANAGEMENT 5. Choose the desired operation, for example, change license type to Promoted Workstation. 6. Click submit. To generate an inventory report of the current list of devices, select an output format, for example, HTML or XML, and click generate report. XML can be used in Crystal Reports. Note: If an Infrastructure device, for example, Cisco router, is listed as Unknown, it means that the default sysName value of “Unknown”...
To edit WINS settings: 1. Click on the Admin tab in the top navigation bar. 2. Click CommandCenter NOC 2500M Configuration. 3. Select the CC-NOC 2500M appliance from the pull-down menu next to edit WINS settings. 4. Click edit WINS settings.
CC-NOC 2500M appliance and a WINS server is not available. 1. Click on the Admin tab in the top navigation bar. 2. Click CommandCenter NOC 2500M Configuration. Figure 83 CommandCenter NOC 2500M Options 3. Select the CC-NOC 2500M appliance from the pull-down menu next to edit LMHOSTS settings.
Page 80
5. Specify the IP address of each remote Windows server from which you wish to collect WMI data. 6. You can also delete all of the lmhosts settings for the appliance by clicking delete LMHOSTS file. 7. Click submit changes. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING VULNERABILITY SCANNING Chapter 5: Configuring Vulnerability Scanning This chapter describes procedures to configure a CC-NOC so it can scan for vulnerabilities, for example, exploits and thresholds against devices within your network. Scanning for vulnerabilities assists administrators in resolving security concerns. Vulnerability scanning finds system vulnerabilities, for example, unpatched systems, older known vulnerable server daemons, etc., that can be exploited by harmful network traffic.
This process can harm the target machine if the vulnerabilities are successfully exploited by the scanning process. It is not advisable to use this scan against mission-critical targets, regardless of OS or services that are running. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING VULNERABILITY SCANNING Scan Level 4 Scan Level 4 performs all checks of previous levels and also attempts exploits that are known to be directly harmful to target systems. These include vulnerabilities that can alter data on the target or bring down services or the operating system by using denial-of-service techniques.
6. Select one of the options to perform a one-time scan of the devices that were specified or set up a scan that repeats according to the frequency you specify. 7. Click schedule this vulnerability scan. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS Chapter 6: Configuring Notifications This chapter describes procedures to configure a CC-NOC so it can send and escalate notices through email, pagers, etc. if and when specific CC-NOC events occur. When important events are detected, users may receive a notice that is a descriptive message sent automatically to a pager, an email address, or both.
Clicking edit next to a notice follows the same steps, allowing you to edit information already defined for the notice. Clicking add new notice for this event also follows the same steps, but bypasses selecting an event type. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS Select Event Type The first step when adding or editing a notification is to select one event type to associate with the notification. Notice that if you are adding a new notice for an existing event, you will bypass this step.
Page 88
If it does not work in your browser, please consult the documentation provided by your browser vendor. Note: Choosing no services will include all services in this filter. To reset any TCP/IP address or services selected, click reset values. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS 8. If you do not wish to validate the rule or did not define an interface/service rule, click skip results validation to continue. Otherwise, click validate rule results to provide a visual representation of the rule just built and check that the TCP/IP address(es) and/or service(s) specified returned expected results.
Notice name. Configure Notification Groups In this section, you will create groups and assign users to them to identify a group of people that should receive certain types of notifications. Notification groups are used when defining a COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS notification path – please see section Configure Notification Paths later in this chapter for additional information. Note: To assign users to a group, the users must be pre-defined – please see section Add a New User in Chapter 8: Creating Users, Categories, Views for additional information. 1.
The ordering of the users in the group will affect the order that the users are notified if this group is used in a notification. 8. Click finish. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS Configure Notification Paths In this section, you will create notification paths that defines the users or groups who will receive notifications, how the notifications will be sent, for example, numeric or text pagers, email, and who to notify if escalation is needed. Notification paths are selected when configuring an event notification and should be created before configuring an event notification –...
5. Choose one of the target types for this notification path: • For User Target, select only one user and select one or more delivery methods for that user. Figure 102 Configuring a User Target in Notification Path COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS • For Group Target, select only one group as previously defined, please see section Configure Notification Groups earlier in this chapter for details, and specify an interval, that is, minutes, hour, or days, to indicate how long to wait before sending the notification to users in this group.
6. Choose one of the target types for this escalation notification: • For User Target, select only one user and select one or more delivery methods for that user. Figure 107 Configuring a User Target for Escalation in Notification Path COMMANDCENTER NOC ADMINISTRATOR GUIDE...
CHAPTER CONFIGURING NOTIFICATIONS • For Group Target, select only one group as previously defined, see section Configure Notification Groups earlier in this chapter for additional information, specify an interval, that is, minutes, hour, or days, to indicate how long to wait before sending the notification to users in this group.
NOC can use TAP services to send notifications as text messages to pagers. There are several steps to get this working properly. First, you need to attach a modem to the CC-NOC and to a phone line so that pager messages can be sent. Please contact Technical Support for a list of supported modem devices.
TAP services. Refer to your phone carrier for more information about TAP service availability and settings. These settings are necessary for the modem to dial out and connect to a TAP service. Fields that are required are marked with an asterisk.
Edit Modem Parameters In this step, you will set up the modem parameters. If your modem requires special parameters for initialization or dialing prefixes, such as dialing "9" to get an outside line, you’ll need to enter these parameters. These settings are necessary for the modem to initialize properly. All of the fields on this page are optional.
• Map Unassociated Assets to Nodes Note: Creating and listing assets is described in the CommandCenter NOC User Guide. Import Assets The second way in which to add or update asset data stored in the CC-NOC is to import a comma-separated value file (CSV) into the assets database.
Target Node field from being included in this listing. You will still be able to manually associate a node to any assets marked in this way via the asset's detail page. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 114 Importing assets...
7: M CHAPTER ANAGING SSETS Export Assets All the nodes with asset information can be exported to a comma-separated value file (CSV), which is suitable for use in a spreadsheet application. If you do an import into the CC-NOC with this CSV file, you will be asked to re-map all assets that were previously mapped to a node.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Clear All Asset Records This allows you to remove all asset records from the CC-NOC. Be sure to export the assets if you ever need to recover this data in the future. If you are rebuilding the asset records from an export via the CC-NOC, you will need to clear the asset table prior to re-importing.
8: C HAPTER REATING SERS ATEGORIES IEWS Chapter 8: Creating Users, Categories, Views This chapter describes procedures to add users, delete and modify users, build views, and create categories. Build your own custom way of looking at your network, called views, and then assign them to your users.
3. If you are changing the administrator password, click password next to the administrator account. 4. Click edit next to the user whose profile you wish to change. Figure 121 Creating/Editing a new user COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 120 Editing a User...
8: C HAPTER REATING SERS ATEGORIES 5. Supply a full name and enter comments. This is optional. 6. If desired, provide Executive User Constraints to provide an executive-level user access only to the specified category and appliance that is specified. This user will not be able to see information on nodes outside of the specified category or data collected by appliances other than the specified appliance.
Email Servers Internet Connectivity Network Interfaces Overall Service Availability Routers COMMANDCENTER NOC ADMINISTRATOR GUIDE Description Includes all managed interfaces which are running either DNS (name resolution) or DHCP servers. Includes all managed interfaces which are currently running PostgreSQL, Oracle, SQLserver, MySQL, Informix, or Sybase database servers.
8: C HAPTER REATING SERS ATEGORIES Web Servers Categories can then be combined into views, providing you the ability to focus users on the nodes that are pertinent to their role. You have the ability to create, modify, and delete categories and the filters that populate them.
Page 110
Note: Choosing no services will include all services in this filter. To reset any TCP/IP address or services selected, click reset values. 8. Click save. 9. After saving the category, restart the CC-NOC. COMMANDCENTER NOC ADMINISTRATOR GUIDE Explanation Matches two specific addresses. Matches 192.168.0.1, 192.168.1.1, 192.168.2.1, etc.
8: C HAPTER REATING SERS ATEGORIES Configure Views Configuring views allows you to create a mapping between users and views, or sets of categories, they will see when logging into the CC-NOC. Views are simply the combination of categories that your users will see when logging in. When configuring views, you have the ability to create new views, assign views to specific users, using map users, or set the default views used by the web interface, as well as the default view used by the reporting subsystem.
4. You can add a section by clicking add section to create a new grouping of categories. A view can comprise of one or more sections. This is optional. 5. Click finish to save your changes. COMMANDCENTER NOC ADMINISTRATOR GUIDE Figure 127 Add/Modify Views...
8: C HAPTER REATING SERS ATEGORIES IEWS Map Users After creating views, you can now map users to a view that will be displayed after they log into the CC-NOC. If users are not mapped to a specific view, then the Default view that was selected in section Configure Views will be displayed.
KVM Admin Port Serial Admin Port Console Port Hardware Specifications Processor Memory Network Interfaces Hard Disk & Controller CD/ROM Drive Remote Connection Modem Protocols Warranty Environmental Requirements Humidity Altitude Vibration Shock 24.21”x 19.09” x 1.75” 615mm x 485mm x 44mm 23.80lb (10.80kg) Single Supply (1 x 300 watt) 10℃- 35℃...
Maximum DC Power Output Maximum AC Power Consumption Maximum Heat Dissipation Volt-Ampere Rating COMMANDCENTER NOC ADMINISTRATOR GUIDE PERATING -40 - +60 (-40 -140 ) 5% - 95% RH Operate properly at any altitude between 0 to 10,000 feet, storage 40,000 feet (Estimated) 5-55-5 HZ, 0.38mm,1 minutes per cycle;...
APPENDIX B TROUBLESHOOTING Appendix B: Troubleshooting Raritan wants to be involved from the beginning of your deployment and throughout the entire lifetime of your use of Raritan products. We have identified the following as the three pillars on which the success of your deployment rests: •...
ECHO (Code 8) and ECHO REPLY (Code 0) capabilities. You must allow both of these to pass between your CC-NOC and managed devices in order for discovery to recognize the node and generate the suspect node event. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
APPENDIX B TROUBLESHOOTING Capability Scanning The capability scanning service scans individual nodes to discover which services are supported on that node. It uses an intelligent service discovery mechanism and relies heavily upon communication over the TCP protocol (and sometimes UDP). In its initial state, the capability scanning service waits and listens for suspect node events.
COMMANDCENTER NOC ADMINISTRATOR GUIDE The notifications service does not generate any events; it only reacts to them. It does, however, save its history in the database so that you can review past notifications. SNMP Data Collection The SNMP data collection service collects additional data from nodes that support SNMP. Just like the pollers, the SNMP data collection service runs every five minutes by default.
APPENDIX B TROUBLESHOOTING Your Network Understanding and maintaining your network is the key to success. The Raritan services will help you understand and troubleshoot your network, as it relates to the CC-NOC. This chapter, however, is about troubleshooting the CC-NOC. Raritan Support Structure Before troubleshooting anything else, you should always make sure that your basic connectivity to the Raritan support structure is available should you need to utilize it.
TCP and provide more accurate capabilities profiling. During an intelligent services scan, it will test the device for each of the services supported by your CC-NOC. A list of the supported services can found by clicking on COMMANDCENTER NOC ADMINISTRATOR GUIDE...
APPENDIX B TROUBLESHOOTING the Admin tab, Network Management, and Configure Pollers. For each service that responds during the intelligent service scan, the system will generate a “Node Gained Service” event. The text of this event will look like the following: The X service has been discovered on interface WWW.XXX.YYY.ZZZ Typically, this will also be the signal to the Pollers that they should begin polling this new service for availability.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Why Can’t My CC-NOC Manage X Service? ICMP - If a device responds to a "ping", which uses ICMP for its transport, the device will be flagged as supporting ICMP and will be tested for ICMP availability on the standard polling interval.
APPENDIX B TROUBLESHOOTING If a service successfully connects, but otherwise "fails", a "service unresponsive" event is generated. An example of this would be a poller sends a TCP connect request… and gets a connecting, but within the “timeout” period there is no response. Thus, the Service is “up”, but it is not performing up to an adequate level.
SNMP version 1, which is the most commonly seen version deployed today, supports five basic transactions: • • • GET RESPONSE • GET NEXT, and • TRAP COMMANDCENTER NOC ADMINISTRATOR GUIDE for any default notifications sent to the...
APPENDIX B TROUBLESHOOTING Of these five, Raritan only uses three: • GET - A message sent from the Manager to the Agent requesting information • GET RESPONSE – The message the Agent sends to the Manager in reply to a GET transaction, and •...
UDP services on your nodes. As a basic test, you should make certain that you could connect to the open services on the device before initiating a scan. This will at least verify that you can route COMMANDCENTER NOC ADMINISTRATOR GUIDE...
APPENDIX B TROUBLESHOOTING from the CC-NOC to the device and that TCP and UDP are working. If you have already performed the troubleshooting steps for Pollers and Capability Scanning on the node in question, you have adequately tested this. If you are having trouble with vulnerability scanning, try the troubleshooting steps below: 1.
Our documentation is available from the CC-NOC, under the Help tab, and is also available on http://www.raritan.com/support. How do I get Help? • See the Raritan web site for more information • If you are an end-user, please contact your reseller. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 131
APPENDIX B TROUBLESHOOTING • If you are a reseller seeking technical resources, please send an email to tech@raritan.com. • For technical support, call the number as stated in the front of this document. Note that Technical Support is intended to provide resellers and customers with technical assistance if necessary.
APPENDIX C PERFORMANCE MONITORING Appendix C: Performance Monitoring Overview The CC-NOC is designed to provide you with the information necessary to support critical decisions in your environment. Depending on your role, the nature of those decisions may be different, from a help desk technician analyzing memory usage on a CC-NOC to determine if upgrades are appropriate, to a network designer using router buffer failures in support of better sizing decisions in equipment acquisition.
Page 134
Any device supporting MIB2 (RF 1213) Linux or Unix variants running Net-SNMP Microsoft Windows Novell NetWare COMMANDCENTER NOC ADMINISTRATOR GUIDE Metric(s) Relevance In/Out Octets Provides basic information on the network traffic that In/Out Discards an interface has In/Out Errors transmitted/received.
Page 135
APPENDIX C PERFORMANCE MONITORING Checkpoint Firewall products Lotus (IBM) Domino/Notes Servers Compaq Insight Agent State information This information is critical for the firewall stored Process Contexts administrator making Allocated storage sizing or upgrade CPU Utilization decisions on firewalls. A Packets accepted device that must maintain Packets rejected both high network speed...
Memory Available bytes Percent Free Physical Memory Percent Free Logical Memory Total Physical Memory Physical Memory In Percent Physical COMMANDCENTER NOC ADMINISTRATOR GUIDE CPU Utilization Provides insight as to router Free Memory performance, Buffer failures especially as Buffer memory augmented by MIB2 data.
APPENDIX C PERFORMANCE MONITORING Memory In Use Free Physical Memory Total Logical Memory Logical Memory In Use Percent Logical Memory In Use Free Logical Memory Memory Pages per Second Processor (CPU) Total Processor Time Processor Queue Length Interrupts per Second Network Network Utilization Bytes Sent per Second...
COMMANDCENTER NOC ADMINISTRATOR GUIDE on demand. The remaining item is determining when performance metrics have reached a point at which they should be acted upon. And with the CC-NOC’s capability of managing performance thresholds, that’s easy too! Thresholding An exciting new feature significantly improved with the CC-NOC is threshold alerts. This allows the CC-NOC to notify you of potential problems pro-actively, before they occur, based on performance metrics gathered by the CC-NOC through SNMP and WMI.
APPENDIX C PERFORMANCE MONITORING Example Here’s an example. There is a high threshold set with a value of 70, a trigger of 3, and a rearm of 55. A new value is generated every minute. The first reported value is 65, which is less than our high threshold of 70, so no action is taken.
COMMANDCENTER NOC ADMINISTRATOR GUIDE Windows Performance Metric Thresholds The following values apply to data reported by Windows boxes. Note that there are separate events for Workstations and Servers – this is due to what data points Microsoft reveals. The event associated with a reported value violating a threshold is “High Threshold Exceeded”...
APPENDIX D SETTING UP WMI ON TARGET MACHINES Appendix D: Setting up WMI on Target Machines Configuring a Windows 98/ME box for Remote WMI Management The ability of the CC-NOC to manage Windows 98 and Windows ME systems is limited by the design of the Windows platform.
COM server and making it available to the network. To do this, a system must be prepared. The preparations are relatively simple and only involve modifications to the system registry for either a Windows 2k Pro or XP Pro system. COMMANDCENTER NOC ADMINISTRATOR GUIDE...
APPENDIX D SETTING UP WMI ON TARGET MACHINES Note: Using Windows 98/ME, XP Home, or any NT 4.0 system is not recommended or supported as a proxy system. Additionally, although Servers are supported, it is not advisable to utilize them as your proxy due to error logging issues.
APPENDIX E MANAGING AND RESPONDING TO INTRUSION DETECTION EVENTS Appendix Managing Responding Intrusion Detection Events This appendix is intended to provide a little insight as to how Raritan goes about assessing the traffic that the CC-NOC sees, determining what constitutes an event, and in turn, what that event should mean to you.
CC-NOC: • Does this event mean that traffic is coming through my firewall that shouldn’t be? Can I further refine my firewall configuration to disallow this type of traffic? What about traffic to/from this source/destination address? COMMANDCENTER NOC ADMINISTRATOR GUIDE...
APPENDIX E MANAGING AND RESPONDING TO INTRUSION DETECTION EVENTS • Are all of your systems at the most recent revision of operating system and patch • level? Patches and hot-fixes are extremely important for Microsoft platforms. • Have my network platforms been upgraded to avoid unnecessary risks? SNMP, if •...
APPENDIX F NOTIFICATION PARAMETERS Appendix F: Notification Parameters Notification Parameter Substitution The notification subsystem is very robust and flexible, allowing the appropriate notification of the appropriate personnel at the appropriate time. One feature you have control over is the content of the notification message. You can include any text, and use parameter substitution to fill in values the CC-NOC knows.
APPENDIX G NETWORK TRAFFIC OVERHEAD NETWORK MANAGEMENT Appendix G: Network Traffic Overhead: Network Management’s Necessary Evil On five-minute intervals, the CC-NOC polls services on managed nodes using Raritan's 'synthetic transactions'. These transactions serve to better test the service's availability, as they actually exercise the service, as opposed to simply “pinging”...
Because the type of data and number of data points collected varies by host type, the following describes a "typical" host, specifically, a Linux host from which we collect ten metrics for the COMMANDCENTER NOC ADMINISTRATOR GUIDE 74 bytes (592 bits)
Page 153
APPENDIX G NETWORK TRAFFIC OVERHEAD NETWORK MANAGEMENT host, and an additional five metrics per managed interface. The host used in this example has two interfaces, so the results reflect metrics for a second interface as well as the de facto first interface. The traffic generated by the data collection process, in this case: SNMPv2c GETBULK Requests:...
COMMANDCENTER NOC ADMINISTRATOR GUIDE In addition to polling overhead, our services scan will run less than once a day and generate traffic roughly equivalent to a single polling interval. If vulnerability scanning is enabled, the CC-NOC will also generate the traffic associated with completing those tests. Benchmarks as to those tests are not currently available.
Page 155
’ APPENDIX G NETWORK TRAFFIC OVERHEAD NETWORK MANAGEMENT S NECESSARY EVIL 255-80-5301-00...
Need help?
Do you have a question about the COMMANDCENTER NOC and is the answer not in the manual?
Questions and answers