Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
|
xix | |
|
|
xxiii | |
Author Biography |
|
xxv | |
|
The NNM Project Deployment Plan |
|
|
1 | (24) |
|
|
2 | (2) |
|
Determining the Requirements that NNM Must Satisfy |
|
|
4 | (2) |
|
Sharing Project Plans and Information on a Web Site |
|
|
6 | (1) |
|
Drafting, Defining, and Finalizing an Operations Agreement |
|
|
7 | (1) |
|
Choosing Scalable Hardware at Each NNM Site |
|
|
8 | (3) |
|
Setting the Scope and Conducting a Pilot Test |
|
|
11 | (1) |
|
Identifying, Developing, or Buying NNM Training |
|
|
12 | (1) |
|
Defining Management Domains |
|
|
13 | (2) |
|
Planning for Ongoing Problem Resolution |
|
|
15 | (1) |
|
Planning for System, Database, and Map Backup and Recovery |
|
|
16 | (3) |
|
The Benefit of Using ITO for NNM System Management |
|
|
19 | (1) |
|
The Value of Consultants, System Admins, and Project Managers |
|
|
20 | (1) |
|
|
21 | (1) |
|
Planning for Operational Patching and Upgrading |
|
|
21 | (4) |
|
Planning a Robust Domain Name System |
|
|
25 | (20) |
|
|
26 | (1) |
|
Why DNS Is So Important to NNM |
|
|
27 | (2) |
|
The History of /etc/hosts |
|
|
29 | (1) |
|
Router Interfaces and DNS |
|
|
30 | (2) |
|
Reliability Designs for DNS |
|
|
32 | (2) |
|
The Purpose and Use of Delegation |
|
|
34 | (2) |
|
Sample DNS Configuration Files |
|
|
36 | (3) |
|
Loading Factors for DNS Systems |
|
|
39 | (2) |
|
|
41 | (1) |
|
Primary, Secondary, and Other Mysteries |
|
|
42 | (1) |
|
The Bigger Picture of a DNS Implementation |
|
|
43 | (2) |
|
Defining the Management Domain |
|
|
45 | (16) |
|
|
46 | (1) |
|
Determining the Communities of Interest in a Network |
|
|
47 | (2) |
|
Geographic Regions and Business Relationships |
|
|
49 | (1) |
|
Estimating the Size of a Management Domain |
|
|
50 | (2) |
|
Strategies for Defining and Discovering the Management Domain |
|
|
52 | (3) |
|
Configuration Files for Controlling the Management Domain |
|
|
55 | (6) |
|
The Excitement of First Discovery |
|
|
61 | (18) |
|
|
62 | (2) |
|
Discovery Without a seedfile |
|
|
64 | (1) |
|
Manually Guided Discovery |
|
|
65 | (1) |
|
Discovery Guided by a seedfile |
|
|
66 | (3) |
|
Demand Poll to Coax Along Discovery |
|
|
69 | (1) |
|
The Curse of Multiple SNMP Community Strings |
|
|
70 | (1) |
|
|
71 | (1) |
|
Fine-Tuning the Discovery Filter |
|
|
71 | (2) |
|
Tuning and Observing netmon Queues |
|
|
73 | (2) |
|
My Window Is Full of Icons |
|
|
75 | (1) |
|
Strategies for Containerizing the Internet Submap |
|
|
75 | (1) |
|
Saving Map Customizations |
|
|
76 | (2) |
|
Leveraging Lessons Learned With Other Map Builders |
|
|
78 | (1) |
|
Map Management Strategies |
|
|
79 | (16) |
|
|
80 | (1) |
|
Where The Read/Write Map Is Displayed |
|
|
81 | (3) |
|
Managing Map Customizations |
|
|
84 | (2) |
|
Using Autolayout and Overlay Features |
|
|
86 | (1) |
|
How NNM Uses the Repeater and Bridge MIBs |
|
|
86 | (2) |
|
Third-Party Map Management Tools |
|
|
88 | (1) |
|
Taking Screenshots of Maps |
|
|
88 | (2) |
|
Special Types of Network Devices |
|
|
90 | (5) |
|
Distributed Network Management |
|
|
95 | (16) |
|
|
96 | (1) |
|
The Management Station and Collection Station Relationship |
|
|
97 | (2) |
|
Configuring the Collection Station |
|
|
99 | (2) |
|
Deciding What Devices to Export |
|
|
101 | (2) |
|
Management Station SNMP Data Collection |
|
|
103 | (1) |
|
Monitoring NNM Systems With ITO and Measure Ware |
|
|
103 | (2) |
|
Configuring the Management Station |
|
|
105 | (2) |
|
Adding a Collection Station to an Operational Management Station |
|
|
107 | (2) |
|
The Impact of Rebuilding a Collection Station |
|
|
109 | (2) |
|
Configuration Management With NNM |
|
|
111 | (8) |
|
|
112 | (2) |
|
Nuggets in the Configuration Alarms Category |
|
|
114 | (1) |
|
|
115 | (1) |
|
Configuration Information Presented in NNM Maps |
|
|
115 | (1) |
|
|
116 | (1) |
|
Creating Custom Menu Items |
|
|
117 | (2) |
|
Event Management With NNM |
|
|
119 | (18) |
|
|
120 | (1) |
|
Managed vs. Unmanaged Devices |
|
|
121 | (2) |
|
Traps From Expected and Unexpected Sources |
|
|
123 | (3) |
|
syslog Streams from Devices and ovevent |
|
|
126 | (2) |
|
Predefined and Custom Alarm Categories |
|
|
128 | (1) |
|
Customizing Event Actions |
|
|
129 | (3) |
|
Managing Event Histories and trapd.log |
|
|
132 | (1) |
|
Reducing Event Storms with ECS |
|
|
133 | (4) |
|
Performance Management with NNM |
|
|
137 | (40) |
|
|
138 | (2) |
|
Who Needs Performance Data? |
|
|
140 | (4) |
|
Providing Data for an SLA |
|
|
144 | (1) |
|
Determining Performance Data Retention Intervals |
|
|
145 | (4) |
|
Estimating SNMP Data Sample Rates |
|
|
149 | (3) |
|
The Heisenberg Uncertainty Principle of SNMP Polling |
|
|
152 | (1) |
|
How Much Traffic Does NNM Create? |
|
|
153 | (3) |
|
SNMP Performance Data in MIB2 and Private MIBs |
|
|
156 | (2) |
|
Strategies for Setting Threshold Values |
|
|
158 | (4) |
|
How to Create MIB Expressions |
|
|
162 | (2) |
|
Viewing Performance Data Online |
|
|
164 | (1) |
|
Presenting Performance Data to the Consumer |
|
|
165 | (1) |
|
SNMPv2c and 64-bit Counters |
|
|
166 | (2) |
|
|
168 | (3) |
|
Crossing Over into HP NetMetrix |
|
|
171 | (1) |
|
|
171 | (3) |
|
|
174 | (3) |
|
Managing Firewall Environments With NNM |
|
|
177 | (14) |
|
|
178 | (1) |
|
Defining the DMZ Environment |
|
|
179 | (2) |
|
Working With the Corporate Security Group |
|
|
181 | (1) |
|
Special Security Configuration for UNIX in the DMZ |
|
|
182 | (2) |
|
Firewalls and NNM Port Usage |
|
|
184 | (2) |
|
Router Access Control Lists and NNM |
|
|
186 | (2) |
|
Packet Filtering With a Router |
|
|
188 | (1) |
|
|
189 | (2) |
|
Periodic Maintenance Tasks for NNM |
|
|
191 | (16) |
|
|
192 | (1) |
|
Using crontab Entries to Automate Backups |
|
|
193 | (1) |
|
Determining the Scope of the Backup |
|
|
194 | (2) |
|
|
196 | (1) |
|
Moving Newly Discovered Devices to Their Proper Container |
|
|
197 | (1) |
|
Backing Up Map Customizations |
|
|
198 | (1) |
|
Updating MIBs for New Devices |
|
|
199 | (1) |
|
|
199 | (2) |
|
Reviewing Configuration Alarms |
|
|
201 | (2) |
|
Perusing Log Files and Application Alarms |
|
|
203 | (1) |
|
Reviewing MeasureWare Data |
|
|
204 | (1) |
|
Perusing and Updating ITO Alarms |
|
|
205 | (2) |
|
|
207 | (12) |
|
|
208 | (1) |
|
Custom Performance Management |
|
|
209 | (2) |
|
|
211 | (1) |
|
Verifying Correct Menu Operation |
|
|
212 | (1) |
|
Validating a New Procedure |
|
|
213 | (1) |
|
Testing Third-Party Applications |
|
|
213 | (1) |
|
Validating Operating System Changes |
|
|
214 | (2) |
|
Conducting Directed Discovery |
|
|
216 | (1) |
|
Creating a Special Purpose Map |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (14) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Consulting the Map for Related Objects |
|
|
222 | (1) |
|
Device Names Change Unexpectedly |
|
|
222 | (1) |
|
Network Topology Autolayout Errors |
|
|
223 | (2) |
|
DHCP Reassigns an IP address |
|
|
225 | (1) |
|
|
226 | (3) |
|
Detecting an Impending License Expiration |
|
|
229 | (1) |
|
NNM GUI Problems on UNIX Systems |
|
|
230 | (3) |
|
Cross-Platform Issues With NNM |
|
|
233 | (8) |
|
|
234 | (1) |
|
|
234 | (2) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (10) |
|
|
242 | (1) |
|
Determining Users for the Read-Only Map |
|
|
243 | (1) |
|
Who Are the Keepers of the Maps? |
|
|
244 | (1) |
|
Who Creates MIB Applications? |
|
|
244 | (1) |
|
Who Troubleshoots NNM Itself? |
|
|
245 | (1) |
|
Who Resolves DNS Problems? |
|
|
246 | (2) |
|
Who Resolves NNM Problems? |
|
|
248 | (1) |
|
Who Performs System Administration? |
|
|
248 | (1) |
|
Who Develops Custom Applications? |
|
|
249 | (2) |
|
|
251 | (10) |
|
|
252 | (1) |
|
|
252 | (3) |
|
ITO Manages the NNM Systems |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (2) |
|
Dedicated System Administrator |
|
|
259 | (2) |
|
|
261 | (10) |
|
|
262 | (1) |
|
A Global Manufacturing Company |
|
|
262 | (2) |
|
A Natural Resource Company |
|
|
264 | (1) |
|
|
265 | (1) |
|
A Local Vehicle Manufacturer |
|
|
265 | (1) |
|
|
266 | (1) |
|
A National Consulting Company |
|
|
267 | (1) |
|
|
268 | (1) |
|
A Worldwide Computer Company |
|
|
268 | (3) |
Glossary |
|
271 | (40) |
Index |
|
311 | |