Default Configuration
- Enterprise IT
- Shilpa K (Deactivated)
- Mayuresh Balaji Kamble (Unlicensed)
You can configure default details of Servers, Network and Printers in the DEFAULT CONFIGURATION page. This is a one time configuration and the configured details are fetched while adding new Servers, Network or Printers.
To configure default details:
- Select Operations > Configuration > General > Default Configuration. The DEFAULT CONFIGURATION page is displayed.
You can configure default templates for the following devices:
ServerTo Configure a template for Server, the Server Configuration, Service Entitlement, Alert and Log Incident, and Thresholds tabs should be configured.
Server Configuration:
Fill in the required details. For more information about fields on the Server Configuration tab of DEFAULT CONFIGURATION page, see Field Description.
Figure: Default Configuration Page - Server Tab
Field DescriptionThe following table describes the fields on Server tab of the DEFAULT CONFIGURATION page:
Field
Description
Tenant
Select the Tenant for which you want to configure the template.
Template Name
Specify a name for the template.
Device Type
Select the device for which you want to configure the template. For example: Server, Network or Printer.
Is Default
If selected, this configuration is applied by default to all the servers of the Tenant.
Active
Select the checkbox to make this template active.
Server Type
Lists the configured Server types. Select the Server type from the list.
Vendor
Lists the configured vendors. Select the vendor from the list.
Operating System
Lists the configured operating system types. Select the operating system from the list.
Location
Lists the configured locations. Select the location from the list.
Customer
Lists the configured customers. Select the customer from the list.
Criticality
Lists the configured Criticality value for a Server. Select the Criticality from the list as High, Medium, or Low.
Server Category
Lists the configured Categories of the Servers. Select a Category from the list.
Ping Protocol
Lists the configured protocols.
- ICMP: The Internet Control Message Protocol (ICMP) is one of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached..
- TCP: The Transmission Control Protocol (TCP) is one of the main protocols in TCP/IP networks. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
- UDP: The User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet.
Select a protocol from the list using which the Server should communicate with other Servers.
Ping Timeout
Type in the ping time out for the Server. Within the specified time, the Server communicates the destination IP address for the Server to reach and record results.
Ping Retry
Type in the number of times the ping operation need to be repeated with another Server.
Note: If the system fails to communicate with the Server even after the specified number of times, an alert e-mail is sent to the configured members.Monitor By
Lists the configured monitoring network protocols. Select any one monitoring protocol from the list. Based on the option you select, some additional fields are displayed. Type in the details as required.
- SNMP: The Simple Network Management Protocol (SNMP) is an internet-standard protocol for managing devices on IP networks. It is used for collecting information from, and configuring, network devices, such as Servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.
- WMI: The Windows Management Instrumentation (WMI) protocol consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification. It is used to mainly monitor the events status that are configured in the Server.
- SSH: SSH, is an encrypted network protocol for initiating text-based shell sessions on remote machines in a secure way. This allows a user to run commands on a machine's command prompt without them being physically present near the machine. It also allows a user to establish a secure channel over an insecure network in a client-Server architecture, connecting an SSH client application with an SSH Server.
- Telnet: Telnet offers users the capability of running programs remotely and facilitates remote administration. Telnet is available for all operating systems and eases integration in varied networking environments.
- Agent: Agent monitors and sends the data in regular intervals and sends the data to the configured Server.
- None: If selected, indicates none of the monitoring protocol is selected for monitoring purpose.
If Monitor by is selected as Agent
If Monitor by is selected as Agent, the following fields are displayed.
- WMI user: Lists the configured WMI user names. Select a WMI user name from the list.
- WMI Timeout: By default, 10 seconds is displayed. You can edit the time out as required.
If a Server is monitored using the WMI ping protocol and if the Server does not respond in the given time out period, it is considered that the Server is not functioning.
If Monitor by is selected as SSH
If Monitor by is selected as SSH, the following fields are displayed.
- SSH User:Type in the SSH User name.
- SSH Port:Type in the SSH port number using which, the Server monitors the specified services.
If Monitor by is selected as Telnet
If Monitor by is selected as Telnet, the following fields are displayed.
- Telnet User: Type in the Telnet user name.
- Telnet Port: Type in the telnet port number using which the Server monitors the specified Servers or services.
If Monitor by is selected as WMI
If Monitor by is selected as WMI, the following fields are displayed.
- WMI Timeout:By default, 10 seconds is displayed. You can modify the default time out as required.
- WMI User: Type in the WMI user name.
Monitor Source
Lists the configured monitoring source types as:
- Summit Server: It refers to the machine, where SUMMIT Server is installed. Select this option to perform the monitoring operation from this Server.
- Proxy Server: It refers to the machine configured at a client location for sending monitored data of the client machines to the SUMMIT Server. Select this option to perform the monitoring operation from this agent.
Monitor By Proxy
Lists the configured Proxy Servers. Select the Proxy Server from the list.
Ping By Proxy
Allows to check the status of the Server by proxy ping, if the checkbox is selected.
SOP Template
Lists the configured SOP templates. Select a SOP template to map the SOP to the Server.
SNMP Community String
Displays the SNMP string for the Server.
Mail To
Type in the e-mail address of the people to whom the alert and notification
e-mails about the Server status need to be sent in “To” list.
Mail Cc
Type in the e-mail address of the people to whom the Alert/Notification e-mails about the Server status need to be sent in “Cc” list.
Description
Type in a brief description about the Server.
Service EntitlementSelect the Service Entitlement from the list for Windows Server and Non Windows Server. The specified Service Entitlement defines the monitoring services for the parameters, such as CPU and Memory, HDD, and so on for the selected Server. To create a new Service Entitlement, click and specify the required details.
For more information about configuring Service Entitlements, see Configuring Service Entitlements.
Figure: Default Configuration Page - Service Entitlement TabAlert and Log IncidentYou can configure Alerts and log Incidents for the Server based on the Monitoring Parameters data. On the Alert and Log Incident tab of DEFAULT CONFIGURATION page, you can configure the Alerts and Incidents , and map the Incident Templates and Action Templates. For more information about configuring Alerts and Log Incidents, see Configuring Alerts And Log Incidents for Proxy Servers.
Figure: Default Configuration page - Alert and Log Incident tabThresholdsYou can configure Thresholds for the Server based on the Monitoring Parameters data. On the Thresholds tab of DEFAULT CONFIGURATION page, you can configure the thresholds to the various parameters of a server.
Figure: Default Configuration Page - Thresholds tabNetworkTo Configure a template for Network Link or Network Device, the Network Configuration, Service Entitlement, Alert and Log Incident, and Thresholds tabs should be configured.
Network Configuration:
Fill in the required details. For more information about fields on the Network Configuration tab of DEFAULT CONFIGURATION page, see Field Description.
Figure: Default Configuration Page - Network Configuration tabField Description
The following table describes the fields on Network tab of the DEFAULT CONFIGURATION page:
Field
Description
Tenant
Select the Tenant for which you want to configure the template.
Template Name
Specify a name for the template.
Device Type
Select the device for which you want to configure the template. For example: Server, Network or Printer.
Is Default
If selected, this configuration is applied by default to all the servers of the Tenant.
Active
Select the checkbox to make this template active.
Is Monitor through NAT IP
(Optional) Specify the NAT IP address for a device. NAT IP Address refers to the public IP address for the External Server to enable Network Monitoring from this application. If selected, the field is enabled to enter the NAT IP address and it is a mandatory field. If not selected, this field is disabled and you cannot enter the NAT IP address.
SNMP Version
Lists the SNMP Versions:
- SNMP V1
- SNMP V2c
- SNMP V3
By default, the value is displayed as SNMP V2c.
Note: SNMP V3 requires an authentication and login credentials for managing a device on the network. SNMP V3 provides important security features, such as confidentiality to prevent snooping by an unauthorized source, message integrity to avoid data tampering, and authentication to validate the source.Authentication Type
If the SNMP Version is selected as SNMP V3. Displays the following list of Authentication Types:
- AuthNoPriv: If selected, you need to specify the authentication details. You have to select the SNMP user and authentication mode( SHA or MD5)
- AuthPriv: If selected, you need to specify the SNMP user, authentication mode, privilege password, and privilege protocol.
- NoAuthNoPriv: If selected, authentication and privilege is not applicable. Select the SNMP user from the list.
SNMP Community String
This field is displayed after you select SNMPVersion as SNMP V1 or SNMP V2c options. By default, it displays the value as Public. Type in the SNMP community string of the device, which is provided by the Network Operator.
Note: This field is disabled after you select SNMPVersion as SNMP V3 option.SNMP Username
This field is displayed after you select SNMP Version as SNMP V3 option. Type in the SNMP user name.
SNMP Password
This field is displayed after you select SNMPVersion as SNMP V3 option. Type in the SNMP password.
Privilege Password
Specify the privilege password for the authentication. This option is enabled if the Authentication Type is specified as Auth Priv.
Privilege Protocol
Lists the types of Privilege Protocol. Select the Privilege Protocol from the list.
SNMP Port
Specify the SNMP port name.
IOS
Lists the configured Internet Operating System (IOS) types. Select an IOS Type from the list.
Criticality
Lists the options to specify the Criticality of a device: Low, Medium, and High. Select an option from the list box based on the criticality of a device.
Customer
Lists the configured Customer names. Select a Customer name from the list box for which the device is installed.
Vendor
Lists the configured Vendors names. Select a Vendor name from the list box.
Note: These Vendor names are appended to the list each time a device from a new vendor is added during the discovery process.Location
Lists the configured Locations. Select the Location of a device.
Ping Protocol
Lists the configured protocol names. Select a protocol using which you want to communicate with the device.
Ping Timeout (ms)
Type in the Ping Time Out for the Network Device. In the specified time, the Network Device communicates the destination IP address for the Network Device to reach and record results.
Ping Retry
Type in the number of times the Ping operation need to be repeated with the Network Device that you are adding.
SOP Template
Lists the configured Standard Operating Procedures templates. Select a SOP template from the list.
Mail To
Type in the e-mail address of the people to whom the alert / notification mails about the device status should be sent in “To” list.
Mail CC
Type in the e-mail address of the people to whom the alert/ notification e-mails about the device status need to be sent in “CC” list.
Remarks
Type in any notes or comments about the network device.
Service EntitlementSelect the Service Entitlement from the list for Network Device and Network Link. The specified Service Entitlement defines the monitoring services for the parameters, such as CPU and Memory, HDD, and so on for the selected Network Device. To create a new Service Entitlement, click and specify the required details.
For more information about configuring Service Entitlements, see Configuring Service Entitlements.
Figure: Default Configuration Page - Service Entitlement tabAlert and Log IncidentYou can configure Alerts and log Incidents for the Network Device based on the Monitoring Parameters data. On the Alert and Log Incident tab of DEFAULT CONFIGURATION page, you can configure the Alerts and Incidents , and map the Incident Templates and Action Templates. For more information about configuring Alerts and Log Incidents, see Configuring Alerts And Log Incidents.
Figure: Default Configuration page - Alert and Log Incident tabThresholdsYou can configure Thresholds for the Network Device based on the Monitoring Parameters data. On the Thresholds tab of DEFAULT CONFIGURATION page, you can configure the thresholds to the various parameters of a server.
Figure: Default Configuration Page - Thresholds tabPrintersTo Configure a template for Printer, the Printer Configuration, Service Entitlement, Alert and Log Incident, and Thresholds tabs should be configured.
Network Configuration:
Fill in the required details. For more information about fields on the Printer Configuration tab of DEFAULT CONFIGURATION page, see Field Description.
Figure: Default Configuration Page - Printer Configuration tabField Description
The following table describes the fields on Network tab of the DEFAULT CONFIGURATION page:
Field
Description
Tenant
Select the Tenant for which you want to configure the template.
Template Name
Specify a name for the template.
Device Type
Select the device for which you want to configure the template. For example: Server, Network or Printer.
Is Default
If selected, this configuration is applied by default to all the servers of the Tenant.
Active
Select the checkbox to make this template active.
Vendor
Select the vendor of the Printer.
Printer Server
Lists the configured Printer Servers. Select the Printer Server from the list.
Customer
Lists the configured Customers. Select the Customer from the list.
Location
Lists the configured Locations. Select the Location from the list.
High Toner Level
Specify the high toner level for the Printer.
Medium Toner Level
Specify the medium toner level for the Printer.
Low Toner Level
Specify the low toner level for the Printer.
Ping Timeout
Type in the ping time out (in milliseconds) for the Printer. In the specified time the Server checks the destination Printer and records the result.
Ping Retry
Type in the ping retry number. The ping retry number indicates that the Print Server would try to communicate with the Printer for the specified number of times.
Note: If the Printer Server fails to communicate with the Printer even after the specified retries, an alert e-mail is sent to the configured recipients.SOP Template
Specify the unique reference identification number for the device.
Note: If the reference ID is not configured, the unique identification number of the device is displayed in device details.Mail To
Type in the e-mail address of the users to whom the alert/notification e-mails about the printer status should be sent in “To” list.
Mail CC
Type in the e-mail address of the users to whom the alert/notification e-mails about the Printer status need to be sent in “CC” list.
Description
Type in the brief description about the Printer.
Service EntitlementSelect the Service Entitlement from the list for Printer. The specified Service Entitlement defines the monitoring services for the parameters, such as CPU and Memory, HDD, and so on for the selected Server. To create a new Service Entitlement, click and specify the required details.
For more information about configuring Service Entitlements, see Configuring Service Entitlements.
Figure: Default Configuration Page - Service Entitlement TabAlert and Log IncidentYou can configure Alerts and log Incidents for the Printer based on the Monitoring Parameters data. On the Alert and Log Incident tab of DEFAULT CONFIGURATION page, you can configure the Alerts and Incidents , and map the Incident Templates and Action Templates. For more information about configuring Alerts and Log Incidents, see Configuring Alerts And Log Incidents.
Figure: Default Configuration page - Alert and Log Incident tabThresholdsYou can configure Thresholds for the Printer based on the Monitoring Parameters data. On the Thresholds tab of DEFAULT CONFIGURATION page, you can configure the thresholds to the various parameters of a server.
Figure: Default Configuration Page - Thresholds tabClick SUBMIT. The default details of Server,Network and Printer are configured.
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ