Professional Documents
Culture Documents
Centralized Manager
User Guide
Software Version 7.1
Support
Typographical conventions 2
CONTENTS
Textual conventions 3
Chapter 1 Introduction 5
Features 7
Overview 10
Hardware Installation 13
Connecting Power 14
Connecting to a Network 15
Default Settings 18
Set IP 38
Install a License 41
New Subnet 44
Cluster 45
Periodic Discovery 52
Faults Tab 57
Administration Tab 58
Dashboard Tab 59
Right-click a Node 63
Primary IP Address 72
FTP Server 72
Database Settings 73
High Availability 77
Geographic Maps 82
Inventory 83
Overview 86
Filters 160
Options 165
Section contents:
Note icons and messages 2
Typographical conventions 2
Textual conventions 3
Typographical conventions
The following table describes the typographical conventions used in this document.
Convention Description
Textual conventions
The following table describes the typographical conventions used in this document.
Convention Description
Boolean text Words that represent Boolean notation are written in all uppercase text.
For example: 1010 OR 1100.
Keystrokes Simultaneous keystrokes are shown by joining the key names with a plus
sign (+).
For example, CTRL+Q.
In this chapter:
IFC Centralized Manager Overview 6
Features 7
IFC Centralized Manager's technology automates the discovery process to identify supported devices
throughout the network. After deployment, IFC Centralized Manager continuously checks device status
for changes or if equipment has been removal or taken offline. IFC Centralized Manager supports
geographical mapping of all supported devices, whether they are up or down and instantly displays the
status of all supported devices (that is, up or down). You can simply click on a device's icon to drill
down for more details on its status and configurations.
Features
Key features of IFC Centralized Manager are:
l Device Discovery
Not only does the IFC Centralized Manager's discovery process quickly identify supported
devices, it also continuously monitors the status of devices that are present in the topology tree.
A dynamic network topology map instantly displays each supported device as up, down or faulty.
l Centralized Management
Use IFC Centralized Manager to configure and monitor a variety of devices, including xStream 40
and xStream 10, Director Pro, Director, iBypass 40-10, iBypass VHD, iTap appliances, NTO (Net
Tool Optimizer) appliances, GTP Session controllers, and TradeView devices.
IFC Centralized Manager can support xStream 40 and 10 devices (running on xStream 6.7.2)
configured with IPv6 addresses.
l Traffic and Statistics Visualization
IFC Centralized Manager gathers data in real-time and archives it in a database for historical
trend analysis. It then presents it in rich graphical formats through the interface.
l Browser Support
IFC Centralized Manager's client interface is supported on Internet Explorer, Firefox, Safari and
Chrome.
l Centralized Auditing and User Management
All user actions are inspected and audited against a permissions profile and logged to an audit
trail.
l Bulk Operations
To configure multiple devices, IFC Centralized Manager can automatically run a variety of user-
defined scripts on a list of devices of the same type to upgrade all the devices simultaneously.
l IPv4 and IPv6 Support
IFC Centralized Manager supports IPv4 and IPv6 addressing.
l Reporting
Data can be exported to CSV formatted files for report creation.
l Alert and Fault Management
IFC Centralized Manager collects event messages and generates alerts. Users can identify
threshold-triggered events and take action.
l VMware Tools
In IFC Centralized Manager 5.0+, VMware Tools are bundled into the product.
The IFC Centralized Manager hardware appliance comprises a third party device with the IFC
Centralized Manager Management Server software installed. When the device is physically connected
to the network, the IFC Centralized Manager Management platform software will be able to perform the
variety of management functions for the devices it is managing. The device itself is standardized to fit
on a 19" rack and occupies 1U of space.
The IFC Centralized Manager virtual appliance is the Management Server software packaged for
deployment on a virtual machine.
For either product, you can deploy IFC Centralized Manager to manage as many devices as your
resources and your license will enable.
Available Products
The following table lists the available IFC Centralized Manager models:
Support Matrix
Use IFC Centralized Manager to configure and monitor a variety of Ixia and 3rd-party appliances,
including view statistics, events and alarms. In addition, use IFC Centralized Manager to run policies,
configure ports and perform system upgrades for all devices. Refer to Support Matrices for a complete
matrix of the supported features of all Ixia devices.
In this chapter:
Overview 10
Hardware Installation 13
Connecting Power 14
Connecting to a Network 15
Overview
This section provides an overview of the IFC Centralized Manager hardware appliance and the
installation instructions for the device.
The following table describes the features of the IFC Centralized Manager front panel (from left to
right):
Field Description
Video Port Located behind the front bezel, use this port to connect a video monitor. Optional.
Power LED This LED illuminates whenever the unit receives power from one of the two power
sources.
Reset An alarm sounds whenever the power cord is removed from the appliance. Click this
button button to reset the power alarm.
The following table describes the features of the IFC Centralized Manager rear panel:
Field Description
Power Use these ports to connect to power supplies. Plug redundant power supplies into
supplies independent power sources for maximum reliability.
Management Use this RJ-45 port to connect to a LAN switch connected to the network.
port (Eth0)
Console port Use this RJ-45 port to directly connect a computer to the appliance to configure the
appliance's management IP address.
USB ports (3) Use these ports to connect external devices, such as a keyboard and external
drives.
Eth1-3 (RJ45) Three RJ-45 ports are reserved for future use.
ports
Specifications Description
Weight 22 lbs.
Hardware Installation
This section describes how to install the IFC Centralized Manager hardware appliance.
Installation Planning
Before installing the IFC Centralized Manager hardware device, ensure there is a suitable location in
the equipment rack. For power redundancy, locate two independent power sources within the reach of
the device.
Autorange input:
47-63 Hz
Input:
+12V / 62.0A
+12VSB / 2.1A
You can download the User Guide and Release Notes from the Ixia Customer Portal.
Check the packing slip against parts received. If any component is missing or damaged, or have
questions, please contact our Order Management department via email at Order-
Management@ixiacom.com or if this is a Demo unit, contact Demo@ixiacom.com.
Do the following to install the IFC Centralized Manager device into a standard 19" rack:
1. Attach the rear outer rails to the outside of the front outer rails. Align the pins with the slides.
Both rails ends must face the same direction. Adjust the outer rails to the proper distance so that
the rails fit snugly into the rack.
2. Secure the front outer rails to the front rack posts using the supplied screws and washers on each
side.
3. Secure the rear outer rails to the rear rack posts using the supplied screws and washers on each
side.
4. Slide the IFC Centralized Manager appliance into the rack by aligning the inner rails with the
outer rails and pushing the appliance in until the locking tabs click into position.
5. Insert and tighten the thumbscrews that hold the front of the appliance to the rack.
6. Ground the appliance to the rack by connecting a ground wire to the ground connection on the
rear of the appliance.
7. Terminate the other end of the ground wire to the rack ground bus bar.
Connecting Power
The next step after rack mounting the device is to connect power to the device.
Connect power to the IFC Centralized Manager
device using the power cords shipped with the device.
One AC power cord is sufficient power for the device. You can connect both power cords to provide
power redundancy. Just make sure the two cords are connected to independent power sources.
Redundant Power
There are two, independent power supplies within IFC Centralized Manager. The main power supply
powers the unit, while the other is on standby until the main power supply fails. If the main power
supply fails; the other power supply immediately supplies power to the unit. The switch between the
two power supplies is seamless and does not interrupt normal operation of IFC Centralized Manager.
Connecting to a Network
Use the Management port on the rear panel to connect IFC Centralized Manager to the network. If the
Management port is isolated on a management VLAN, ensure that IFC Centralized Manager's network
port has a path to that VLAN. Do the following to connect IFC Centralized Manager to the network:
1. Connect a CAT5 cable to the Management port (eth0) RJ45 port on the rear of the appliance.
2. Connect the other end of the cable to a LAN switch connected to the network.
After rack mounting and applying power to the device, you can log in using the default address.
Important! You need Java 7 (or higher) installed on your PC before you can launch IFC
Centralized Manager.
The system comes with a third-party web based tool, WebMin, for system management of IFC
Centralized Manager. You will need this tool to change the IP address, as well as setting up a firewall.
In this chapter:
Default Settings 18
Default Settings
IFC Centralized Manager includes the following preset default settings:
In order to configure the IFC Centralized Manager device's IP address, you have two options. You can:
l Log in through the console and use the CLI to configure the IP by editing the configuration file
l Bring up the Webmin tool, log in, and set the new IP address.
1. Connect a keyboard to one of the USB ports and connect a monitor to the VGA port.
2. Turn on the monitor. A login prompt appears.
3. Type in root for the username and admin for the password.
4. After you have logged in, type ip addr at the prompt. This shows you what the current
configuration might look like.
Example ip addr output
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
6. Use your favorite editor to edit the IPADDR, NETMASK, DNS and GATEWAY values.
7. Save your changes.
8. Restart the network service with /etc/init.d/network restart
9. Check that the settings are correct with ip addr.
1. On the IFC Centralized Manager, connect an Ethernet cable from a PC to the eth0 port on the
appliance.
2. Configure the PC with an IP address that is on the same subnet as IFC Centralized Manager.
3. On the PC, open a browser.
4. Type https://10.71.10.200:10000 into the URL of the browser window.
The Webmin tool login page appears.
Webmin Login
Network Interfaces
Take note of your new IP and gateway address. Now click the Apply Configuration button on the
Network Configuration screen to incorporate all of the changes.
UDP port 2000 (ProPush statistics) TCP port 44532 (HA Indigo port)
ICMP
Do the following:
Note: Make sure the used web browser does not block pop-ups that are displayed
automatically, in order to avoid interferences during the update process (if required, disable the
pop-up blocker).
1. Download the latest IFC Centralized Manager image (.img) from the Ixia Customer Portal to your
PC.
2. Launch IFC Centralized Manager and log in.
3. Select Help > Update IFC Centralized Manager.
4. Click Browse and navigate to the folder where you downloaded the IFC Centralized Manager .img
image file.
5. Select the image file and click Open. Confirm that the name of the file that appears in the field is
correct.
6. Click Upload.
7. Once the file has successfully uploaded, the Confirm box appears. Click OK. The system will
install the newly uploaded version and reboot the device.
8. A message appears stating that the connection to the server was lost. Click OK.
9. Relaunch and log in to IFC Centralized Manager.
10. Select Help > About to confirm that the upgrade was successful.
12. You will need to type in some responses before the installation can proceed.
Unpacking JRE ...
Preparing JRE ...
Starting Installer ...
This will install IFC Centralized Manager Management Platform on your
computer.
OK [o, Enter], Cancel [c]
A previous installation has been detected. Do you wish to update that
installation?
Yes, update the existing installation [1, Enter]
No, install into a different directory [2]
Which components should be installed?
1: Server
2: Client
3: Database Restore
Please enter a comma-separated list of the selected values or [Enter]
for the default selection:
[1,2,3]
/opt/netoptics/security.config.backup
The file already exists.
Would you like Setup to overwrite it?
Yes [y], Yes to All [ya], No [n], No to All [na]
ya
Uninstalling previous version
Extracting files ...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc2.d/S99indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc2.d/K01indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc3.d/S99indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc3.d/K01indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc4.d/S99indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc4.d/K01indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc5.d/S99indigo_pro_server...
Executing:ln -s /opt/netoptics/indigo_pro_server
/etc/rc5.d/K01indigo_pro_server...
Executing:/opt/netoptics/os_patches/centos/apply_all.sh...
Executing:/opt/netoptics/installer_scripts/configure_systemd.sh...
-bash-4.2#
l 4 CPUs
l 8 GB RAM
l 200 GB HDD
In this chapter:
Installing the IFC Centralized Manager Virtual Appliance on VMware 30
Set IP 38
1. Download from the Ixia Customer Portal, IFC Centralized Manager's .ova file to your local PC.
2. Open the VirtualBox VM where you want to install the IFC Centralized Manager Virtual Appliance.
3. Click File > Import Appliance.
4. Click Browse and navigate to the IFC Centralized Manager .ova file and click Open.
5. Confirm the file and click Continue.
6. Confirm your appliance settings and click Import.
After the import has finished, the VirtualBox Manager displays the virtual machine and the IFC
Centralized Manager appliance.
7. Select the IFC Centralized Manager appliance on the left panel.
8. Scroll down to Network on the right panel, and click on Network.
9. Configure Adapter 1 appropriately and Cable Connected check-boxes have been checked.
10. Still in the dialog box, click OK.
11. In the VM VirtualBox Manager window, click to power on the Virtual Machine.
12. Click to power on the Indigo_Pro.
13. Click Applications > System Tools > Terminal .
14. At the prompt, type in ip addr.
15. Look for the IP address for this instance.
This is the IP to use to launch the IFC Centralized Manager client.
4. Click Browse and select the .qcow2 IFC Centralized Manager file. Click Forward.
5. Configure the allocated RAM and CPU settings to be the same as for the ova and click Forward.
6. Set the name for the VM, select the Customize configuration before install check box and
select Bridged network adapter. Click Finish.
7. From Configuration Customization menu, set the NIC device model to e1000 and click Apply,
then click Begin Installation.
8. In a few seconds, the IFC Centralized Manager VM is deployed and starts to boot.
Set IP
Follow the procedure described in Chapter 3 on how to set the IP.
By now, you have already installed IFC Centralized Manager and established its IP address.
The Client requires Java. Therefore, make sure that you have Java loaded on your PC.
To open a copy of the client on your PC, enter the IP address of the IFC Centralized Manager instance
into a Java-enabled browser, such as Internet Explorer, Firefox or Safari. The IFC Centralized Manager
launch page appears. Click the Launch button.
The IFC Centralized Manager ships a copy of the client to your PC and displays the login dialog box.
Log in, then the client program opens. From here, you establish what devices you want to manage and
monitor.
In this chapter:
Logging Into IFC Centralized Manager Client 40
Install a License 41
1. Enter the IP address of IFC Centralized Manager instance, https://<IP address> into your
browser's address bar.
Enter either the default IP address of 10.71.0.200 or the IP you configured using Webmin (see
previous chapter). The Launch page appears.
6. Click on the Click here to view the Terms and Conditions link to read the End User License
Agreement the first time.
7. Type admin for both the username and password the first time.
8. Click the More>> button to make sure the IP address is correct, and port is 443.
9. Click Login to enter IFC Centralized Manager. It is recommended that you change the admin
account password after you log in.
10. A message may appear asking to update the license. Select Help > License and confirm that the
license is correct. If not, install the correct license.
Install a License
Starting with Indigo Pro 5.7.5, Java UI licensing is no longer supported.
When clicking Help > License in Java UI, you are informed to use the WebUI application for licensing
(operations and details).
Also, a URL is displayed in the dialog box, in order to redirect you to use the web application.
In this chapter:
New Subnet Group 44
New Subnet 44
Cluster 45
Periodic Discovery 52
1. Click the Network Control tab to open the topology tree pane.
2. Right-click in the Topology tree pane and select New Subnet Group.
New Subnet
A subnet organizes devices within a subnet group within the Topology tree. Users designate a subnet
as a destination for any discovered device. A subnet can either be added as a stand-alone object or
within a subnet group.
1. Click the Network Control tab to open the topology tree pane.
2. To create a stand-alone subnet, right-click the topology tree pane and select New Subnet. To
add a subnet to a subnet group, right-click the subnet group and select New Subnet.
Cluster
Users can group multiple discovered devices of the same type to a cluster. Clustered devices are
easier to manage because users can apply a single policy for all devices in a single cluster.
Prior to discovering a device, users must know the IP address, SNMP version (v1/v2/v3), and SNMP
community string for v1/2C or username/password authentication for V3. Users can configure more
than one set of SNMP credentials to run discovery.
To discover a device configured with an IPv6 address, you must use the Discover Specific Devices
steps.
Note: IFC Centralized Manager only supports the xStream device (running 6.7.2) configured
with IPv6 currently.
Note: Having too many SNMP credentials can cause the discover time to increase significantly.
In addition, reducing the discovery SNMP timeout greatly speeds up discovery.
1. In the Topology Tree, select a subnet or subnet group as a destination for discovered devices.
2. Select the Discovery tab from the Network Control view.
3. From the Discovery tab, click New.
4. Enter the IP Range or Subnet in the Discovery Range section and or subnet.
5. In Network Settings, select the SNMP v1/v2c Settings tab.
6. Click New in the SNMP v1/2 tab.
The warning message lists the address overlaps. Click the OK button and edit the IP address range to
eliminate the overlap.
Periodic Discovery
IFC Centralized Manager periodically rescans all specified ranges and subnets, so that the network
topology tree is always up to date with devices that have been added or removed. If desired, adjust
the Periodic Discovery parameters to control when device discovery automatically runs to update the
network topology tree. Scanning may have a slight impact on network performance, so most
organizations rescan their networks only a few times or even once per day. Scanning values range
between 5 to 168 hours.
3. Enter a date when to start the scan in the Next Start At field.
4. Enter the number of hours at which to run the discovery in the Run Every (hours) field. If you
enter 5, it will run every 5 hours.
5. Click Apply to make the periodic discovery parameters active.
6. Click the Refresh button to restore the current settings to the display. Discovery cycles can be
configured between 5 to 168 hours.
In this chapter:
IFC Centralized Manager Client 54
Faults Tab 57
Administration Tab 58
Dashboard Tab 59
l Network Control
l Faults, Events and Alarms
l Administration of System Settings and Configurations
n Access Control
n Audit Trail
n Northbound Interface
n Email
n Events Configuration
n Server Settings
n Database Settings
n Geographical Maps
n Third Party Discovery
n Performance Settings
n Management Interfaces
l Dashboard Controls
The IFC Centralized Manager client features four tabs: Network Clients, Faults, Administration, and
Dashboard. Each view is highly customizable. Users can experiment with the features to create a
customized client layout.
The following table describes the IFC Centralized Manager client's main areas:
Feature Description
Tool Bar Includes five pull-down menus to use to select a variety of options.
Task Selection This menu provides several options that can be used for system
Menu configuration.
Task Selection Pane This pane changes when an item is selected from the Task Selection menu.
Feature Description
Topology Tree A topology tree is available on the Network Control Pane. Use this tree to add
subnets and devices.
Resizable panes Panes can be resized by clicking a border and dragging it in or out.
Window Menu
The Window menu on the top tool bar allows a user to load, save or rest the current layout. The
following table describes the options of the Window menu:
Feature Description
Load Default Layout Select this to load the default layout view.
Load Custom Layout Select this to load any saved layout view.
Save as Default Layout Select this to save the current layout view as the default setting.
Save as Custom Layout Select this to save the current layout view as a custom setting.
Reset Layout Select this to reset the current layout to the default view.
Most panes and the tabs in the Network Control pane (Inventory, Discovery, Scheduled Tasks, and
device statistics and view), can be repositioned or detached and turned into independent windows that
can be moved anywhere on the computer's desktop.
The following table describes the features of the Network Control tab:
Feature Description
Find by Use this option to search for a device in the topology tree by name, serial number or
ip address.
Geographical Click this button to either open the Geographical map pane or launch the Show
Map Network in Google Earth dialog.
Feature Description
Inventory Click this button to select a variety of inventory options, including devices, third-
party devices, ports, and assets.
Devices view Click this button open the device view pane of the discovered device.
Policies Click this button open the policy and script pane.
Faults Tab
Click on the Faults tab to access the Alarms and Events pane. From this view, click the Events or
Alarms tab to view separate details of events and alarms.
Feature Description
Administration Tab
Click the Administration tab to configure IFC Centralized Manager settings. From this view, users can
choose several categories from the tree view, which opens a pane to change a variety of system
configuration.
Feature Description
Access Allows administrators to configure user information, including system password and
Control user authentication.
Audit Trail Displays a record of who has accessed IFC Centralized Manager and any operations
that was performed during a given a specific period.
Events Allows users to configure how the system handles events, traps, and alarms that
Configuration effect IFC Centralized Manager and any other managed interface.
Third Party Allows users to discover and add any third party devices.
Discovery
Management Allows users to configure a variety of system management settings, including SSH,
Interfaces CLI, NETCONF, and Web API.
Dashboard Tab
The dashboard can be used to consolidate views from multiple discovered devices. Click on the
Dashboard tab to create a customized view of statistical reports using graphs and charts. Refer to
"Customize Dashboard View" on page 138.
Dashboard Features
Feature Description
Chart Click one of the chart view icons in the upper-right corner to display a view of one, four,
view or nine reports. By default, four reports are displayed.
icons
In this chapter:
Topology Tree Overview 62
Right-click a Node 63
A device can have one of the following indicators on the topology tree:
Parameter Description
Right-click a Node
Right-click each node in the topology tree to select an option. Each node has a different option. The
following subsection describes the options that appear when you right-click a node.
Right-clicking a Folder
The following items appear when a user right-clicks a folder.
Right-click a Folder
Feature Description
New Select this option to create a new subnet group. Refer to "New Subnet Group" on page
Subnet 25 for more information on creating a subnet group.
Group
New Select this option to create a new subnet. Refer to "New Subnet" on page 26 for more
Subnet information on creating a subnet.
Right-clicking a Subnet
The following items appear when a user right-clicks a subnet:
Right-click a Subnet
Feature Description
New Select this option to add a new cluster. Refer to "Cluster" on page 27 for more
Cluster information on creating a cluster.
Lock Select this option to lock this resource to a specific user or profile. Refer to "Lock Access
Resource to a Resource" on page 130 for more information on locking a resource.
Right-clicking a Cluster
The following items appear when a user right-clicks a Cluster:
Right-click a Cluster
Feature Description
Refresh Select this option to refresh the cluster, which is done automatically once every 30
seconds.
Run Policy Select this option to run a previously configured policy. Refer to "Add Policy" on
page 124 for more information on policies.
Feature Description
Show Select this option to display statistics. Refer to "Show Statistics" on page 135 for
Statistics more information on statistics.
ICMP Ping Select this option to send an ICMP ping to a discovered device. Refer to "ICMP Ping
from the Top Menu" on page 127 for more information on ICMP ping.
Feature Description
SNMP Ping Select this option to send an SNMP ping to a discovered device. Refer to"SNMP Ping
from the Top Menu" on page 128 for more information on SNMP ping.
Traceroute Select this option to trace a route to a discovered device. Refer to "Traceroute from
the Top Menu" on page 130 for more information on Traceroute.
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Select this option to refresh the device, which is done automatically once every 30
seconds. However, if a device's configuration has changed, this option will force a
refresh.
Device View Select this option to open the view of the front and rear panel of a discovered
Director.
Lock Select this option to lock this resource to a specific user or profile. Refer to "Lock
Resource Access to a Resource" on page 130 for more information on locking a resource.
Filters Select this option to launch the filters dialog to create a variety of different filters.
Add to Select this option to launch a dialog that will add a device to a logical object called
Cluster cluster.
Open Web UI Select this option to open the Web UI of the discovered Director.
Run Policy Select this option to run a previously configured policy. Refer to "Add Policy" on
page 124 for more information on policies.
Feature Description
Show Select this option to display statistics. Refer to "Show Statistics" on page 135 for
Statistics more information on statistics.
Feature Description
ICMP Ping Select this option to send an ICMP ping to a discovered device. Refer to "ICMP Ping
from the Top Menu" on page 127 for more information on ICMP ping.
SNMP Ping Select this option to send an SNMP ping to a discovered device. Refer to"SNMP Ping
from the Top Menu" on page 128 for more information on SNMP ping.
Traceroute Select this option to trace a route to a discovered device. Refer to "Traceroute from
the Top Menu" on page 130 for more information on Traceroute.
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Select this option to refresh the device, which is done automatically once every 30
seconds. However, if a device's configuration has changed, this option will force a
refresh.
Device View Select this option to open the view of the front and rear panel of a discovered xFamily
Device.
Lock Select this option to lock this resource to a specific user or profile. Refer to "Lock
Resource Access to a Resource" on page 130 for more information on locking a resource.
Filters Select this option to launch the filters dialog to create a variety of different filters.
Add to Select this option to launch a dialog that will add a device to a logical object called
Cluster cluster.
Open Web Select this option to open the Web UI of the discovered xFamily Device.
UI
Run Policy Select this option to run a previously configured policy. Refer to "Add Policy" on page
124 for more information on policies.
Right-clicking an NTO
The following options appear when a user right-clicks a discovered NTO (Net Tool Optimizer):
Right-click an NTO
Feature Description
Show Select this option to display statistics. Refer to "Show Statistics" on page 135 for
Statistics more information on statistics.
ICMP Ping Select this option to send an ICMP ping to a discovered device. Refer to "ICMP Ping
from the Top Menu" on page 127 for more information on ICMP ping.
SNMP Ping Select this option to send an SNMP ping to a discovered device. Refer to"SNMP Ping
from the Top Menu" on page 128 for more information on SNMP ping.
Traceroute Select this option to trace a route to a discovered device. Refer to "Traceroute from
the Top Menu" on page 130 for more information on Traceroute.
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Select this option to refresh a device, which is done automatically once every 30
seconds. However, if a device's configuration has changed (ports renamed/filters
added), this option will force a refresh.
Add to Select this option to launch a dialog that will to add an NTO to a logical object called
Cluster cluster.
Open Select this option to open a console interface into the device.
Console
Feature Description
ICMP Ping Select this option to send an ICMP ping to a discovered device. Refer to "ICMP Ping
from the Top Menu" on page 127 for more information on ICMP ping.
SNMP Ping Select this option to send an SNMP ping to a discovered device. Refer to"SNMP Ping
from the Top Menu" on page 128 for more information on SNMP ping.
Traceroute Select this option to trace a route to a discovered device. Refer to "Traceroute from
the Top Menu" on page 130 for more information on Traceroute.
Feature Description
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Select this option to refresh a device, which is done automatically once every 30
seconds. However, if a device's configuration has changed (ports renamed/filters
added), this option will force a refresh.
Add to Select this option to launch a dialog that will to add an TradeView object to a logical
Cluster object called cluster.
Open Web Select this option to open the Web UI of the discovered device.
UI
Run Policy Select this option to run a previously configured policy. Refer to "Add Policy" on page
124 for more information on policies.
Feature Description
Show Select this option to display statistics. Refer to "Show Statistics" on page 135 for
Statistics more information on statistics.
ICMP Ping Select this option to send an ICMP ping to a discovered device. Refer to "ICMP Ping
from the Top Menu" on page 127 for more information on ICMP ping.
SNMP Ping Select this option to send an SNMP ping to a discovered device. Refer to"SNMP Ping
from the Top Menu" on page 128 for more information on SNMP ping.
Traceroute Select this option to trace a route to a discovered device. Refer to "Traceroute from
the Top Menu" on page 130 for more information on Traceroute.
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Feature Description
Refresh Select this option to refresh a device, which is done automatically once every 30
seconds. However, if a device's configuration has changed (ports renamed/filters
added), this option will force a refresh.
Device View Select this option to open the view of the front and rear panel of a discovered iTap
Device.
Lock Select this option to lock this resource to a specific user or profile. Refer to "Lock
Resource Access to a Resource" on page 130 for more information on locking a resource.
Add to Select this option to launch a dialog that will to add an iTap device to a logical object
Cluster called cluster.
Open Web Select this option to open the Web UI of the discovered device.
UI
Open SSH Select this option to open an SSH client interface. iBypass only.
Client
Run Policy Select this option to run a previously configured policy. Refer to "Add Policy" on page
124 for more information on policies. iBypass only.
In this chapter:
Primary IP Address 72
FTP Server 72
Database Settings 73
High Availability 77
Geographic Maps 82
Inventory 83
Primary IP Address
The IFC Centralized Manager server can host software images, which then can be used to upgrade any
discovered managed device. If IFC Centralized Manager has more than one network interface, use the
Primary IP address field to select the network interface that will have connectivity with managed
devices.
FTP Server
An FTP server is required when scheduling certain tasks. For example, users will use an FTP transfer to
upgrade the software image. Use either the FTP server integrated in IFC Centralized Manager (Internal
FTP) or an external FTP server.
Database Settings
IFC Centralized Manager uses a database to store collected information and traffic statistics. This can
be useful for backup and restore purposes. The database is preinstalled and configured in IFC
Centralized Manager.
IFC Centralized Manager offers four management interfaces: CLI, SSH, NETCONF, Web API of a
discovered node. A node may support a subset or all of these interfaces. CLI allows IFC Centralized
Manager access to the discovered devices both locally and remotely (over SSH.
You can use NETCONF to access only the xStream family devices. You can use the Web API to access
the NTO devices with exception.
The configurations will apply to all newly discovered devices unless otherwise configured on the device
itself.
General Settings
The General settings on the Management Interfaces displays the IP address of the discovered device.
Users can add a note about the device in this dialog.
SNMP Settings
The SNMP settings on the Management Interfaces displays the SNMP settings of the discovered
device. Users can change these settings if these settings are changed on the device.
SSH Settings
The SSH settings on the Management Interfaces allows users to configure SSH and CLI settings. User
can use these settings to remotely access the discovered device.
NETCONF Settings
The NETCONF settings on the Management Interfaces allows users to configure NETCONF settings.
These settings must match the parameters set on the device in order to view that device.
High Availability
HA Overview
High Availability (HA), also called Redundancy, in IFC Centralized Manager requires two servers. One
server will be configured as the master unit and the second server will be configured as the slave unit.
You, the user, will decide upon installation, which server you will designate as the Master server and
which server is the Slave server. After the installation is completed, the Master is the Active server
and the Slave server is the Backup.
The Active server continually polls the network health, statuses and statistics and provides access to
the clients, while the Backup server monitors the health of the Active server. When/if the Master
server fails, the Slave server becomes the Active server.
The HA functions on IFC Centralized Manager servers whether they are device based or installed in a
virtual environment. The two servers can be both device based, both servers can be virtual, or one
server is device and the other one is virtual.
Active Server
At the start, and in general, the Master server is the Active server, while the Slave server is the
Backup server. When the Master server 'fails', then the Slave server becomes the Active server.
When configuring HA, your will be configuring HA on the Active server. The good news is that you do
not have to configure anything on the Backup (Slave) server. The configuration on the Active server
will replicate onto the Slave server and both servers will be restarted.
The job of the Active server is to continually poll the network's health, provide statuses and statistics,
in addition to providing access to the clients. The Active server is responsible for keeping the
databases on both servers in sync.
In addition to the IP addresses that are given to the servers, you must assign a floating IP address that
the Active server takes on. This is how to keep the clients sanity in check when the activity could
bounce between two different devices IP addresses.
Slave Server
At the start, and in general, the Slave server is the Backup server. When the Active Server is not
available, then the Slave server gives itself the task of being the Active server.
The job of the Slave server is to continually monitor the health of the Active server. When the Master
server fails, the Slave server becomes the Active server.
Monitor Daemon
The Monitor Daemon is started on both the Master and Slave servers and it serves two purposes:
l Checks the IFC Centralized Manager server process periodically (5 seconds) and restarts it
if/when it is down.
l Releases the NMS IP from the interface/device in case of a switchover.
Database Replication
The Master is responsible for database replication. Whenever there is a database update action (for
example, insert, update, delete, store procedure call), the Master sends the update to the Slave using
a secure connection that is backed by a blocking queue. Once received, the Slave updates its
database.
If the Slave server is unreachable, the Master server will write the executed queries to a file (found in
/sync/backup.sql) with a 10MB default maximum size.
If the file limitation is exceeded (the Slave is down for a long time – where "long" is derived from the
network size and activity) the file is deleted and a full sync required flag is raised.
When the Slave reconnects, and the full sync flag is not raised, the backup.sql file created by the
Master is zipped (backup_<IP>.zip) and sent to the Slave server to run. During this operation, all new
queries are stored in the queue, if the queue is exhausted and the file sync is not completed the full
sync flag is raised and the system will proceed to full sync.
When the Slave reconnects and the full sync flag is raised the Full Sync procedure will start.
l Real time, constant updates, in a successful redundancy setup where all the queries on the
Master server are duplicated on the Slave server
l Partial backup – when Slave server is down for a short time and the Master server is storing the
queries in the backup.sql file – during recovery the Master archives the file and sends it to the
Slave.
l Full sync
Full Sync
When the Full sync flag has been raised, the Active server raises the “Full sync active” flag and creates
a full backup of the DB.
Upon complete, it notifies the Recovering server of the backup file name and the Recovering server
pulls the file from the Active server.
The Recovering server will then recover its database. Upon completion, the Recovering Server will
notify the Active server.
During full sync, the Active will store any new queries in files.
l After initial redundancy configuration on the Slave and IFC Centralized Manager server restarts
l When Slave is down for a long time and the Master has a full sync flag raised (the file limitation
was exceeded)
Switchover is transparent. After a switchover, the new Master continues to poll the other peer IP
address to see whether it is up and running. If so it starts a full sync, so the both peers databases are
in sync and all the data is replicated. After redundancy is enabled, users should use the floating IP
address every time they log into the IFC Centralized Manager client.
Redundancy Configuration
The following is a summary of the configuration details for Redundancy:
l The Master and the Slave servers are installed on different machines.
l The Master and the Slave have their own database instance.
l The Master server sends the replication data to the Slave server.
l The Slave server monitors the Master server for connectivity (ping) and service status (by
logging in as a user)
l IP 1 is the IP of the Master server.
l IP 2 is the IP of the Slave server.
l IP 3 is the floating IP address (NMS IP).
l All 3 IP addresses should be on the same subnet for the redundancy setup to be functional.
l Before switchover, the network interface of the Master server is configured with both IP
addresses.
l After switchover the Slave server will add the floating IP address to its network interface.
Note: Before configuring a redundancy setup make sure that the firewalls on both servers are
updated for ports 44523 and 56789!
HA Redundancy Configuration
Do the following to configure redundancy:
3. Uncheck the Disable redundancy mode check box. This is checked by default.
4. In the Peer Address field, enter the IP address of the peer IFC Centralized Manager device.
5. In the Authentication field, enter an authentication username and password of the peer device.
The same user should exist on this unit, too. It should have the Admin profile, also. It is
recommended to use the predefined admin user and if the default password is changed the same
password should be set on both peers.
6. In the Connection Settings field, enter a floating IP address. It should be in the same network
as the previously configured peers.
7. Set the floating Netmask address. It should reflect the subnet the peers are in.
8. After HA is configured, use the floating IP address to open the client UI.
9. Also in the Connection Settings field, enter the retry attempts and timeout value that the two
devices will use for heartbeat communication. A retry attempt is the number of times the
heartbeat attempts to connect to the Master unit until it determines the Master is down.
10. Click Apply to apply the configuration.
11. A message appears stating that both peers will be restarted. Click Yes.
12. After successfully configuring redundancy, network connectivity goes down on both the Master
and Slave units. This is by design. Simply re-launch the Client from the browser using the floating
IP address. Click OK.
Geographic Maps
A geographical map can be attached to each node of the network topology tree. This map displays the
location of a node and any device under a node. A map can be a map derived from a source, such as
Google/Yahoo map, a floor plan of a building, a logical network topology diagram, or any selected
image.
1. Click Tools > Show Network in Google Earth to launch the Google Earth dialog.
2. If Google Earth is not installed, click Download Google Earth to install it locally.
3. Click the ellipsis button and browse to the folder where Google Earth is installed.
4. Select the exact location of the googleearth.exe executable file. In most cases, this file is
located in the Client folder.
5. Click OK. Google Earth launches in a separate window.
1. Drag an icon from the right-hand pane and place it on the map image.
2. After placing the nodes on the map, click the Save icon (located on the lower-portion the map) to
save the placement location. If not saved, the icon returns to the right pane as soon as the user
moves from the window.
Inventory
Use the Inventory option to view the discovered devices. Devices appear in the order that they were
discovered and are displayed by name and version number. Right-click any device to view the
available options for each device.
l To print a list, click the Print button in the lower left corner of the pane
l To save a list as a CSV file, click the Export to CSV button in the lower left corner of the pane.
In this chapter:
Overview 86
Overview
IFC Centralized Manager can manage a number of different Ixia and third-party devices to provide a
range of system configuration options. In addition, managing a device provides complete visibility and
control over data traversing a device. In most cases, IFC Centralized Manager allows users to bring up
and down system ports, set system parameters, set management interfaces, and schedule software
upgrades for multiple devices.
Note: Refer to the "Appendix A. Support Matrix" on page 173 for a complete list of supported
devices.
l iLink Agg xStream: This appliance provides link aggregation. It offers 10G traffic to 1G
appliances, and 1G traffic to 10G tools.
l Director xStream: This appliance provides traffic filtering, aggregation, regeneration and static
load balancing.
l Load Balancing: This appliance provides load balancing. It allows users to distribute traffic to
multiple monitoring tools, which provides sharing the load caused by high traffic volumes.
1. Make sure to configure NETCONF support for the device. Refer to "Management Interfaces
Settings" on page 50 to view the Management Interfaces settings.
2. Right-click an xStream device and select Device View.
The actual device appears in the middle of the display.
Port Tab
From the Ports tab, users can view and modify the device's port settings. Do the following to edit a
port:
Settings Tab
The Settings tab displays the name, contact, and addressing of the xStream family device.
2. Select the first type of port from the Port A pull-down menu.
3. Select the second type of port from the Port B pull-down menu.
4. Enter a recover value. Values can be from 10 to 90 seconds.
5. Click OK.
The configuration appears in the Link Fault Detect view.
Heartbeat Tab
The Heartbeat tab appears only on the xBalancer device view. A heartbeat check monitors the health
of any inline monitoring device by transmitting small Heartbeat packets at regular intervals out both of
the ports connected to the IPS. The IPS is expected to pass the packets through to the other port. If
xBalancer does not receive the returning Heartbeat packets within a Heartbeat interval, and after a
specified number of retries, the IPS is considered down and a load balancer using the IPS redistributes
the traffic to the rest of the up IPSs. xBalancer continues to issue Heartbeat packets to the IPS, and as
soon as a single returning Heartbeat packet is received, the IPS is considered up in that direction of
traffic flow.
Set the Heartbeat interval and retry count. If the Heartbeat packet is not detected on the return port by
the end of the interval, it is considered lost. Since retries 1, a single lost packet constitutes a failure
and the IPS is considered down. To read more about how to change the contents of the Heartbeat
packet, consult the xStream user guide.
View xStream 40
Do the following to view a discovered xStream 40 appliance:
Port Tab
From the Ports tab, users can view and modify the device's port settings. Do the following to edit a
port:
Settings Tab
The Settings tab displays the name, contact, and addressing of the xStream 40 device. Do the
following to edit a device setting:
2. Select the first type of port from the Port A pull-down menu.
3. Select the second type of port from the Port B pull-down menu.
4. Enter a recover value.
Values can be from 10 to 90 seconds.
5. Click OK.
The configuration appears in the Link Fault Detect view.
Heartbeat Tab
A heartbeat check monitors the health of any inline monitoring device by transmitting small Heartbeat
packets at regular intervals out both of the ports connected to the IPS. The IPS is expected to pass the
packets through to the other port. If xBalancer does not receive the returning Heartbeat packets within
a Heartbeat interval, and after a specified number of retries, the IPS is considered down and a load
balancer using the IPS redistributes the traffic to the rest of the up IPSs. xBalancer continues to issue
Heartbeat packets to the IPS, and as soon as a single returning Heartbeat packet is received, the IPS
is considered up in that direction of traffic flow.
Set the Heartbeat interval and retry count. If the Heartbeat packet is not detected on the return port by
the end of the interval, it is considered lost. Since retries 1, a single lost packet constitutes a failure
and the IPS is considered down. To read more about how to change the contents of the Heartbeat
packet, consult the xStream user guide.
Timestamp Tab
The timestamping feature is available on all xStream 40 appliances. When xStream timestamping is
enabled, the system records the time a packet enters the device and appends a timestamp to the end
of that packet. Do the following to configure load balancing:
1. Click the Timestamp tab.
2. Click the Add button.
5. Enter a spare device. Leave the default value of none if there is no spare device.
6. Select a load balancing type, including either Normal or Extended.
7. Check the MPLS check box to enable MPLS load balancing.
8. Click OK.
Port Tab
From the Ports tab, users can view and modify the device's port settings. Do the following to edit a
port:
Settings Tab
The Settings tab displays the name, contact, and addressing of the Director device.
In addition, users can check to enable CRC, LFD and Jumbo frames.
4. Click Apply.
Syslog Tab
The Syslog Server tab allows users to configure a syslog server. To forward log messages to a remote
syslog servers, enter the IP addresses of the remote syslog servers. Users can forward log messages to
up to six remote syslog servers by entering the IP addresses of the remote servers. Set the verbosity
and the severity of log messages to be sent to the remote syslog servers, use the Log Level drop-
down menu. Default log level, Notice, includes the entire message types listed. Levels listed higher
on the selection list include more severe system messages: Emerg, Alert, Critical , Error, and
Warning. The Information level is for certain informational system log messages. The Debug level
generates extensive operational messages that might be helpful for troubleshooting.
2. Select the server type as LOCAL, RADIUS or TACACS+ from the Type menu.
3. Enter the password required to access the server in Password field.
4. Enter the IP address of the AAA server.
5. Enter the port number of the server in the Port field.
6. Set the maximum allowable login period by selecting the number of minutes, in the range of 1 to
10 minutes, from the Time Out drop-down list.
7. From the Retries drop-down list set the maximum number of allowable login retries before the
server locks out a user.
8. Select Enabled or Disabled for Admin.
9. Set the access privilege for the server from the Default Privilege list as admin, user, or view.
10. Select the User Level Includes drop-down list values from 0 to 9.
11. Selecting the Lowest Numbers drop-down list admin or view.
12. Click Add at the bottom of the page. A new server appears in the AAA Servers tab.
Port Tab
From the Ports tab, users can view and modify the device's port settings.
Settings Tab
The Settings tab displays the name, contact, and addressing of the iBypass device.
Discover NTO
Ixia's Net Tool Optimizer® (NTO) portfolio of network monitoring switches, also known as an network
packet broker (NPB), provides visibility into physical and virtual networks, improves network security
and optimizes monitoring tool performance.
Each NTO provides complete visibility by intelligently connecting a data center or service provider
network with monitoring tools to aggregate, filter, load balance and de-duplicate network traffic. Unlike
other NPBs, the NTO's patented filtering and de-duplication technology ensures each monitoring tool
gets the right data needed for analysis and it's powered by the easiest to use, drag-and-drop
Management Interfaces in the industry.
The following table describes the options that can be performed on an NTO:
Feature Description
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Refreshes device data in the Topology tree, including name, ports, stats, and state.
Add to Select this option to launch a dialog that adds an NTO to a logical object called
Cluster cluster.
Open Select this option to open a user interface (console) into the NTO device.
Console
Open Console
Use the Open Console feature to launch the Web UI of the NTO device. Do the following to open a
console to an NTO appliance.
Discover TradeView
The Ixia TradeView 1000 appliance delivers high-performance monitoring of market data feeds. This
need stems from the fact that market data transport is primarily based around the use of multicast,
which does not have any error correcting mechanisms at the network layer. This means that packets
that contain key trade data that have been lost cannot be detected until they are passed through a
feed handler system at the end-user site.
The TradeView 1000 can instantly detect multicast gaps or micro bursts and has the capacity to decode
up to 1000 simultaneous multicast channels and analyze up to 60 million trade messages per second
across up to four 10 Gbps communication links or LAN segments, simultaneously.
The following table describes the options that can be performed on a TradeView 1000:
Feature Description
ICMP Ping Select this option to send an ICMP ping to the TradeView 1000.
SNMP Ping Select this option to send an SNMP ping to the TradeView 1000.
Management Select this option to launch the Management Interfaces dialog. This dialog contains
Interfaces management details of a discovered device. Refer to "Management Interfaces
Dialog" on page 51 for more information on this dialog.
Refresh Refreshes device data in the Topology tree, including name, ports, stats, and state.
Add to Select this option to launch a dialog that adds a TradeView 1000 to a logical object
Cluster called cluster.
Open Web Select this option to open the Web UI of the discovered device.
UI
Feature Description
In this chapter:
Scheduled Task Page 108
The following table describes the options that can be performed from the Scheduled Tasks page:
Feature Description
Toggle Click this button to detach the report from the main view.
floating
Toggle auto- Click this button to hide the report on the top-menu bar.
hide
Task List This view displays the created tasks. This field displays:
l Name: Displays the name of the task.
l Type: Displays the task type.
l Description: Describes the task.
l Start at: Displays when a task starts.
l Last Completed: Displays the last time a task completed.
l Repetition: Displays when a task will run again.
l Status: Displays the status of a task.
Feature Description
Add Task Click this button to launch a dialog where you will be able to create a scheduled
task.
Clone Select a task and click this button to clone (duplicate) a scheduled task. The Clone
task window appears. The cloned task contains "Copy of" in the Name field. You
can change the name here.
Edit Select a task and click this button to edit a scheduled task.
Remove Select a task and click this button to remove a scheduled task.
Run Now Select a task and click this button to run a scheduled task immediately.
Retry Failed Click this button to retry a scheduled task that failed.
Task Targets
Abort Task Click this button to stop a task that is currently running.
Last Execution This list displays the targeted devices and the operation status of each task.
log of selected
tasks
Software Upgrade
Use the software upgrade task to upgrade several devices of the same type simultaneously. Users can
upgrade the following devices:
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file. The
Customer Portal is password protected. Make sure to have the username/password beforehand.
2. Save the upgrade file to the /opt/netoptics/res/home/netoptics folder. This is the FTP
Server root folder. This step is mandatory for internal FTP servers. Otherwise, save the image on
a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured. By default, the internal server is disabled.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select Director Pro and Director Software Upgrade. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog and click Next.
10. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the /opt/netoptics/res/home/netoptics folder. This is the FTP
Server root folder. This step is mandatory for internal FTP servers. Otherwise, save the image on
a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select iTap Software Upgrade. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog.
10. Check the whether to upgrade the software only, or upgrade and then activate the software file.
12. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
13. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the desired FTP/SFTP server. If using FTP, use
/opt/netoptics/res/home/netoptics folder in case the Internal FTP is used (this is the FTP
server root folder). Otherwise, save the image on a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Select the FTP mode: Active or Passive (default) into the FTP Server Selection dialog.
10. Check if you want to erase the system configuration during upgrade. This disabled by default.
11. Select ftp or sftp protocol from the drop-down (sftp protocol is available on xStream 6.6 and
above).
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the /opt/netoptics/res/home/netoptics folder. This is the FTP
Server root folder. This step is mandatory for internal FTP servers. Otherwise, save the image on
a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog.
10. Check the whether to upgrade the software only, or upgrade and then activate the software file.
11. Click Next.
12. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
13. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the /opt/netoptics/res/home/netoptics folder. This is the FTP
Server root folder. This step is mandatory for internal FTP servers. Otherwise, save the image on
a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select iBypass Software Upgrade. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required HTTP information into the HTTP Server Selection dialog.
10. Enter the filename. Click Browse to select the file.
12. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
13. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the /opt/netoptics/res/home/netoptics folder. This is the FTP
Server root folder. This step is mandatory for internal FTP servers. Otherwise, save the image on
a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
7. Select the devices you want to update by selecting them in the Available Devices list and click
the arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next. The SW Upgrade
11. Enter software update file name in the File Name field.
12. Enter credentials of the user who has access to the external server. Notice that if you selected
Internal server, these fields automatically populate with your credentials.
13. Click Next.
14. In the Tasks Details window, enter a name and description of the task for identification purposes.
In addition, users can select a dependency task, start time, number of times the task repeats,
and a group to mail the execution log after each run.
15. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Ixia's Support website > Software Downloads > Net Optics > iBypass VHD and
download the desired version of the update.
2. Save the upgrade file to the desired FTP/SFTP server. If using FTP, use
/opt/netoptics/res/home/netoptics folder in case the Internal FTP is used (this is the FTP
server root folder). Otherwise, save the image on a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select iBypass VHD Software Upgrade. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog.
10. If you selected External FTP Server, enter Hostname, Port, File Name, Username and Password. If
you are using SFTP servers, the full path should be filled in the File Name field (Path relative to
"/"). If you are using FTP servers, the File Name input should be relative to the FTP account home
folder.
11. Click Next.
12. In the Tasks Details dialog box, enter a name and description of the task for identification
purposes. In addition, users can select a dependency task, day and time the task starts, number
of times the task repeats, and a group to mail the execution log after each run.
13. Click Finish.
A task will appear in the Tasks List. If a time was selected that is earlier than the current time, the task
executes immediately. If a time was selected that is later than the current time, the task executes at
that set time.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the desired FTP/SFTP server. If using FTP, use
/opt/netoptics/res/home/netoptics folder in case the Internal FTP is used (this is the FTP
server root folder). Otherwise, save the image on a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select NTO Software Upgrade. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP/SFTP information into the FTP server selection dialog.
If you are using SFTP servers, the full path should be filled in the File Name field (Path relative to
"/", for example "/home/ixia/configurationFile").
If you are using FTP servers, the File Name input should be relative to the FTP account home
folder.
Click Next after finishing the FTP/SFTP configuration.
10. In the Task Detail dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
Note: After a successful upgrade and restart of the Supervisor, the IFC Centralized Manager
reports the task as finished successfully. However not all of the union members may have
finished their restarts. Allow some time for all the union members to finish their restarts.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the desired FTP/SFTP server. If using FTP, use
/opt/netoptics/res/home/netoptics folder in case the Internal FTP is used (this is the FTP
server root folder). Otherwise, save the image on a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP/SFTP information into the FTP server selection dialog.
If you are using SFTP servers, the full path should be filled in the File Name field (Path relative
to "/", for example "/home/ixia/configurationFile").
If you are using FTP servers, the File Name input should be relative to the FTP account home
folder.
Click Next after finishing the FTP/SFTP configuration.
10. In the Task Detail dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Ixia Web site > Customer Portal and download the latest upgrade version file.
2. Save the upgrade file to the desired FTP/SFTP server. If using FTP, use
/opt/netoptics/res/home/netoptics folder in case the Internal FTP is used (this is the FTP
server root folder). Otherwise, save the image on a designated external FTP server.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
4. Select View > Scheduled Tasks from the top menu bar.
5. Click Add Task.
6. Select TradeView DTSP Update. Click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Select the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog.
If you are using SFTP servers, the full path should be filled in the File Name field (Path relative
12. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
13. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server or if you intend to use SFTP servers instead.
2. Select View > Schedule Tasks from the top menu bar.
3. Click the Add Taskbutton.
4. Select NTO Export Configuration Files and click Next.
5. Select the devices you want to update from the Available Devices list and click the arrow icon to
move them to the Selected Devices list.
6. Select the maximum number of devices to update (from 1 to 50) and click Next.
7. Select the Export Type, including Full Backup or Traffic Configuration and click Next.
8. Enter the required FTP/SFTP information into the FTP server selection dialog.
If you are using SFTP servers, the full path should be filled in the File Name field (Path relative
to "/", for example "/home/ixia/configurationFile").
If you are using FTP servers, the File Name input should be relative to the FTP account home
folder.
Click Next after finishing the FTP/SFTP configuration.
9. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
10. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server.
2. Select View > Schedule Tasks from the top menu bar.
3. Click Add Task.
4. Select Director Pro and Director Export Configuration Files and click Next.
5. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
6. Select the maximum number of devices to update (from 1 to 50) and click Next.
7. Enter the required FTP information into the FTP Server Selection dialog and click Next.
8. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
9. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server.
2. Select View > Schedule Tasks from the top menu bar.
3. Click the Add Task.
4. Select xStream Family Export Configuration File and click Next.
5. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
6. Select the maximum number of devices to update (from 1 to 50) and click Next.
7. Enter the required FTP information into the FTP Server Selection dialog and click Next.
8. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
9. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if there is already a configured FTP Server.
2. Select View > Schedule Tasks from the top menu bar.
3. Click Add Task.
5. Select the devices you want to include in this task from the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
6. Select the maximum number of devices to update (from 1 to 50) and click Next.
7. In the FTP settings window, enter information about where you want to send the configuration file,
internal or external server, ip address and port of the destination server, the name of the file and
credentials to access the server.
8. Click Next.
9. In the Task Details window, enter a name and description of the task for identification purposes.
In addition, users can select a dependency task, day and time the task starts, number of times
the task repeats, and a group to mail the execution log after each run.
10. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Click Next.
9. Select the Import Type, including Full Import from Backup, Full Copy Without Users or Traffic
Configuration. Click Next.
10. Enter the required FTP/SFTP information into the FTP server selection dialog.
If you are using SFTP servers, the full path should be filled in the File Name field (Path relative to
"/", for example "/home/ixia/configurationFile").
If you are using FTP servers, the File Name input should be relative to the FTP account home
folder.
Click Next after finishing the FTP/SFTP configuration.
11. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
12. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
3. Go to Administration > Server Settings and activate the internal or external FTP server. Skip
this step if an FTP server is already configured. By default, the internal server is disabled.
4. Select View > Schedule Tasks from the top menu bar.
5. Click Add Task.
6. Select Director Pro and Director Import Configuration Files and click Next.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Click Next.
9. Enter the required FTP information into the FTP Server Selection dialog and click Next.
10. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
7. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
8. Click Next.
9. Enter the required FTP information into the FTP Server Selection dialog and click Next.
10. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
7. Select the desired devices from the Available Devices list and click the arrow icon to move them
to the Selected Devices list.
8. Enter the maximum number of devices to update (from 1 to 50) and click Next.
9. Enter the required FTP information into the FTP Server Selection dialog and click Next.
10. In the Tasks dialog, enter a name and description of the task for identification purposes. In
addition, users can select a dependency task, day and time the task starts, number of times the
task repeats, and a group to mail the execution log after each run.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
Note: Before performing any NTO operation, ensure that the Web API settings are set correctly
on the targeted NTO appliances. Right-click the NTO and select Management Interfaces. Choose
the Web API tab and set the user credentials for each NTO appliance.
1. Select View > Scheduled Tasks from the top menu bar.
2. Click Add Task.
3. Select NTO Add User.
4. Click Next.
5. Choose the devices that this user will have access to and click Next.
6. Add the user's information, including name, email address and password.
7. Check to make this user a system administrator. This is unchecked by default.
8. Click Next.
9. Type a Name and Description of the task for identification purposes.
10. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Select View > Scheduled Tasks from the top menu bar.
2. Click Add Task.
3. Select NTO Delete User.
4. Click Next.
5. Choose the devices that this user will "not" have access to and click Next.
1. Select View > Scheduled Tasks from the top menu bar.
2. Click Add Task.
3. Select NTO Update User.
4. Click Next.
5. Choose the devices that this user has access to and click Next.
1. Select View > Scheduled Tasks from the top menu bar.
2. Click Add Task.
3. Select NTO Copy Filter.
4. Click Next.
5. Choose the devices that this user has access to and click Next.
NTO Filters
A user can select one or more dynamic NTO filters from only one source and copy them onto one or
more NTO devices. The copy filter is done in one-to-one or one-to-many method for each device.
Note: Before performing any NTO operation, ensure that the Web API settings are set correctly
on the targeted NTO appliances. Right-click the NTO and select Management Interfaces. Choose
the Web API tab and set the user credentials for each NTO appliance.
1. Click the schedule icon in the Tool bar or select View > Scheduled Tasks from the top menu
bar.
2. Click Add Task.
3. Select NTO Copy Filter.
4. Click Next.
5. Select the targeted NTO that has the filters that will be copied to another NTO by selecting it from
the Available Devices list and click the arrow icon to move it to the Selected Devices list.
6. Select the filter to be copied and click Next.
7. Select the targeted NTO that will receive the copied filter by selecting it from the Available
Devices list and click the arrow icon to move it to the Selected Devices list.
8. Click Next.
9. Confirm the Filter connection and click Next.
10. Type a Name and Description of the task for identification purposes.
11. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
1. Click the schedule icon in the Tool bar or select View > Schedule Tasks from the top menu bar.
2. Click Add Task.
3. Select SSH Scripts.
4. Click Next.
5. Select the desired devices to update by selecting them in the Available Devices list and click the
arrow icon to move them to the Selected Devices list.
6. Click Next.
7. Type a user name and password for the SSH login. Add the CLI login information, as well
(optional).
8. Click Next.
9. Type a Name and Description of the task for identification purposes.
10. Select the desired devices by selecting them in the Available Devices list and click the arrow icon
to move them to the Selected Devices list.
11. Click Next.
12. Type a user name and password for the SSH login. Add the CLI login information, as well
(optional).
13. Select a policy from the Select Policy pull-down menu.
14. Click Next.
15. Type a Name and Description of the task for identification purposes.
16. Click Finish.
If a time was selected that is earlier than the current time, the task executes immediately. If a
time was selected that is later than the current time, the task executes at that set time.
Note: If a time was selected that is earlier than the current time, the task executes
immediately. If a time was selected that is later than the current time, the task executes at that
set time.
4. Select one or many devices and move to the right pane. Click Next.
The Export events report window appears and lists the event types that you can select to put into
the report. You can use the search bar to filter the list of events.
5. Select the Event Types and select the time period. You can specify the amount of data you want
to capture and report by specifying the time period.
6. Click Next.
7. Enter the Name, Description in the Task Details window.
8. Select a mail group.
If the list is empty, go to Administration > Email Groups to create one.
9. Click Finish.
Note: If a time was selected that is earlier than the current time, the task executes
immediately. If a time was selected that is later than the current time, the task executes at
that set time.
In this chapter:
Create and Import Shell Script 158
Filters 160
Options 165
1. Use a text editor to create the script files as plain text files.
Script files are CLI commands entered exactly as they would be typed into a command console
over a Shell connection.
Note: Be aware that the script file will look different for the same operations on various
devices, since the CLI commands are different for each device type.
2. Select the Policies tab of the Network Control pane.
3. Select the Script Files tab.
4. Click Add.
5. Click the ellipsis button in the File Name row and browse to select a shell script file.
6. Type a description (optional).
7. Click OK.
The Shell script file is added to the script file list. The order of the scripts inside a policy can be
forced only in alphabetical order, regardless of the sequence that they are added.
Add Policy
IFC Centralized Manager allows users to run policies based on CLI or SSH scripts on any managed
device. Users can create a script and execute a policy based on this script by right-clicking the device
and choosing Run Policy.
1. Using a text editor, write a script and save it to the root directory.
2. From IFC Centralized Manager, go to View > Policies.
3. Click Add.
Run Policy
Do the following to run a policy:
Filters
The View > Filter option is available only for the xStream 10, xStream 40, Director and Director Pro
devices. Filters define a criteria for the type of packets to process and when a packet matches that
criteria, then the packet will go where the action tells it to go. When creating filters, specify network
ports and monitor ports to which the filters apply, along with filter priority and action.
3. From Filter Action, select the desired filter criteria. For example, redirect_ports (1), drop (2),
redirect_cpu (3), copy (4), or load_bal (5).
4. Enter a filter priority - 1 is the highest priority.
5. Insert the desired network ports (for example, n1.1-n1.12,n2.1-n2.12) to specify the input ports
where data will enter.
6. Insert the monitor ports (for example, m.01) to specify the port for outbound traffic
7. Enter a name for the filter.
8. Enter a number for the filter.
9. Click the Protocol Configuration down arrow to select the protocol option.
10. Click the Address Configuration down arrow to select the addressing options.
11. Click the PortConfiguration down arrow to select the port option.
12. Click the MAC Configuration down arrow to select the MAC option.
13. Click the UDP Configuration down arrow to select the UDP options.
14. Click the VLANConfiguration down arrow to select the VLAN option.
15. Click OK.
The filter is added to the Filters pane.
Ping Commands
The ping networking utility is a useful tool that can be used to test whether a host is reachable across
an IP network. IFC Centralized Manager supports two types of Ping utilities: ICMP and SNMP.
3. Click Close.
Traceroute Command
Use the traceroute command to display the route (path) and to measure the transit delays of packets
across an IP network. Users can either run a traceroute from the topology tree or the Tool bar.
1. In the Topology tree, select the device to run the traceroute utility
2. Right-click the device and select Traceroute.
1. From the Network Control pane, right-click a device and select Lock Resource.
1. In the Topology tree, select the device to run the CLI utility.
2. Right-click the device and select Open SSH Client.
Note: The first time a CLI session is opened for any appliance, users are prompted to enter
username and password.
Save Logs
Users have the ability to save system log files to a zip file and store them locally on a system. This
allows users to send them to Ixia's customer support for further evaluation.
Options
Use the Options menu from the Tools top menu to run a variety of configuration options for IFC
Centralized Manager, including setting an audible alert for alarms and configure settings for remote
connection.
3. Click the ellipsis button next to the Path to SSH executable check box.
4. Browse to the location of the executable file and click Open.
5. Click the ellipsis button next to the Path to Telnet executable check box.
6. Browse to the location of the executable file and click Open.
7. Click OK.
About Menu
The About menu provides general build information about IFC Centralized Manager. Select Help >
About to launch this menu.
Item Description
Ixia Software End User License Click this to read the Ixia Software End User License
Agreement Agreement.
IFC Centralized Manager can use SNMPv1, SNMPv2c and SNMPv3 for collecting the statistics in the
database. Keep in mind that the values can be limited by the protocol, such as, SNMPv1 variables are
limited to 32-bit values and therefore 64-bit values will not be displayed.
IFC Centralized Manager stores by default all stats data (for all ports/filters) on its own local database
for 1 month as follows:
Once every hour, the data in all the tables is inspected and old samples are deleted. The period for
which data is considered old varies as:
In this chapter:
Show Statistics 170
Show Statistics
The traffic statistics for that device are displayed graphically in the main IFC Centralized Manager
window. Key traffic statistics are displayed for each device type, depending on the statistics and ports
available on the device. The key traffic statistics for each device are not configurable.
Statistics Dashboard
Item Description
Edit Select a chart and click this button to edit the look-and-feel of a chart. Editing a chart
button will reload a chart. Reloading a snapshot or real-time chart deletes old data.
Left/right Click the left/right arrow keys to display additional windows of a report.
arrow
keys
Chart Click one of the chart view icons in the upper-right corner to display a view of one, four,
view or nine reports. By default, nine reports are displayed.
icons
Item Description
Toggle Click this button to detach the report from the main view.
floating
Toggle Click this button to hide the report on the top-menu bar.
auto-hide
Chart Options
By right-clicking a chart, users can select options to better plot the data that is required for analysis,
such as add a markers, save a snapshot of a graph, export data to a CSV file, print the graph, and
magnify the graph.
Item Description
Select ports Select this option to launch a dialog that will allow users to view specific ports (see
Discover a Device with SNMP v3 on page 48).
(Select This option displays the statistic that was selected to draw the chart. For example,
statistics) in the image above, the selected statistic is "In Octets"
Show Max, Select this to display the maximum, minimum and average values of the selected
Min and Avg statistic on the selected ports.
Add Marker Select this option to place a marker at a location in the chart.
Item Description
Save As Select this to save a graph as a PNG image file to a local directory.
Item Description
New Click this to launch a dialog that helps create a new chart.
Edit Select a chart and click this button to edit the look-and-feel of a chart. Editing a chart
will reload a chart. Reloading a snapshot or real-time chart deletes old data.
Filter Select this pull-down menu to filter the view to display charts for a specific appliance.
Chart Click a chart view icon in the upper-right corner to display a view of one, four, or nine
view reports.
icons
Create a Report
Do the following to create a new report to add to the dashboard:
Select Ports
From the dashboard, users can select/deselect ports to view on the statistics chart. Do the following to
select/deselect ports on a chart on the dashboard:
3. Select the desired ports by selecting them in the Available ports list and click the arrow icon to
move them to the Selected ports list.
4. Click OK.
Performance Settings
IFC Centralized Manager uses SNMP polling to gather certain traffic statistics from managed devices. It
also collects ProPush statistics coming from devices. Depending on how many IFC Centralized Manager
appliances and other SNMP-based systems are active, managed devices or IFC Centralized Manager
may experience some performance impacts from too-frequent polling. Parameters apply to Director,
iTap and Pro Push, only. With the checkbox, you can enable or disable all statistics polling.
Director Specify how often you want IFC Centralized Manager to poll Director 120
device devices for traffic statistics. You can use any number from 60 to 3600 seconds
Statistics seconds (1 to 6 minutes) (2
minutes)
iTap Specify how often you want IFC Centralized Manager to poll iTap 120
device devices for traffic statistics. You can use any number from 60 to 3600 seconds
Statistics seconds (1 to 6 minutes) (2
minutes).
Accept Specify how often you want IFC Centralized Manager to receive 10
ProPush ProPush statistics from each device. You can use any number from 1 seconds
Statistics to 3600 seconds (6 mins).
Save Enter how often to save ProPush statistics to the IFC Centralized 10
ProPush Manager database. You can use any number from from 1 to 3600 seconds
Statistics seconds (6 mins).
Statistics Enable or disable the statistics pollers. When you uncheck the
pollers checkbox, you will be asked to confirm whether you want IFC
Centralized Manager to stop all the statistics pollers and no longer
collect statistics data.
When you check the checkbox, you will be asked to confirm whether
you want IFC Centralized Manager to start all the statistics pollers.
The default setting is a 'checked' box.
In this chapter:
Event Management 180
Event Management
The Events pane is located in the lower portion of the Network Control screen. It displays a running log
of faults and events as they occur. Click on a device or branch on the network topology tree, and the
Events pane instantly applies a filter to show only the faults and events coming from the devices in
that branch.
l Click the light blue Events icon or choose View > Events from the top menu bar.
l Click the Faults tab and select Events.
Item Description
Item Description
Event Filtering
Users can filter the events by clicking the Filter button located above the event list and using the
Events Filter dialog. Do the following to filter an event:
1. Navigate to the Events pane and click the Filter button in the command menu at the top of the
pane.
2. Check Seq No to set a sequence number so that it is equal or lower than, equals, or equal or
greater than the number entered in the sequence number field.
3. Check Severity to set the severity level so that it is equal or lower than, equals, or equal or
greater than the severity. Severities include Info, Cleared, Warning, Minor, Major, or Critical.
4. Check Ack Status and set the acknowledgement status to acknowledged (Ack) or not
acknowledged (Unack).
5. Check Event Type and select the event or alarm type to filter from the drop-down list.
For details about each event type, see Appendix B.
6. Check the Managed Object check box and set the managed object so that it either contains or
equals the managed object named in the field.
7. Check the All check box to enable all event filter options, indicated by the check box.
8. Click OK to accept the events filter configuration, or click Cancel to cancel the filter settings.
In addition, click the funnel icon in the Events pane command bar to toggle the filter on and off.
Acknowledge an Event
Acknowledging an event means that someone has evaluated and taken an action on an event. Do the
following to acknowledge an alarm:
Email an Event
Users can set up distribution lists to receive notifications by email whenever an event occurs. Users
can have multiple lists and select the types of events to be sent.
2. Type a name for the distribution list into the Name box.
3. In the Email Addresses box, type the email addresses into a list, separated by commas.
4. Click OK. The New window closes and the email distribution list appears in the list.
After creating one or more distribution lists, you can link the lists to specific events.
Syslog Server
Navigate to Administration > Server Settings > Syslog Server . Use the Syslog Server menu to
enable or disable forwarding events to syslog server groups. Syslog is enabled by default. Syslog port
UDP 514 is open by default in the firewall.
Item Description
Enable Check this to enable the syslog server. This is enabled by default.
Protocol Select a protocol of the syslog server, including TCP, UDP, or TCP and UDP.
Auto Start Check this to auto start the auto start the syslog server.
Status Displays the status of the server, that is, running or stopped.
Alarm Management
The Faults tab > Alarms tab is similar to the Events tab. The difference is that the Alarms tab
displays only events with a severity level of Major or Critical, and only if the alarm condition is active.
For example, a Connection to device lost event makes an alarm active, and a subsequent Connection
to device restored event on the same port clears the alarm, making it inactive.
l Maximizing or minimizing the Alarms window by clicking the ICON button to toggle it to a
floating, undocked window and position it for a view of the alarms detail.
l Exporting the Alarms table as a list of comma separated values (CSV) by clicking the CSV icon,
which opens a separate Export to CSV directory dialog.
l Acknowledging or unacknowledging an alarm by first clicking the alarm in the Alarms table, and
then clicking the Acknowledge/Unacknowledge button.
l Clear an alarm by first clicking the alarm in the Alarms table, and then clicking the Clear button.
l Filtering alarms using the Filter button.
l Creating a ticket for an alarm using the alarm edit icon.
l Printing the Events table by clicking the printer icon.
Alarm Columns
Click the check boxes on the Choose Columns window to select or deselect the column presentation
order. Details of the event includes the following:
Item Description
Time & Records the alarm date, in the format mm/dd/yyyy, and time, in the format hh:mm:ss
Date AM/PM timezone
Severity Indicates the severity of the alarm as Critical (Red), Major (Orange) Minor/Warning
(Yellow) and also indicates if the event has been Cleared (Green)
Item Description
Alarm Filtering
Users can filter alarms by clicking the Filter button located above the Alarms list and using the Alarms
Filter dialog. Do the following to configure the Alarms filter:
Alarm Filter
2. Check Seq No and set the sequence number so that it is equal or lower than, equals, or equal or
greater than the number entered.
3. Check Severity to set the severity level so that it is equal or lower than, equals, or equal or
greater than the severity. Severities include Info, Cleared, Warning, Minor, Major, or Critical.
4. Select the Ack Status checkbox and set the acknowledgement status to acknowledged (Ack) or
Alarm Types
Device Disconnected
Generic
HB Status Change
LB Status Change
Link Status
Alarm Types
Port Rx Utilization
Port Tx Utilization
Redundancy Switchover
Threshold Crossed
6. Check Managed Object to set the managed object so that it either contains or equals the
managed object named in the field.
7. Check the All check box to enable all alarms filter options.
8. Click OK.
1. Click in the Alarms table row to create a commented ticket. The Alarm is highlighted in yellow.
2. Click the ticket icon located on the top right-hand of the display.
3. Enter a ticket ID in the corresponding Ticket ID text entry field.
4. Enter the name of a administrator as the assignee in the corresponding Assignee text entry field.
5. Enter any detailed comments regarding the alarm in the Comment text entry field.
6. Click the OK button to create the commented ticket.
After the ticket is assigned, it appears as a comment icon in the Alarms table Description column for
the alarm selected in Step 1. To view the commented ticket, click on the comment icon in the Alarms
table row.
Threshold Alarms
You can configure alarms to automatically generate events and send email when network traffic
thresholds are crossed. For example, you can configure an alarm for when the utilization rate on a
specific xStream port exceeds a specified value. Any created alarm applies to all managed devices of
that device type.
2. Select an alarm.
3. Check Edit.
The Edit Threshold Alarm window appears with the fields populated with the settings in the
selected alarm.
4. Make any changes.
5. Click Next.
6. Click Finish.
Trap Receive
Users can configure a location to receive SNMP traps that are being generated and sent from devices
discovered on a network.
2. In the Trap Receive Port field, enter the port number of where traps will be received.
3. Check the SNMP V1/V2 checkbox to receive SNMP V1/V2 traps.
4. If the SNMP V1/V2 checkbox was selected, check the Filter by Trap Community check box to
filter traps by community.
5. If the Filter by Trap Community checkbox was selected, enter the trap community in the Trap
Community text box.
6. Check the SNMP V3 checkbox to receive SNMP V3 traps.
7. If you select the SNMP V3 checkbox, enter an engine ID in the Engine ID text box. This ID is
used to serve as a unique identifier for the SNMP agent.
8. Enter a user name for the SNMP V3 traps.
9. Select an authentication protocol: either MD5 or SHA.
10. Click Change Password to change the authentication password.
11. Select a privacy protocol: either DES or AES-128.
12. Check Save to save the configuration or Reset to change the settings back to what they were.
1. Select Administration > Events Configuration > Event Forwarding Settings tab.
2. Click Add.
3. Search for the devices you want to collect alerts from. Use the search field and enter parts of the
device name to narrow down the list for ease of use.
4. Select the device(s) from the list and click the move arrow.
5. Click Next.
6. Select the Event Type from the drop-down list or type in the field. The system will search the list
of event types for an event that contains those letters. The event types in the list reflect the
event types relevant to the device type you entered in the previous page.
7. Select the Email group, SNMP group and/or Syslog group to receive the event. You can also
configure automation features such as running a policy (of CLI scripts) or running an external
script (bash scripts).
8. Click Finish. The event appears in the Events Forwarding page.
On the Events Forwarding page, you can edit an existing event or delete it. You can click on the
column header to sort the column alphabetically or reverse order.
IFC Centralized Manager's web-based UI also enables you to create and manage user accounts,
manage profiles and user sessions. See Chapter 11.
In this chapter:
User Management 202
User Management
IFC Centralized Manager allows you to create and maintain user account profiles. In order to create
users and manage those user accounts, you must be a user with the Admin role.There are three roles
that are pre-defined by IFC Centralized Manager, Admin, Tech, and Vewer. However you can create
your own profile definitions that you can use to assign to the user.
11. Type an IP address into the Hostname box so that Access Control List (ACL) security is enforced
for the account.
Login requests will be permitted from this IP only
12. Check the Lock Account to lock the account.
13. Type more information in the Additional Information fields (optional).
14. Click Apply. The new account is created and displayed in the user accounts list.
Password Recovery
If a user forgets the login password, he/she has the opportunity to reset the password. The user needs
to do the following to reset a password:
Role-Based Profiles
Each profile has a specific set of permissions for access to various system functions. The admin user
can tailor profiles to fit the company needs. As seen in the previous section, each user account is
linked to a particular profile, setting the permissions for that user.
Profile Types
IFC Centralized Manager provides three predefined default profiles. These profiles cannot be changed.
System Administration X
User Management X
Profiles Management X
Views Management X X
View Events X X X
Acknowledge Events X X
Topology Change X X
Topology View X X X
Tasks Configuration X X
Tasks View X X X
Device Configuration X X
Discovery View X X X
Discovery Configuration X X
Performance View X X X
Take Token X
l Admin - This level grants a user the highest level of privileges that enable him/her to configure
and edit system settings, and manage user accounts in the system.
l Tech - This level grants these users permissions to configure and monitor devices, but no
permissions to administering user accounts.
l Viewer - This level grants users view-only privileges, and does not grant system configuration
or device change privileges.
As an admin user, you can create profiles with permissions different than the ones assigned in the
default profiles.
3. Type a unique name for the new profile in the Profile Name box.
4. In the Admin Operations and Application Operations sections, select the permissions you want
this profile to have.
Note that if you select a write permission, the associated read permission is also selected.
5. Click Apply.
The system creates a new profile and displays in the profile list. The new profile becomes
available in the Profile selection menu in the Users pane.
Manage Views
Views control sections of the network topology tree are visible to specific classes of users. For
example, users can create profiles called London User, New York User, Paris User, and Moscow user.
Then users could set up views called London, New York, Paris, and Moscow so that London Users can
only see the London branch of the network topology tree, New York Users can only see the New York
branch, etc.
Password Rules
IFC Centralized Manager enables you to create and enforce password rules to increase the security for
IFC Centralized Manager. The configured password rules apply to all user accounts.
Connected Users
Do the following to view Connected Users and Force Logout:
1. Navigate to Administration > Connected Users tab. The Connected Users pane appears. All
currently active sessions on IFC Centralized Manager are listed.
2. Terminate a session by selecting the session and clicking Force Logout.
Radius
The following is an example of configuring for RADIUS authentication:
2. Select the desired mode of authentication by clicking one of the three options:
l IFC Centralized Manager Management Platform authentication only - This option uses IFC
Centralized Manager only to authenticate all user logins. Select this and click Apply.
l RADIUS authentication only - This option uses the RADIUS server only to authenticate all
user logins. If the RADIUS server is not accessible, no user can log into IFC Centralized
Manager except the admin users.
l RADIUS authentication with IFC Centralized Manager Management Platform user credentials
sync - IFC Centralized Manager will use the RADIUS server to authenticate the user login. If
the RADIUS server fails to authenticate the user, IFC Centralized Manager will try to
authenticate the user login.
3. Enter a hostname, shared secret, port information, and the profile attribute type.
Note: Most fields are pre-configured, and should be changed only if necessary.
4. Click Apply to save the settings.
5. Return to Webmin to restart IFC Centralized Manager.
6. Select System > Bootups and Shutdown.
7. Check the indigo_pro_server check box.
8. Click Reboot Systembutton. IFC Centralized Manager restarts.
LDAP
The following is an example of configuring for LDAP authentication:
TACACS+
The following is an example of configuring for RADIUS authentication:
Audit Trail
IFC Centralized Manager maintains an audit trail or log of all activity executed by all users of the
system. The audit trail helps defend the system and managed devices against intruders and
inappropriate usage. The audit trail does not need to be cleared. It automatically removes the oldest
messages as new messages are added.
The following table describes the details of the Audit Trail page:
Item Description
(Navigation Click the left/right navigation arrows located on bottom of the page to navigate
arrows) through the logs.
Export to CSV Click this button to export the audit trail to a CSV file
The following table describes the details of the Audit Trail dialog:
Item Description
Operation Time & Date Select a From and To date that will be filtered.
Select All Select this to choose all options for the filter.
Northbound Interface
A northbound interface (NBI) communicates with higher-level layers by using any southbound interface
(SBI) of a higher-level component. Typically, a northbound interface is at the top of all components in
its architecture; thus, it is termed the northbound interface. For IFC Centralized Manager, users can
configure a northbound interface for alarm forwarding.
Alarm Forwarding
Alarm forwarding forwards alarms to specified destinations. To configure alarm forwarding, users must
configure an SNMP manager, a syslog server or both. Do the following to configure an SNMP manager
group:
xStream10 (Load Balancing, Filtering, Yes Yes Yes Yes Yes No No Yes
Aggregation)
xStream40 (Load Balancing, Filtering, Yes Yes Yes Yes Yes No No Yes
Aggregation)
NTO 5260 (union) Yes Yes No Yes Yes Yes Yes Yes
Vision Edge 100 Yes Yes No Yes Yes Yes Yes Yes
Vision Edge 10S Yes Yes No Yes Yes Yes Yes Yes
Director v7.8.0
iTap Port Agg iPACu3: 1G Copper 10/100/1000 Inline Port Aggregator - v3.0.21
xStream10 v6.7.2
(Load Balancing, Filtering, Aggregation)
xStream40 v6.7.2
(Load Balancing, Filtering, Aggregation)
NTO 5204 NTO 5236 NTO 5288 NTO 5293 NTO v4.6.2.13
5273
Related Def
Event Product Sev Description Action SNMP Object ID
NTO Client 52xx, 7433, Info This notification is issued when a user Informational only .1.3.6.1.4.1.32620.2.1.2
Login Failed VisionOne, attempted to log in to an NTO system
VisionEdge and failed because an invalid user name
40, or password was entered.
VisionEdge .1.3.6.1.4.1.32620.2.1.2
100, Vision
7300,
TradeVision,
VisionEdge
10S
NTO Event 52xx, 7433, Info This notification is issued from the NTO Check to see that the .1.3.6.1.4.1.32620.2.1.4
Monitor Drop VisionOne, event monitor subsystem. This link is not over
Count Value VisionEdge notification indicates that the dropped subscribed. Change
Exceeded 40, packet counter value exceeded a the threshold if
VisionEdge predefined threshold. needed.
100, Vision
7300,
TradeVision,
VisionEdge
10S
NTO Event 52xx, 7433, Info This notification is issued from the NTO Check link if many .1.3.6.1.4.1.32620.2.1.3
Monitor VisionOne, event monitor subsystem. This invalid packets are
Invalid Count VisionEdge notification indicates that the Invalid passing through it.
Value 40, Packet counter exceeded a predefined Reset counter or
Exceeded VisionEdge threshold. change the threshold.
100, Vision
7300,
TradeVision,
VisionEdge
10S
NTO Event 52xx, 7433, Info This notification is issued from the NTO Check to see that the .1.3.6.1.4.1.32620.2.1.5
Monitor VisionOne, event monitor subsystem. This link is not over
Receive VisionEdge notification indicates that the Receive subscribed. Change
Utilization 40, Utilization value crossed a predefined the threshold if
Value VisionEdge threshold. needed.
Exceeded 100, Vision
7300,
TradeVision,
VisionEdge
10S
Related Def
Event Product Sev Description Action SNMP Object ID
NTO Event 52xx, 7433, Info A notification from the NTO event This Check to see that the .1.3.6.1.4.1.32620.2.1.6
Monitor VisionOne, notification is issued from the NTO event link is not over
Transmit VisionEdge monitor subsystem. This notification subscribed. Change
Utilization 40, indicates that the the threshold if
Value VisionEdge Transmit Utilization value crossed a needed.
Exceeded 100, Vision predefined threshold.
7300,
TradeVision,
VisionEdge
10S
NTO Event 52xx, 7433, Info On-demand notification type generated Informational only .1.3.6.1.4.1.32620.2.1.7
Test VisionOne, at user's request to validate the SNMP
VisionEdge configuration on the agent and SNMP
40, management system.
VisionEdge
100, Vision
7300,
TradeVision,
VisionEdge
10S
NTO SNMP 52xx, 7433, Info The Anue version of Informational only .1.3.6.1.4.1.32620.2.1.1
Authentication VisionOne, AuthenticationFailure notification
Failed VisionEdge provides extra information about
40, improperly authenticated PDUs when
VisionEdge compared with the RFC 3418
100, Vision AuthenticationFailure notification. It
7300, includes username (or community
TradeVision, string), message security model, source
VisionEdge ip address, and type (ipv4 or ipv6). The
10S RFC 3418 notification does not include
the Source IP address of the offending
host, so the notification recipient cannot
determine the source of the invalid
SNMP.
NTO user 52xx, 7433, Info This event is triggered when the device Informational only internal IFC Centralized Manager event
password VisionOne, password is successfully updated.
updated VisionEdge
successfully 40,
VisionEdge
100, Vision
7300,
TradeVision,
VisionEdge
10S
Authentication All devices Info This notification is issued when a user Informational only .1.3.6.1.6.3.1.1.5.5
Failure attempted to log in to a system and
failed because an invalid user name or
password was entered.
Auto Bypass iBypass, Critical This trap is generated when Bypass State If the bypass state is .1.3.6.1.4.1.23022.
State Change iBypass HD changes. ON, check for tool 2.5.1.1.35
failure.
Bypass Boot iBypass, Critical This trap is generated when the reboot Check the iBypass .1.3.6.1.4.1.23022.2.
Fail iBypass HD failed to complete the boot sequence. device. Connect to 5.1.1.35
the Console to find
the source of the boot
problem.
Bypass HD iBypass HD Major This trap is generated when a link status Check the physical .1.3.6.1.4.1.23022.
Status changes. link on the relevant 2.6.2.1
Change port for failures.
Related Def
Event Product Sev Description Action SNMP Object ID
Bypass Link iBypass, Critical This trap is generated when the Port link Check the physical .1.3.6.1.4.1.23022.0.2
Status iBypass HD status changed between 'up' and 'down'. link and device
Change connection.
Bypass Power iBypass, Critical This trap is generated whenever the Check the power .1.3.6.1.4.1.23022.0.3
Supply iBypass HD Power Source status changes. supply and/or power
socket.
Bypass iBypass, Critical This trap is generated when the iBypass .1.3.6.1.4.1.23022.0.1
System Status iBypass HD system status is down.
Bypass iBypass, Critical This trap is generated when utilization on Check whether the .1.3.6.1.4.1.23022.0.4
Utilization iBypass HD Bypass ports is over the thresholds. traffic volume is more
Threshold than the intended link
capacity or change
the threshold.
Cluster VisionOne, Minor This event is issued when an error Check cluster internal IFC Centralized Manager event
Member State VisionEdge occurred on the cluster member. member's console triggered when status changed
- Error 40,
VisionEdge
100, Vision
7300
Cluster VisionOne, Info This event is issued when importing a Informational only internal IFC Centralized Manager event
Member State VisionEdge configuration file on the cluster member. triggered when status changed
- Importing 40,
VisionEdge
100, Vision
7300
Cluster VisionOne, Major This event is triggered when other cluster Check the license on internal IFC Centralized Manager event
Member State VisionEdge member of the cluster topology is in the claimed cluster triggered when status changed
- Invalid 40, Invalid License state. member
License VisionEdge
100, Vision
7300
Cluster VisionOne, Info This event is triggered when some other Informational only internal IFC Centralized Manager event
Member State VisionEdge device is joining the current cluster triggered when status changed
- Joining 40, topology.
VisionEdge
100, Vision
7300
Cluster VisionOne, Info This event is triggered when current Informational only internal IFC Centralized Manager event
Member State VisionEdge cluster member is leaving the cluster triggered when status changed
- Leaving 40, topology.
VisionEdge
100, Vision
7300
Cluster VisionOne, Cleared Clears any opened alarm on the current Informational only internal IFC Centralized Manager event
Member State VisionEdge cluster member. It is triggered when the triggered when status changed
- Ready 40, cluster member changed status to
VisionEdge Ready.
100, Vision
7300
Cluster VisionOne, Info This event is triggered when the logs are Informational only internal IFC Centralized Manager event
Member State VisionEdge saved from the current cluster member. triggered when status changed
- Saving Logs 40,
VisionEdge
100, Vision
7300
Related Def
Event Product Sev Description Action SNMP Object ID
Cluster VisionOne, Info This event is triggered when cluster Informational only internal IFC Centralized Manager event
Member State VisionEdge member is shutting down. triggered when status changed
- Shutting 40,
Down VisionEdge
100, Vision
7300
Cluster VisionOne, Info This event is triggered when cluster Informational only internal IFC Centralized Manager event
Member State VisionEdge member is synchronizing with the cluster triggered when status changed
- 40, topology.
Synchronizing VisionEdge
100, Vision
7300
Cluster VisionOne, Major This event is triggered when other cluster Check the console of internal IFC Centralized Manager event
Member State VisionEdge member of the cluster topology is the claimed cluster triggered when status changed
- Unreachable 40, unreachable. member
VisionEdge
100, Vision
7300
Cluster VisionOne, Info This event is triggered when cluster Informational only internal IFC Centralized Manager event
Member State VisionEdge member is in Upgrading state. triggered when status changed
- Upgrading 40,
VisionEdge
100, Vision
7300
Cluster VisionOne, Warning This event is triggered when cluster Informational only internal IFC Centralized Manager event
Member State VisionEdge member has other software version than triggered when status changed
- Version 40, the rest of the cluster topology
Mismatch VisionEdge members.
100, Vision
7300
Cold Start All devices Warning A coldStart trap signifies that the SNMP A device is booting .1.3.6.1.6.3.1.1.5.1
entity, supporting a notification from start, verify boot
originator application, is reinitializing is complete and the
itself and that its configuration may have device is working
been altered. properly.
Configuration Director Info This trap is generated when there is a Notification only .1.3.6.1.4.1.23022.
Change configuration change on a port or a filter. 2.8.2.2
Device All devices Cleared This trap is generated by IFC Centralized Notification only internal IFC Centralized Manager event
Connected Manager after discovering a device or
after a device becomes online again. It
clears the Device Disconnected alarm.
Device All devices Info This trap is generated by IFC Centralized Notification only internal IFC Centralized Manager event
Deleted Manager when a discovered device is
deleted.
Device All devices Major This trap is generated by IFC Centralized Check: 1. the device internal IFC Centralized Manager event
Disconnected Manager when a discovered device can Is up, the IP
no longer be reached. addresses assigned is
correcta and routed
correctly through the
netwwork, physicall
links are all correctly
connected
Device All devices Info This trap is generated when a device was Notification Only internal IFC Centralized Manager event
Discovered discovered and added to the Topology.
Related Def
Event Product Sev Description Action SNMP Object ID
Device All devices Major This trap is generated when the Check that the routing internal IFC Centralized Manager event
Discovery discovery on the given range failed. and IP addresses are
Failed correctly configured.
Device Fan xStream Info This trap is generated when the value of In the case where FAN .1.3.6.1.4.1.23022.100.
Status deviceFanStatus changed. is down, check the 9.1.0.1.0.1
Changed physical FAN module.
Device Psu xStream Info This trap is generated when the value of In the case where PSU .1.3.6.1.4.1.23022.100.
Status devicePsuStatus changed. is down, check the 9.1.0.1.0.2
Changed physical PSU module.
Director Director Major This trap is generated whenever one of Check the .1.3.6.1.4.1.23022.
Status the following trap types and objects are configuration and the 2.8.2.1
Change modified: uid, portIndex, relevant physical
powerSupplyIndex, linkUpDown, links.
systemUpDown, powerUpDown,
snmpStart, snmpDown, userLogin,
loginName.
External Script All devices Info This trap is generated when a script from Check the script on internal IFC Centralized Manager event
Failed that have a events forwarding settings was not the target server
forwarding successfully ran on the target server.
setting
configured
External Script All devices Info This trap is generated when a script from Informational only internal IFC Centralized Manager event
Successful that have a events forwarding settings was
forwarding successfully ran on the target server.
setting
configured
File Operation xStream Info This trap is sent as a result of a file Informational only .1.3.6.1.4.1.23022.100.
Status operation status change. Typically this 9.1.0.4.0.11
Changed results from saving, loading or deleting
files. Traps may be sent more than once
per operation, e.g. to signify the start
and end of the action.
File Operation xStream Info This trap is generated when a file Informational Only .1.3.6.1.4.1.23022.100.
Status operation status changed. Typically this 9.1.0.4.0.4
Changed V41 results from saving, loading or deleting
files. Traps may be sent more than once
per operation, e.g. to signify the start
and end of the action. This trap is sent if
on the xStream device the trap mode is
set to V41.
File Operation xStream Info This trap is generated when a file Informational only .1.3.6.1.4.1.23022.100.9.1.0.4.4
Status operation status changed. Typically this
Changed Pre. results from saving, loading or deleting
V41 files. Traps may be sent more than once
per operation, e.g. to signify the start
and end of the action. This trap is sent if
on the xStream device the trap mode is
set to Pre V41.
Generic xStream, Major This trap has no specific application, it Check the message .1.3.6.1.4.1.23022.100.
Director, can be used to embed a generic contents. 9.1.0.6.0.2
Director Pro message.
Related Def
Event Product Sev Description Action SNMP Object ID
Generic Pre. xStream Major This trap has no specific application, it Check the message .1.3.6.1.4.1.23022.100.9.1.0.6.2
V41 can be used to embed a generic contents.
message. This trap is sent if on the
xStream device the trap mode is set to
V41.
Hello xStream, Info This trap simply carries a single Test SNMP trap send. .1.3.6.1.4.1.23022.100.
Director, message. It can be used for testing No action required 9.1.0.6.0.1
Director Pro connectivity to an SNMP manager. By
manually sending this trap, SNMP trap
configuration, networking and the
manager can be tested without
triggering unwanted behavior.
Hello Pre. V41 xStream Info This trap simply carries a single Test SNMP trap send. .1.3.6.1.4.1.23022.100.9.1.0.6.1
message. It can be used for testing No action required
connectivity to an SNMP manager. By
manually sending this trap, SNMP trap
configuration, networking and the
manager can be tested without
triggering unwanted behavior. This trap
is sent if on the xStream device the trap
mode is set to Pre V41.
Related Def
Event Product Sev Description Action SNMP Object ID
iBypass 3 Link iBypass 3 Warning The trap is sent if any link port status Check configuration .1.3.6.1.4.1.23022.100.9.2.1.1
Status changed (Up or down). Trigger by the or physical link of the
Change following CLI commands – reboot host, ports
set networkports disable/enable & set
monitorports disable/enable. Trigger by
the following actions – unplug/plug cable
from/into networkports & unplug/plug
cable from/into monitor ports.
iBypass 3 iBypass 3 Critical The trap is sent if the power supply Check the physical .1.3.6.1.4.1.23022.100.9.2.1.3
Power Supply changed state. Trigger: Unplug one of power supply
the power cords and then plug it in again
to see the system generate the two
traps.
iBypass 3 iBypass 3 Major The trap is sent if the system status .1.3.6.1.4.1.23022.100.9.2.1.4
System Fail changed to Down. Trigger by the CLI
command: reboot hardware.
iBypass 3 iBypass 3 Info The trap is sent if the system status Informational only .1.3.6.1.4.1.23022.100.9.2.1.5
System Up changed to Down. Trigger by the CLI
command: reboot hardware.
iBypass 3 iBypass 3 Warning The trap is sent if utilization is above the Check the traffic and .1.3.6.1.4.1.23022.100.9.2.1.2
Utilization threshold. Trigger by setting a low the threshold values
Threshold threshold with a CLI command and then
pump traffic to exceed the threshold
value. To see the trap again, you need to
stop the traffic, reset peak rate and then
start traffic - wait for the traffic to exceed
the threshold value again.
iBypass 40-10 iBypass40- Critical This trap is generated when any .1.3.6.1.4.1.23022.100.
Bypass State 10 segment bypass status was changed 9.2.1.14
Change (N/A, on, or off).
iBypass 40-10 iBypass40- Warning This trap is generated when any link port .1.3.6.1.4.1.23022.100.
Link Status 10 status was changed (Up or down). 9.2.1.1
Change A trap can be generated by the following
CLI commands: reboot host, set network
ports disable/enable or set monitorports
disable/enable.
A trap can be generated by the following
actions: unplug/plug cable from/into
network ports or unplug/plug cable
from/into monitor ports.
iBypass 40-10 iBypass40- Info This trap is generated when a log file was .1.3.6.1.4.1.23022.100.
Log Clear 10 cleared. 9.2.1.10
iBypass 40-10 iBypass40- Info This trap is generated when the audit log .1.3.6.1.4.1.23022.100.
Log Export 10 file was exported either via Web UI or 9.2.1.11
CLI.
iBypass 40-10 iBypass40- Info This trap is generated when a user logs .1.3.6.1.4.1.23022.100.
Login 10 in, either by console, CLI, ssh or Web. 9.2.1.6
iBypass 40-10 iBypass40- Info This trap is generated when a user logs .1.3.6.1.4.1.23022.100.
Logout 10 out, either by console, CLI, ssh or Web. 9.2.1.7
iBypass 40-10 iBypass40- Info This trap is generated when a network .1.3.6.1.4.1.23022.100.
Network 10 setting changed. 9.2.1.8
Setting For example, when a new IP address has
Change been entered with a "set network
ipaddress" command, this trap is sent.
Related Def
Event Product Sev Description Action SNMP Object ID
iBypass 40-10 iBypass40- Critical This trap is generated when the power .1.3.6.1.4.1.23022.100.
Power Supply 10 supply changed state. 9.2.1.3
Two traps will be generated if someone
unplugged one of the power cords and
then plugged it in again.
iBypass 40-10 iBypass40- Major This trap is generated when the system .1.3.6.1.4.1.23022.100.
System Fail 10 status was changed to Down, possibly 9.2.1.4
from an event like a reboot.
iBypass 40-10 iBypass40- Info This trap is generated when the system .1.3.6.1.4.1.23022.100.
System Up 10 status was changed to Up, possibly from 9.2.1.5
an event like a reboot.
iBypass 40-10 iBypass40- Warning This trap is generated when the device .1.3.6.1.4.1.23022.100.
Temperature 10 temperature is over the "high 9.2.1.12
Threshold temperature" threshold.
High
iBypass 40-10 iBypass40- Warning This trap is generated when the device Check to see if the .1.3.6.1.4.1.23022.100.
Temperature 10 temperature has fallen below the "low temperature 9.2.1.13
Threshold Low temperature" threshold. threshold should be
set to some other
value.
iBypass 40-10 iBypass40- Info This trap is generated when a user .1.3.6.1.4.1.23022.100.
User Account 10 account was changed, e.g. 9.2.1.9
Change a new user has been added with "add
user” command,
user account has been modified with
"modify user” command, or the
password changed.
iBypass 40-10 iBypass40- Warning This trap is generated when utilization Check for excessive .1.3.6.1.4.1.23022.100.
Utilization 10 rate exceeds the high threshold setting. traffic on that link or 9.2.1.2
Threshold change the threshold
accordingly.
iBypass Port iBypass Major This trap is sent when the value of link Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.3.0.1
Link Status VHD, status changes on a port link.
Changed iBypass
DUO
iBypass Port iBypass Major This trap is sent when the Tx Utilization Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.3.0.10
TX Utilization VHD, crossed the predefined threshold
iBypass
DUO
iBypass Port iBypass Major This trap is sent when the Rx Utilization Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.3.0.11
RX Utilization VHD, crossed the predefined threshold
iBypass
DUO
iBypass Stats iBypass Info This trap is sent when the statistics table Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.4.0.1
Table Reset VHD, was cleared
iBypass
DUO
Related Def
Event Product Sev Description Action SNMP Object ID
iBypass iBypass Major This trap is sent when the value of If the heartbeat status .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.13.0.1
Heartbeat VHD, uapHeartbeatStatus changes on a port is failed, the inline tool
Status iBypass which is the member of a heartbeat pair. may be down. Check
Changed DUO The trap is sent for each port in the pair. the physical device
and link between
iBypass VHD and the
inline tool.
iBypass LFD iBypass Major This trap is sent whenever the value of Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.16.0.1
Status VHD, uapLfdPairsLfdState changes on an LFD link of both ports of
Changed iBypass pair. the LFD pair. Check
DUO the configuration.
iBypass iBypass Critical This trap is sent whenever the value of If the bypass status is .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.25.0.1
Bypass Status VHD, uapBypassStatus changes on a on or forced-on, the
Changed iBypass uapBypassEntry. traffic will not flow to
DUO the inline tool. Check
the physical link
between the iBypass
VHD device and the
inline tool.Check the
configuration.
iBypass iBypass Critical This trap is sent whenever the value of If the status changes .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.25.0.2
Network Pair VHD, uapBypassNetPortPairsStatusStatus to failed or forced-
Status iBypass changes in a bypass the traffic will
Changed DUO uapBypassNetPortPairsStatusEntry. not flow to the tool
ports. Check the
configuration or the
physical link of the
network ports
iBypass Tool iBypass Critical This trap is sent whenever the value of If the status changes .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.25.0.10
Pair Status VHD, uapBypassToolPortPairsStatusStatus to failed or forced-
Changed iBypass changes on a tool port pair. bypass the traffic will
DUO not flow to the
connected tool. Check
the configuration or
the physical link of the
tool ports
iBypass VHD iBypass VHD Warning This trap is sent whenever the value of Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.1
Module uapModulesInventoryInstalledType
Inventory changes for a module slot.
Status
Changed
iBypass VHD iBypass VHD Warning This trap is sent whenever the value of Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.2
Module Admin uapModulesAdminStatus changes for a
Status module slot.
Changed
iBypass VHD iBypass VHD Major This trap is sent whenever the value of Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.3
Module Alarm uapModulesStatusAlarmStatus changes
Status for a module slot.
Changed
iBypass VHD iBypass VHD Warning This trap is sent whenever the value of Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.4
Module uapModulesStatusOperStatus changes
Operational for a given module slot
Status
Changed
Related Def
Event Product Sev Description Action SNMP Object ID
iBypass VHD iBypass VHD Warning This trap is sent whenever the value of Informational Only .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.5
Module Online uapModulesStatusOnlineStatus changes
Status on a module slot.
Changed
iBypass iBypass Major This trap is sent whenever the module Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.50
Module VHD, temperature value crossed a predefined configuration and
Temperature iBypass threshold. environment.
Status DUO
Changed
iBypass iBypass Critical This trap is sent whenever the value of Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.60
Module PSU VHD, modulePsuAlarmsAlarmStatus changes configuration.
Alarm Status iBypass for a modulePsuEntry.
Changed DUO
iBypass VHD iBypass VHD Warning This trap is sent whenever the charge Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.80
Module value of a battery crossed a predefined configuration.
Battery threshold.
Charge Status
Changed
iBypass VHD iBypass VHD Major This trap is sent whenever the value of Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.81
Module moduleBatteryAlarmsAlarmStatus configuration.
Battery Alarm changes in a moduleBatteryEntry.
Status
Changed
iBypass iBypass Major This trap is sent whenever the value of Check the physical .1.3.6.1.4.1.3054.1.1.100.1.9.1.1.27.0.90
Module Fan VHD, moduleFanAlarmStatus changes in a configuration.
Alarm Status iBypass moduleFanEntry.
Changed DUO
Inconsistent VisionOne, Major Each cluster member displays in IFC Check cluster internal IFC Centralized Manager event
Cluster VisionEdge Centralized Manager the cluster topology topology on the triggered when status changed
Topology 40, status. This notification is issued when cluster member's
VisionEdge any member displays a different status console.
100, Vision of the topology then the one of the other
7300 members.
Inconsistent VisionOne, Cleared Clears the Inconsistent Cluster Topology Informational only internal IFC Centralized Manager event
Cluster VisionEdge alarm when the cluster topology displays triggered when status changed
Topology 40, the same status on all cluster members.
Cleared VisionEdge
100, Vision
7300
Unmanaged VisionOne, Warning This event is triggered when the cluster Discover the other internal IFC Centralized Manager event
Cluster VisionEdge topology has members that are not cluster members in
Member 40, discovered in IFC Centralized Manager. IFC Centralized
VisionEdge Manager
100, Vision
7300
Ixia Fabric IFC Info This event is triggered when a backup is Informational only internal IFC Centralized Manager event
Controller Centralized created and added to archive.
Backup Manager
created and
added to
archive
Ixia Fabric IFC Info This event is triggered when a new Informational only internal IFC Centralized Manager event
Controller Centralized Profile is added.
Profile Added Manager
Related Def
Event Product Sev Description Action SNMP Object ID
Ixia Fabric IFC Info This event is triggered when a Profile is Informational only internal IFC Centralized Manager event
Controller Centralized deleted.
Profile Manager
Deleted
Ixia Fabric IFC Info This event is triggered when a Profile is Informational only internal IFC Centralized Manager event
Controller Centralized updated.
Profile Manager
Updated
Ixia Fabric IFC Info This event is triggered when a new Informational only internal IFC Centralized Manager event
Controller Centralized Session is created.
Session Manager
Created
Ixia Fabric IFC Info This event is triggered when a new Informational only internal IFC Centralized Manager event
Controller Centralized Session is deleted or has expired.
Session Manager
Deleted
Ixia Fabric IFC Info This event is triggered when a Software Informational only internal IFC Centralized Manager event
Controller Centralized Upgrade is performed.
Software Manager
Upgrade
Ixia Fabric IFC Info This event is triggered when a new User Informational only internal IFC Centralized Manager event
Controller Centralized is added.
User Added Manager
Ixia Fabric IFC Info This event is triggered when a User is Informational only internal IFC Centralized Manager event
Controller Centralized deleted.
User Deleted Manager
Ixia Fabric IFC Info This event is triggered when a User logs Informational only internal IFC Centralized Manager event
Controller Centralized in.
User Login Manager
Ixia Fabric IFC Info This event is triggered when a User is Informational only internal IFC Centralized Manager event
Controller Centralized updated.
User Updated Manager
Ixia Hello Trap iBypass Info This trap simply carries a single Informational Only .1.3.6.1.4.1.3054.100.9.1.1.1.0.1
VHD, message. It can be used for testing
iBypass connectivity to an SNMP manager. By
DUO manually sending this trap, SNMP trap
configuration, networking and the
manager can be tested without
triggering unwanted behavior.
Ixia Generic iBypass Major This trap has no specific application, it Informational Only .1.3.6.1.4.1.3054.100.9.1.1.1.0.2
Trap VHD, can be used to embed a generic
iBypass message.
DUO
Ixia File iBypass Info This trap is sent as a result of a file Informational Only .1.3.6.1.4.1.3054.100.9.1.1.7.0.1
Operation VHD, operation status change. Typically, this
Status iBypass results from saving, loading or deleting
Changed DUO files. Traps may be sent more than once
per operation, e.g. to signify the start
and end of the action
Related Def
Event Product Sev Description Action SNMP Object ID
Ixia iBypass Info This trap is sent when the status of a user Informational Only .1.3.6.1.4.1.3054.100.9.1.1.11.0.1
Authentication VHD, authentication changes. Reasons
Status iBypass include:
-user is rejected during
Changed DUO authentication (failed login)
-user is
acepted during authentication
(successful login)
-user ends session
(logout)
Ixia Software iBypass Info This trap is sent whenever the status of a Informational Only .1.3.6.1.4.1.3054.100.9.1.1.14.0.1
Image VHD, SW image command changes. The
Command iBypass command may have been initiated by a
Status DUO user interface (CLI or webUI) or a
Changed remote manager via SNMP or IFC
Centralized Manager interface.
Ixia Logging iBypass Info This trap is sent whenever the system Informational Only .1.3.6.1.4.1.3054.100.9.1.1.17.0.1
Cleared VHD, log is cleared. The loggingSyslogClearlog
iBypass object indicates which log or log files
DUO were cleared.
iTap Link iTap Info This trap is generated when a Port link If the link is down, .1.3.6.1.4.1.23022.0.2
status changed between 'up' and 'down'. check the physical link
to the device.
iTap Power iTap Info This trap is generated whenever the If the power supply is .1.3.6.1.4.1.23022.0.3
Supply Power Source status changes. down, check the
physical device.
iTap iTap Info This trap is generated when utilization on Check for excessive .1.3.6.1.4.1.23022.0.4
Utilization an iTAP port is over the threshold. traffic on that link or
change the threshold
accordingly.
iTap System iTap Info This trap is generated when the iTAP Check the physical .1.3.6.1.4.1.23022.0.1
system status is down. device.
LFD Status xStream Major A portLinkFault DetectStatusChanged Check the physical .1.3.6.1.4.1.23022.100. 9.1.0.2.0.12
Change trap is sent whenever the value of link of the ports that
lfdPairsLfdState changes. The two ports are members of LFD
comprising the LFD pair appear in the or check the
portNum and peerPortnumvarbinds. The configuration.
portAdmin varbind reports the current
administrative state of the portNum port.
Related Def
Event Product Sev Description Action SNMP Object ID
LFD Status xStream Major A portLinkFault DetectStatusChanged Check the physical .1.3.6.1.4.1.23022.100.9.1.0.2.2
Change Pre. trap is sent whenever the value of link of the ports that
v41 lfdPairsLfdState changes. The two ports are members of LFD
comprising the LFD pair appear in the or check the
portNum and peerPortnumvarbinds. The configuration.
portAdmin varbind reports the current
administrative state of the portNum port.
This trap is sent if the xStream device
trap mode is set to Pre V41.
Link Down All devices Warning A linkDown trap signifies that the SNMP Check .1.3.6.1.6.3.1.1.5.3
entity, acting in an agent role, has configuration/physical
detected that the ifOperStatus object for of link reported down
one of its communication links is about to
enter the down state from some other
state (but not from the notPresent
state). This other state is indicated by
the included value of ifOperStatus.
Related Def
Event Product Sev Description Action SNMP Object ID
Link Up All devices Warning A linkUp trap signifies that the SNMP Information only .1.3.6.1.6.3.1.1.5.4
entity, acting in an agent role, has
detected that the ifOperStatus object for
one of its communication links left the
down state and transitioned into some
other state (but not into the notPresent
state). This other state is indicated by
the included value of ifOperStatus.
Link Status Director, Major This trap is sent whenever the state of a Informational only .1.3.6.1.4.1.23022.2.8.2.4
Director Pro link is changed.
Manual iBypass, Critical This trap is generated when the Bypass Re-enable the port in .1.3.6.1.4.1.23022.0.6
Bypass State iBypass HD State changes from a Port Disable the configuration if
Change command. this behavior was not
planned.
Power Supply Director Major This notification is sent whenever the If power supply is .1.3.6.1.4.1.23022.
Status status of a power supply changes. down, check physical 2.8.2.3
device
Reboot IFC Info This event is triggered when a Server internal IFC Centralized Manager event
Centralized Reboot is initiated.
Manager
Redundancy IFC Major This event is triggered when the Standby Verify the Standby internal IFC Centralized Manager event
Peer Down Centralized server in the Redundancy setup is down. IFC Centralized
Manager Manager server
Redundancy IFC Cleared This event is triggered when the Standby Informational only internal IFC Centralized Manager event
Peer Up Centralized server is up after previously being down.
Manager This event clears the Redundancy Peer
Down alarm.
Redundancy IFC Warning This event is triggered by the Informational only internal IFC Centralized Manager event
Switchover Centralized Redundancy switchover mechanism.
Manager
Restore IFC Info This event is triggered when the internal Informational only internal IFC Centralized Manager event
backup file on Centralized IFC Centralized Manager backup file was
Ixia Fabric Manager successfully restored.
Controller
successful
Related Def
Event Product Sev Description Action SNMP Object ID
SSH All devices Info This trap is sent when the Apply Policy or Informational only internal IFC Centralized Manager event
Scripts/Policy that support SSH Scripts task was successful.
Succeeded the on the
xStream
device on
the xStream
device
Policy
SSH All devices Info This trap is sent when the Apply Policy or Informational only internal IFC Centralized Manager event
Scripts/Policy that support SSH Scripts task failed.
Failed the Policy
Scheduled Info This event is triggered when a task is Informational only internal IFC Centralized Manager event
Task scheduled for execution.
Execution
Server IFC Warning This event is triggered when a Server Informational only internal IFC Centralized Manager event
Shutdown Centralized Shutdown is initiated.
Manager
Server Startup IFC Info This event is triggered when a Server Informational only internal IFC Centralized Manager event
Centralized Startup is initiated.
Manager
Software xStream Info This trap is sent whenever the status of a Informational Only .1.3.6.1.4.1.23022.100. 9.1.0.7.0.1
Image software image command changes. The
Command command may have been initiated by a
Status user interface (CLI or webUI) or a
Changed remote manager via SNMP or NETCONF.
See NETOPTICS-XFAM-IMAGE-MIB for
SNMP objects which may be written to
initiate commands.
Statistics xStream Info This trap signals that a statistics table Informational only .1.3.6.1.4.1.23022.100. 9.1.0.3.0.11
Table Cleared was cleared. The type of table cleared in
indicated by the statsTableReset
varbind. The standard varbinds will
indicate the time etc.
Statistics xStream Info This trap signals that a statistics table Informational only .1.3.6.1.4.1.23022.100. 9.1.0.3.0.1
Table Cleared was cleared. The type of table cleared in
V41 indicated by the statsTableReset
varbind. The standard varbinds will
indicate the time etc. This trap is sent if
on the xStream device trap mode is set
to V41.
Statistics xStream Info This trap signals that a statistics table Informational only .1.3.6.1.4.1.23022.100.9.1.0.3.1
Table Cleared was cleared. The type of table cleared in
Pre. V41 indicated by the statsTableReset
varbind. The standard varbinds will
indicate the time etc. This trap is sent if
on the xStream device trap mode is set
to Pre V41.
Related Def
Event Product Sev Description Action SNMP Object ID
Table Cleanup IFC Info This trap is generated when the internal Informational only internal IFC Centralized Manager event
Centralized database cleanup mechanism has
Manager removed some of the old data.
Applicable for events and audit trail
tables.
Threshold All devices Major This trap is sent if a threshold has been internal IFC Centralized Manager event
Crossed that have a crossed.
threshold
alarm set
Threshold All devices Cleared This trap is sent if a Threshold Crossed internal IFC Centralized Manager event
Recovered that have a alarm opened and the trigger is no longer
threshold applicable.
alarm set
Invalid All devices Warning This trap is sent if an invalid threshold is Correct the threshold internal IFC Centralized Manager event
threshold that have a created, specifically if the port pattern configuration
alarm threshold does not match any ports or if the OID is
alarm set not valid.
Invalid Server IFC Critical This trap is generated when the IP Update Primary IP internal IFC Centralized Manager event
Address Centralized address of the IFC Centralized Manager address in Server
Manager server was changed and not updated in Settings
Server Settings.
User Login Director Info This notification is sent whenever a user Informational only
tries to log in to the system.
Warm Start All devices Warning A warmStart trap signifies that the SNMP Informational only .1.3.6.1.6.3.1.1.5.2
entity, supporting a notification
originator application, is reinitializing
itself such that its configuration is
unaltered.