Raritan Computer CC-NOC User Manual

Commandcenter, Quick installation and setup guide

Advertising
background image

CommandCenter

®

NOC

Quick Installation and Setup Guide

For more detailed instructions, please consult the Administrator Guide found on the enclosed CD-ROM or on the web at www.raritan.com. Rev. B May 2006 255-80-5320

I. Planning and Preparation

Client PC Planning

Access CC-NOC through a serial port on a
PC with a terminal emulation program
(Hyper Terminal, Tera Term, etc.) for initial
setup. Additional configuration is carried out
through a web browser. The browser must
have Javascript enabled to function correct-
ly. These browsers and operating systems
are supported on the client PC:

Browser

OS

IE 6.0

Win2K

Mozilla 1.7

Win 2K, Win XP, Solaris 10

Mozilla 1.7

RedHat9

Mozilla Firefox 1.0 Win 2K, Win XP, Solaris 10
Mozilla Firefox 1.0 RedHat9
Netscape 7.2

Win 2K, Win XP, Solaris 10

Netscape 7.2

RedHat9

Primary Information
Prior to setup, collect this information:

-

IP address of CC-NOC: CC-NOC must

have a static IP.

-

IP address of Discovered Devices:

Identify the addresses (or range) that
should be managed by a CC-NOC.

-

DNS Addresses: CC-NOC must know

the DNS servers used for host resolution.

-

Timezone: Specify the correct time

zone for accurate reporting.

-

Email Communication Requirements:

CC-NOC must be able to send SMTP traffic
to send notifications of events.
Secondary Information
You should also consider:

-

ISP Gateway: Monitor your ISP connec-

tion, supply the ISP Gateway address.

-

SNMP Community Strings: Receive

traps and gather performance information
from SNMP-enabled node, supply commu-
nity strings for the systems you want to col-
lect performance data for.

-

NTP Server: Synchronize clocks over a

network using NTP protocol, install a NTP
server.
CommandCenter Secure Gateway
If you plan on using a CC-SG in conjunction
with a CC-NOC, you must know the IP
address of the CC-SG. If using a CC-NOC
5.2 with CC-SG, the time settings on both

systems must be configured to use an NTP
server for synchronization.
Windows Proxy
You must have a proxy to collect Windows
Management Instrumentation (WMI) data.

Note: Both CC-NOC 100 and CC-NOC 250
require configuration of an external proxy,
but if you are using a CC NOC 2500M in a
distributed environment, you can use the
internal proxy of the CC-NOC 2500M.
Spanned/Mirrored Ports
Devices must be able to see packets pass-
ing on a network in order for intrusion detec-
tion and network performance to function
properly. They require configuration of a
spanned or mirrored port.
Ethernet TAP
Instead of using a spanned or mirrored port,
an Ethernet tap could be used that may be
considered a more secure method in which
to listen to network traffic than a spanned
port. Place the Ethernet tap on the Ethernet
cable in the same location where an
Ethernet hub would be used.

Identify Hardware and Software in Your Network

Thank you for purchasing Raritan’s CommandCenter NOC (CC-NOC). The primary function of a CC-NOC is to man-
age nodes in your network. Nodes are discovered automatically if their IP address is within the
managed range of addresses. In addition to network discovery, a CC-NOC also provides service management, a data-
base of network information, a rules engine, a notification engine, and a web server. A CC-NOC can also be instructed
to collect statistics from your Windows systems, monitor network traffic for intrusion attempts and bandwidth perform-
ance, and scan your systems for vulnerabilities.

You may need to identify the software and hardware in your network for software auditing or compliance reporting. With
CC-NOC, you can. With a few clicks, you can find out the number of Microsoft Office XP Professional licenses that have
been installed or the manufacturer of all your equipment.

Monitor Outage and Network Availability

A CC-NOC continuously monitors your dynamic network and keeps the people (admins) who need to know informed of
important network changes and events. DBAs want to know if mission critical database servers go down. A notification
will go out only to the pertinent DBAs. Therefore, a network event is closely mapped to relevant IT expertise.

Identify Security “Hot Spots” and Improve Network Security

To help you plan for improved security or assist in compliance activities (for example, Sarbanes-Oxley), you can run
intrusion detection reports to identify potential “hot spots” in your network or to ensure that your most mission-critical or
key infrastructure machines (those with financial data) have not been attacked. Once identified, you can then increase
security by adding firewall rules to those machines or changing the settings to be more restrictive.

Identify Vulnerabilities on Your Systems

Once configured, a CC-NOC looks for vulnerabilities on specified nodes in the network and works in conjunction with
the authentication credentials used by Windows Management. Using the Vulnerability Browser, trends can be identified.
Links to the public Common Vulnerabilities and Exposure List database http://www.cve.mitre.org are provided to pro-
vide more information about the vulnerabilities. With a few clicks, you can install Microsoft patches on machines that
have vulnerabilities.

Capacity Planning and Traffic Analysis

With CC-NOC, you can analyze your traffic to help with capacity planning of your networks or to determine the reason
for spikes in your network. Using traffic analysis will help in identifying the source host if you are experiencing a slow-
down in your network. Traffic summaries can be analyzed to identify potential problems in your network or to prevent
problems from ever occurring.

View Syslog Events on CC-NOC

A syslog receiver is registered on a CC-NOC. To forward syslog events to a CC-NOC appliance, enter the IP address
of the CC -on a wireless router (e.g., Netgear, Linksys) that is connected to your Unix, Linux machines. The syslog
severities are mapped to corresponding severities on the CC-NOC.

Questions? Contact Raritan Support: 1-800-724-8090, press 6, press 1.

FAX: 732-764-8887 email: [email protected]

http://www.raritan.com

II. Physical Installation (all models)

CC-NOC ships with:

- (1) Appliance, 1U, rack-mountable

- (1) Standard US power cord

- (1) Null-modem cable

If any pieces are missing, please contact
Raritan Support.

1.

Record the serial number for later use.

The number begins with CPP and can be
found on the bottom of the unit.

SERIAL:___________________________

2.

Mount the appliance safely in a rack or

place on a desktop/shelf.

3.

Plug a Category 5 ethernet cable into

the Management port (labeled LAN 1). Plug
the other end of this cable into an ethernet
hub/switch that can communicate with the
network to be managed.

4.

Plug a second ethernet cable into the

Monitor port (LAN 2). Plug the other end of
this cable into a “promiscuous port” (often
called “spanned” or “mirrored” port) on the
switch or any port on a shared-media hub.
Please see Raritan’s CC-NOC User Guide

for details on spanned ports.

Note: Step 4 applies only to CC-NOC
100/250 or CC-NOC 2500S.

5. Plug the power cord into the power inlet
on the CC-NOC unit. Plug the other end of
the power cord into a nearby power source.

6. Power ON the unit.

7. The system will boot and the power LED
on the front of the appliance will illuminate.
Wait approximately five minutes for the sys-
tem to complete initial startup tasks before
proceeding.

Diagram Key

1.

Serial Port

2.

USB

3.

LAN1

4.

LAN2

5.

Power Inlet

6.

Power Button

7.

Power LED

8.

Printer Port

9.

Monitor Port

10.

Keyboard, Mouse Ports

11.

Reset Button

12.

Disk Access LED

13.

LAN1 LED

14.

LAN2 LED

15.

CPU Overheat LED

Access CommandCenter Secure Gateway (CC-SG)

Associating a CommandCenter Secure Gateway (CC-SG) with a CC-NOC allows your users more flexibility when solv-
ing issues by giving them direct KVM (Keyboard, Video, Mouse) access to problem devices. CC-NOC users can be
authenticated remotely by CC-SG to provide an enhanced seamless mode of operation and Single Sign-on (SSO)
access to CC-SG targets. With one-click access to CC-SG and SSO access to targets, a CC-NOC user can move eas-
ily between systems.

10

5

2

1

3

4

14 12 11

6

8

15 13

7

9

Advertising