Server AG v632 733-1574
Server AG v632 733-1574
nGeniusONE | nGenius for Flows | nGenius Configuration Manager | nGenius Session Analyzer |
nGenius Subscriber Cache | nGenius Performance Manager
NETSCOUT Server Administrator Guide
Use of this product is subject to the End User License Agreement available at http://www.NetScout.com/legal/terms-and-
conditions or which accompanies the product at the time of shipment or, if applicable, the legal agreement executed by and
between NetScout Systems, Inc. or one of its wholly-owned subsidiaries (“NETSCOUT”) and the purchaser of this product
(“Agreement”).
Government Use and Notice of Restricted Rights: In U.S. government (“Government”) contracts or subcontracts, Customer will
provide that the Products and Documentation, including any technical data (collectively “Materials”), sold or delivered pursuant
to this Agreement for Government use are commercial as defined in Federal Acquisition Regulation (“FAR”) 2.101and any
supplement and further are provided with RESTRICTED RIGHTS. All Materials were fully developed at private expense. Use,
duplication, release, modification, transfer, or disclosure (“Use”) of the Materials is restricted by the terms of this Agreement and
further restricted in accordance with FAR 52.227-14 for civilian Government agency purposes and 252.227-7015 of the Defense
Federal Acquisition Regulations Supplement ("DFARS") for military Government agency purposes, or the similar acquisition
regulations of other applicable Government organizations, as applicable and amended. The Use of Materials is restricted by the
terms of this Agreement, and, in accordance with DFARS Section 227.7202 and FAR Section 12.212, is further restricted in
accordance with the terms of NETSCOUT’S commercial End User License Agreement. All other Use is prohibited, except as
described herein.
This Product may contain third-party technology. NETSCOUT may license such third-party technology and documentation
("Third-Party Materials") for use with the Product only. In the event the Product contains Third-Party Materials, or in the event
you have the option to use the Product in conjunction with Third-Party Materials (as identified by NETSCOUT in the
Documentation provided with this Product), then such third-party materials are provided or accessible subject to the applicable
third-party terms and conditions contained either in the “Read Me” or “About” file located in the Software or on an Application
CD provided with this Product, or in an appendix located in the documentation provided with this Product. To the extent the
Product includes Third-Party Materials licensed to NETSCOUT by third parties, those third parties are third-party beneficiaries of,
and may enforce, the applicable provisions of such third-party terms and conditions.
Open-Source Software Acknowledgement: This product may incorporate open-source components that are governed by the GNU
General Public License ("GPL") or licenses that are compatible with the GPL license (“GPL Compatible License”). In accordance
with the terms of the GNU GPL, NETSCOUT will make available a complete, machine-readable copy of the source code
components of this product covered by the GPL or applicable GPL Compatible License, if any, upon receipt of a written request.
Please identify the product and send a request to:
To the extent applicable, the following information is provided for FCC compliance of Class A devices:
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
Modifications to this product not authorized by NETSCOUT could void the FCC approval and terminate your authority to
operate the product. Please also see NETSCOUT’s Compliance and Safety Warnings for NetScout Hardware Products
document, which can be found in the documents accompanying the equipment, or in the event such document is not
included with the product, please see the compliance and safety warning section of the user guides and installation
manuals.
No portion of this document may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or
machine form without prior consent in writing from NETSCOUT. The information in this document is subject to change without
notice and does not represent a commitment on the part of NETSCOUT.
The products and specifications, configurations, and other technical information regarding the products described or referenced
in this document are subject to change without notice and NETSCOUT reserves the right, at its sole discretion, to make changes
at any time in its technical information, specifications, service, and support programs. All statements, technical information, and
recommendations contained in this document are believed to be accurate and reliable but are presented "as is" without
warranty of any kind, express or implied. You must take full responsibility for their application of any products specified in this
document. NETSCOUT makes no implied warranties of merchantability or fitness for a purpose as a result of this document or
the information described or referenced within, and all other warranties, express or implied, are excluded.
Except where otherwise indicated, the information contained in this document represents the planned capabilities and intended
functionality offered by the product and version number identified on the front of this document. Screen images depicted in this
document are representative and intended to serve as example images only.
733-1574-F
210409
Table of Contents 4
Revision History
Date Revision Reference Summary
April 2021 A NETSCOUT Administrator See What's New in 6.3.2.
Guide
May 2021 B Migrating from PM to Updated verification section for
nGeniusONE Verification migrating from Performance
Manager to nGeniusONE.
What's New in 6.3.2 Updated supported products list for
Red Hat Linux 8 and Oracle Linux 8
Support feature.
C Exclude Certain Digit Added mpcExcludeList section for
Values in MPC Searches NS-88162.
Splunk Dashboard App Updates to Splunk procedures.
July 2021 D Supported Upgrade Paths 6.3.2 Build 854 release
Authentication: SAML
nGenius CM
August 2021 E Configuring nGenius Removed the LocalConf config
Subscriber Cache Digit sections for nGenius Subscriber
Types Cache (SCS) digit types
Understanding License Updates to Cloud Adaptor Smart
Types and Options Edge Monitoring license.
F System Requirements Added minimum partitioning
requirements.
Register Key to Generate Updated to reflect current
License MasterCare process.
To successfully perform the administration tasks in this guide, you should be familiar with these
concepts and products:
l TCP/IP networking environments
l Web servers and browsers
l The operating system applicable to your network (Linux or Windows)
For current information about new features and enhancements, resolved issues, and known
issues with software, refer to each product's release notes. For information on using
nGeniusONE and other products' modules, refer to the online help included with the software.
For documentation related to other NETSCOUT products, visit https://my.NETSCOUT.com.
Note: Certain nGeniusONE installers include the legacy Performance Manager features and
client software. Refer to the Installer Reference for details.
Note: nGenius for Flows servers, which are used to manage and monitor MIB-II devices,
follow the same guidance for Standalone, Global Manager, and Dedicated Global Manager
servers. An nGenius for Flows server is set up as one of those types, then enabled with an
nGenius for Flows license (see nGenius for Flows Servers).
server. When integrated with nGeniusONE, this product retrieves configurations from the
managing server (which applications to transmit to the Pulse server), and accesses certain
statistics computed on the nGeniusONE server about the monitored data. It does not
transmit ASI data. Note that integration requires additional steps, as mentioned in Pulse
l nGenius Subscriber Intelligence — (nSI) This service provider solution provides session
tracing and analysis. This server type uses the ASRs from nGeniusONE deployments. It can
be integrated to use the User Management and Authentication options from the managing
server. See the nGenius Subscriber Intelligence documentation for more details, including
installation and configuration instructions.
A Standby Server is paired with an Active Server, which is either a DGM or Local Server, and
backs up all the data produced and stored on the Active Server. The Standby Server
automatically assumes the duties of the Active Server when it fails. Failback is not supported. A
Standby Server cannot revert back to a former Active Server.
To enable a converted server to act as a DGM Primary and vice-versa, apply both DGM and
Standby licenses to both Primary DGM and Standby servers.
l If three consecutive Primary server health checks fail, the Standby server promotes itself as
Primary after six minutes at minimum (3*2=6 min).
l If each server has its own certificate, a Standby server with an imported SSL certificate will
transition and activate properly in the event of failure.
l Set standby.auto.fail.over.enable=false if you want to deactivate Automated Failover and
convert to Standby manually.
1.1.7 Software
The standard nGeniusONE Server package contains the following software to be used in the
event that reinstalling the software and/or operating system is required:
l Restore DVD: CentOS 7 based kernel image and the installer for the Linux-based
nGeniusONE (and nGenius Performance Manager) application and nGenius Subscriber
Intelligence.
l Application DVD: Installer for the nGeniusONE application only. A DVD is provided for
both Windows and Linux installers.
For software only or virtual deployments, a Restore DVD is not applicable. For these
deployments, a list of those installers is provided in Options for Virtual Environments
NETSCOUT software and documentation are also available online by logging into your
MasterCare account at: https://my.NETSCOUT.com.
For information on configuring nGeniusONE features and functionality, see nGeniusONE Feature
Configuration
For nGenius Session Analyzer and nGenius Subscriber Cache, integration is done in each related
product's Server and Users > Authentication Source module instead of adding each server as
a child server in the nGeniusONE or nGenius Configuration Manager Server Management.
nGenius Session Analyzer and nGenius Subscriber Cache have separate installers but share
underlying architecture with nGeniusONE, so the basic setup of these products are the same as
nGeniusONE.
Use these sections to prepare, install or upgrade, configure, and maintain nGeniusONE, nGenius
Session Analyzer, or nGenius Subscriber Cache servers:
l Preparation
l Installation and Upgrade
l Server Configuration
l Maintenance
Since integrating this server type also affects authentication, the integration is done in the
nGenius Session Analyzer Server and Users > Authentication Source GUI, rather than adding
it directly as a child server in the nGeniusONE or nGenius Configuration Manager Server
Management GUI. You can add a second nGenius Session Analyzer server through nGenius
Session Analyzer Server Management to create a distributed cluster. The installer automatically
configures the server so it is not necessary to specify Global or Standalone.
After completing the above steps, you are prepared to perform an installation or upgrade and to
install the license and configure the server.
Note:
l The installer runs a System Resource Check to ensure that the minimum resources are
available for operation. This check ensures that the minimum memory, minimum
processor capacity, and approved operating system are available. For Linux servers the
check also verifies the existence of the necessary RPMs before continuing with the
installation or upgrade.
l In a distributed environment, the System Resource Check is run on the Global Manager
and all of its child Local Servers. The minimum resources must be available on each of
these servers. If the minimum is not met, the upgrade is aborted and none of the
servers is upgraded. This ensures that all of the servers in a distributed environment
are capable of an upgrade and that the Global Manager can perform remote upgrades.
l NETSCOUT products are designed and tested on dedicated servers. Third-party network
management software, database agents, port scanners, and security software installed
on the same server may lead to port conflicts and compromise the behavior and
performance of the NETSCOUT products.
Table 2.1 - Server Platform Requirements
Component Specification
Operating system Oracle Linux 8-8.3
Red Hat Enterprise Linux 7-8.3
CentOS 7-7.8
l Red Hat Linux 6 and CentOS 6 OS stopped receiving maintenance updates in
November 2020. In alignment, NETSCOUT has deprecated support. nGenius
servers still support these versions, but support in future releases is not
guaranteed.
l Red Hat Linux 7 and CentOS 7 are still supported.
Windows 2012 R2, 2016, 2019
NOTE: Recent patches and software releases for nGeniusONE include OpenJDK
Runtime Environment build 11.0.10+9 and Apache Tomcat to 9.0.35.
Refer also to Options for Virtual Environments
Processors1 Minimum of 8 CPUs, depending on your deployment. See example section below.
Memory l Minimum: 48 GB
l Recommended: 64 GB
nGenius Subscriber Cache - Based on network size and varies per customer.
Recommended is 256 GB, but may require up to 384 GB.
Storage RAID 5
l Minimum: 500 GB
l Recommended: 4 TB
Partitioning minimum
l /var - 20GB
l /tmp - 20GB
After granting the necessary space to the OS, NETSCOUT recommends allocating all
remaining space to /opt for the NETSCOUT dbone database.
Media device DVD drive
Power supply Dual, redundant power supplies
configuration
Component Specification
IP address Static IP address
NOTE: Before installing on a server that has two or more NIC cards with different IP
addresses, verify that the IP address to be used by the server is listed first in your
system hosts file, as described in Configure Basic Networking.
Access privileges You must have read, write, create, and delete privileges for the directories or folders
where you install/upgrade nGeniusONE (root user for Linux ; Administrator for
Windows)
DirectX DirectX 8.1 or higher. In addition, all graphics hardware and drivers must fully support
(Windows only) the appropriate DirectX version. You can download and install the most recent DirectX
version from the Microsoft website.
1 An nGenius Configuration Manager Server has fewer requirements since it is not providing analytics processing.
A minimum of 16GB of memory and 8 CPUs is recommended.
The following table shows virtual nGenius Session Analyzer server requirements.
Language Support
NETSCOUT servers are supported for use in English, Japanese, Korean, and Simplified Chinese.
You must configure the server for an alternate language prior to beginning your installation, or
remove/reinstall the software, to change the language. You also must select a language choice
during installation.
If you choose to use a custom-built server, note that system requirements vary for small or very
complex deployments. NETSCOUT recommends that your server meet or exceed the
specifications contained in System Requirements, above, and that you work with your local
NETSCOUT representative for guidance specific to your environment. If you are preparing to
install the NETSCOUT Server software on a custom-built server, review the additional
recommendations listed below.
l Disable any remote connection software (such as pcAnywhere or Dell OpenManage) that is
running.
l Disable any defragmentation software (such as Diskeeper) on the directory where
NETSCOUT software will be installed.
l Exclude the NETSCOUT directory from your anti-virus scanning to prevent locking
problems.
l Review the section on ports to ensure no port conflicts occur in your environment or on
your custom server, if applicable.
l ICMP Ping must be open to allow communication between the nGeniusONE Server and
physical data sources such as InfiniStream appliances.
l For 6.3.1 and later fresh installs, nGeniusONE uses port number 8443 for client HTTPS
connections by default. If you prefer, you can specify a different web server port number
and protocol. Note, however, that if you change communication port numbers, you will
need to adjust the communication port configured on the monitoring data sources.
For guidance modifying ports, refer to related topics in the maintenance section of this
guide and to the InfiniStream Hardware Appliance Administrator Guide.
Component Specification
Recommended Browsers Chrome 80 or higher
Firefox 75 or higher
Edge 44 or higher
Safari 13 or higher
IE 11 is supported but not recommended for these reasons:
l Frequently vulnerabilities
l Lack of support
l Performance not equal to other browsers
Recent patches and software releases for nGeniusONE include an important
JRE update to 1.8_241.
The following additional software is required to use nGenius Performance
Manager:
l Adobe Flash Player 32-bit1
l Java Runtime Environment (JRE) v1.8.0_121 or later
If using Performance Manager Java client plugin access, you must use Internet
Explorer 11 with the Java plugin.
Processor 2 GHz or higher
Available operating 2 GB free memory or higher
system memory
Available disk space 250 MB or higher
Desktop Display Settings Desktop resolution: 1024 x 768 minimum
*nGeniusONE, Virtual nGeniusONE, nGenius Performance Manager, and nGenius for Flows only.
To upgrade from an earlier version, you must first upgrade to one of the above versions.
NETSCOUT recommends performing a database backup before upgrading.
Always upgrade servers before the data sources. The NETSCOUT server also supports remote
upgrade for certain data sources, such as InfiniStream appliances. Refer to the online help for
guidance using server management and device configuration to remotely upgrade supported
data sources, or to the data source documentation for manual upgrade instructions.
Note: The nGeniusONE installer overwrites existing iptables file (or firewall rules). If you wish
to preserve the current configuration, make a record of the settings you need to preserve.
After installing nGeniusONE, refer to the recorded settings to modify the new iptables file. Do
not overwrite the new file.
Web port This is the port for users to access the GUI; 8443
by default for fresh installs; previous value for
upgrades from pre-6.3.1 releases.
Web protocol Web transport protocol. Default is HTTPS for
fresh installs or previous value for upgrades
from pre-6.3.1 releases.
User account name Initial account for accessing the GUI and
managing the server
Note:
l Before installing the above hardware-based appliances, please refer to compliance and
safety warnings, available online at:
http://www.dell.com/learn/us/en/uscorp1/regulatory-compliance.
l For software-only deployments (you are providing the hardware), rack and cable the
hardware according to documentation associated with that hardware.
l For virtual deployments, refer to the documentation described in Options for Virtual
Environments.
WARNING: Read all safety warnings and installation instructions before you make any power
supply connections or perform any maintenance tasks on a power supply. Safety warnings
are provided in NETSCOUT’s Compliance and Safety Warnings for nGenius® Hardware Products
available on the https://my.NETSCOUT.com website.
1. Complete all cabling connections before you power the appliance.
2. Connect the AC power cord into the appliance power socket before connecting the other
end to a power source.
3. Ensure that you connect power cords to both power supplies to avoid false system alarms.
4. Wait to power on the system until you have reviewed the preparations for new appliances,
or for installation / upgrades (or restore).
Prepare your information worksheets before proceeding with this and any software installation,
upgrade, or configuration step. You can adjust the networking options again later with a
configuration script, after installation or upgrade, but having the information at hand will save
you from having to restart steps if some information is not at hand.
1. Use a direct terminal connection to access a login prompt for the system.
2. For Windows:
Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
For Linux:
Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
3. Set the host name and address in the hosts file. If you have more than one NIC on your
system, the nGeniusONE installation program uses the first IP address it finds. Therefore,
it is important that the IP address you want to use for accessing the nGeniusONE Server is
the first entry in the hosts file. Verify this prior to running an nGeniusONE installer.
For Windows:
a. From Start > Control Panel > Network Connections, select Local Area Connection.
b. Click Properties.
c. Select Internet Protocol (TCP/IP) and click Properties.
d. Ensure that “Use the following IP address” is selected and that the server IP address
displays.
e. Click Advanced.
f. In the IP Settings tab, ensure that the server IP address displays at the top of the list.
g. Close all dialog boxes.
4. Add the new server's IP address and host name to the DNS Server or to the hosts file of
every client system that connects to the system hardware.
5. (IPv6 deployments only) Review the following additional requirements, which are relevant
only if you do not plan to run the nGApplianceConfig.plx script:
l Ensure the address is in the /etc/hosts file as illustrated below:
2001:0dB8:1219::87:aeb1:2be7 mysystem.netscout.com mysystem
127.0.0.1 localhost.localdomain localhost
l Ensure that the /etc/hosts file on any related servers (the current server, related child
nGeniusONE servers, external authentication servers, and DNS servers) contain an
IPv6 address-to-hostname mapping.
l For external authentication, a domain entry is not supported for IPv6.
l Ensure the following lines are in the /etc/sysconfig/networking/devices/ifcfg-eth0 file:
NETWORKING_IPV6=yes
IPV6INIT=yes
USERCTL=yes
IPV6_AUTOCONF=no
6. Reboot the system to instantiate the changes.
Note: If you are using a DVD, you can copy those files from the DVD to your system, rather
than downloading. The installation and upgrade instructions presume the file is located in the
directory indicated below, and has execute permissions set as indicated.
1. Locate your MasterCare account credentials, then access the following URL:
https://my.NETSCOUT.com.
2. From the top navigation ribbon, select Licensing & Downloads.
3. From the displayed page, locate and select the appropriate product.
4. Select the appropriate product version at the top of the page.
5. From the table at the bottom of the page, select the tab for Downloads.
6. Locate the installer matching your requirements (see Installer Reference below, if needed).
7. Right-click to save the installation files corresponding to your requirements. Example: For
Linux versions of nGeniusONE Server, you must download the .bin file. Optionally,
download the matching MD5 /SHA files for checksum validation.
8. Use WinSCP or other tool, if needed to copy the files to the system on which the software
will be installed.
Note: It is very important that you save the file in a location outside the normal product
installation path. Select a folder such as /opt/install.
9. (For .bin or .exe files only) Ensure the downloaded file is executable:
Linux Procedure
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Navigate to the directory to which you copied the downloaded files.
3. Ensure the checksum files and binary are in this same directory.
4. Use a utility of your preference, or one of the following commands to generate a new
checksum for the binary, and automatically compare it to the downloaded checksum.
Note: The output for either of the following commands is the same upon success or
failure.
# /usr/bin/md5sum -c <md5 checksum filename>
or
# /usr/bin/sha1sum -c <sha checksum filename>
If the validation fails, try downloading the files and re-validating them again. For repeated
validation errors, contact Customer Support for assistance. '
Windows Procedure
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
2. Open a command shell and navigate to the folder to which you copied the downloaded
files.
3. Use a utility, such as certutil, to generate a new checksum for the binary, after which you
can manually compare it to the downloaded checksum.
Note: The output for either of the following commands is the same upon success or
failure.
# C:\Windows\System32\certutil.exe -hashfile <md5 checksum
filename> MD5
or
# C:\Windows\System32\certutil.exe -hashfile <sha checksum
filename> SHA1
If the output of the hash command does not match the hash code in the corresponding
.md5 or sha1sum.txt file you downloaded with the matching binary, try downloading the
files and re-validating them again. For repeated validation errors, contact Customer
Support for assistance.
Note:
l For an overview of license types Understanding License Types and Options
l To register the software using a virtual IP address, the IP address must be bound to the
server you are licensing.
l You need the registration key, from your product order/Registration Coupon, to
generate a license.
Use the procedure below for each of the coupons you have received:
1. Locate all Registration Coupons for which you need to generate licenses.
2. Access your MasterCare account: https://my.NETSCOUT.com
3. Navigate to the product section for your product type.
4. Select the software version of interest, then scroll to the bottom of the page.
If the End User License Agreement (EULA) appears, click the I Agree button. The EULA
appears for:
l First-time users of the software download pages.
l Users who have not accessed the page within a year of the last published EULA.
6. Click Continue under "License Registration."
7. The registration field appears at the bottom of the next page. Enter the registration key
from the Registration Coupon you received with your product shipment and click Yes to
confirm your product.
1By 2021, Adobe Flash will be obsolete and will be disabled in internet browsers. nGenius Performance Manager requires
Adobe Flash to work properly; refer to the Adobe Flash information page on my.netscout.com for details.
Note:
l This manual procedure is applicable for use with all server types. However, certain
servers, such as Standby or other child servers, are supported for remote upgrade.
Refer to online help topics on Server Management for upgrading servers, Decode Packs,
1. Before you begin, ensure you have the information required to configure your server. You
will need the indicated information below:
Web port This is the port for users to access the GUI;
8443 by default for fresh installs; previous
value for upgrades from pre-6.3.1 releases.
Web protocol Web transport protocol. Default is HTTPS for
fresh installs or previous value for upgrades
from pre-6.3.1 releases.
2. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
3. (For upgrades only): Stop the NETSCOUT processes (the installer does not run if any
NETSCOUT processes are running). Refer to Server Processes and Stopping and Restarting
the System, if needed.
4. Navigate to, make executable, and launch the installer:
l For downloaded files, access the location to which you saved the installer file. For
example:
root@host ~]# cd /opt/install
root@host /opt/install]# chmod 777 nG1-rrrr-bbb-lin.bin
root@host /opt/install]# ./nG1-rrrr-bbb-lin.bin
If the installer does not begin to run, verify it was downloaded correctly (checksum
validation) and that file execute permissions were enabled. Otherwise, continue to
the next steps and respond to the installer prompts.
l For installations from a DVD, insert the disk. If your system does not automatically
mount the disk to the <CDROM> directory, mount it manually before running the
install script. For example:
root@host ~]mount /dev/cdrom /media/cdrom
root@host ~]cd /media/cdrom
root@host /media/cdrom]./install.sh console
5. Select a Locale by entering the appropriate number and pressing Enter. You must select
the language applicable to your geographical location to display the appropriate product
license agreement.
6. Review the Introduction, which provides instructions to navigate within the installer, then
press Enter to proceed.
7. Read the License Agreement. Use the Enter key to advance through the several pages of
this document. At the end of the license document, you must accept the agreement by
entering Y before pressing Enter.
8. The installer next always checks for previous configuration files. If present, the installer
assumes this is an upgrade and offers you an opportunity to preserve the settings or
change them. If you are preserving existing settings, skip to the next main step. If you opt
to change settings, or for installations wherein no configurations are found, respond to
d. Web Server Port: For fresh installations, the default web server port is 8443. For
upgrades from pre-6.3.1 releases, the web server port will stay at what it was
previously. If this port is unavailable, the number is incremented by one until an
available port is found.
e. Web Server Protocol: HTTP or HTTPS. For fresh installations, the default web server
protocol is HTTPS. For upgrades from pre-6.3.1 releases, the protocol will stay at what
it was previously.
f. Press Next to accept and continue. If the information is not correct click Cancel now to
exit the installer to correct the issue. Restart the installer when ready.
g. Web User Account Name Password: This user account is required to perform the
configurations required to manage the server.
9. Review the information in the Pre-installation Summary. If you need to make changes,
enter back, to get to previous screens, make the corrections, and then press Enter to
return to the summary page . If the information on this page is correct, press Enter to
proceed with the installation.
10. When installer has finished configurations, a page of License Configuration instructions
display. Review them, then press Enter to continue.
11. When the Installation Complete message displays, press Enter to exit the installer.
12. Next steps:
l For upgrades:
o NETSCOUT recommends users clear the cache of the browser on the client
machine accessing the nGeniusONE server.
o After the server has been upgraded, you can upgrade the associated data sources.
Refer to the documentation for the data sources (such as the InfiniStream Appliance
Administrator Guide)
l For new installations or recovery: Before you start up the nGeniusONE server
processes, be sure to complete the following procedures in the indicated order:
Note:
l This is a manual procedure, which is applicable for use with all server types. However,
certain servers, such as Standby or other child servers, are supported for remote
upgrade. Refer to online help topics on Server Management for upgrading servers,
Decode Packs, and data sources.
l For virtual deployments, refer to Options for Virtual Environments
l The installer automatically stops if required TCP or UDP ports are in use by other
processes. The conflicting port is specified so you can free it up before restarting the
installation.
l The nGenius Java-based client is automatically installed with Windows server
installations.
l During the installation, the wizard allows you to use Previous and Next buttons to
navigate between steps. Use the Cancel button to exit the installer.
1. Before you begin, ensure you have the information required to configure your server. You
will need the indicated information below:
Web port This is the port for users to access the GUI;
8443 by default for fresh installs; previous
value for upgrades from pre-6.3.1 releases.
Web protocol Web transport protocol. Default is HTTPS for
fresh installs or previous value for upgrades
from pre-6.3.1 releases.
User account name Initial account for accessing the GUI and
managing the server
User password Password for the above user account
Use 8-15 alphanumeric characters with at
least one number; non-printing characters
such as spaces or tabs are not supported.
Database password A value must be provided here; non-printing
characters such as spaces or tabs are not
supported.
2. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
3. (For upgrades only):
a. Stop the nGeniusONE Server by going to Start > Programs > NetScout nGenius
Server and selecting Stop nGenius Server. (The installer does not run if any
NETSCOUT process are running.)
b. Open the Task Manager and ensure that all NETSCOUT processes are stopped before
proceeding. (Refer to Server Processes , if needed.)
4. Use one of the following two methods to start the installer:
l Installation DVD
a. Insert the nGeniusONE installation DVD disc that is marked for use with Windows.
b. If autorun is enabled on your Windows server, the installation initializes. Otherwise,
navigate to the DVD folder containing the following script and run install.bat.
l Downloaded Install File
a. Navigate to the folder where you downloaded the software install file.
After the installation wizard initializes, proceed to the next step.
5. Select a Locale by entering the appropriate number and pressing Next. You must select
the language applicable to your geographical location to display the appropriate product
license agreement.
6. Review the Introduction, which provides instructions to navigate within the installer, then
press Next to proceed.
7. Read the License Agreement. You must accept the agreement by clicking the "I accept..."
checkbox, before clicking Next.
8. The installer next always checks for previous configuration files. If present, the installer
assumes this is an upgrade and offers you an opportunity to preserve the settings or
change them. If you are preserving existing settings, skip to the next main step. If you opt
to change settings, or for installations wherein no configurations are found, respond to
the following prompts:
a. Installation Location: Press Next to accept the default offered value (C:\NetScout).
For upgrades, the previously specified directory is offered.
b. Server Type: This option varies based on the type of server you are installing. For
certain server types, only one configuration is applicable so no type menu is offered.
Enter the menu option number corresponding to the server type to install:
l Global Manager (Applicable for Distributed Environments)
l Standalone Server
c. Host Name / IP address: This information is read from the /etc/hosts file and
presented in read-only mode. Press Next to accept and continue. If the information is
not correct, click Cancel now to exit the installer to correct the issue. Restart the
installer when ready.
Caution: Ensure /etc/hosts file is updated to contain host name and IP of your
server prior to install. Example: 10.10.10.10 testserver.test.com testserver
d. Web Server Port: For fresh installations, the default web server port is 8443. For
upgrades from pre-6.3.1 releases, the web server port will stay at what it was
previously. If this port is unavailable, the number is incremented by one until an
Read the following sections carefully before migrating to nGeniusONE from PM.
3.3.1.1 Constraints
l Migration from PM to nGeniusONE is one-way.
l The Command Line Administration (CLA) utility has been deprecated since 6.2, but if you
are using PM you may still be using CLA. Before you can migrate from the PM to the
nGeniusONE build, you must confirm you have no dependency on CLA scripts. The REST
API framework replaces the CLA. The CLA will be removed, so 6.3.1 is the last chance to
migrate the CLA to the REST API framework.
l Fresh installs must use the nGeniusONE kit.
l As of 6.3.1 all nGeniusONE appliances are deployed with an nGeniusONE kit only. No
appliances are deployed with a PM kit.
l After GM is manually upgraded to the nGeniusONE kit, all remote Local and Standby
servers still on the PM kit can be remotely upgraded from the GM to the nGeniusONE kit or
each upgraded manually to the nGeniusONE kit. A mix deployment of nGeniusONE and PM
kits is not allowed.
3.3.1.2 Prerequisites
Your deployment must meet these prerequisites to migrate from PM to nGeniusONE:
l All InfiniStream devices must be in ASI-only mode. If the InfiniStream device is in hybrid or
CDM mode, then the device and thereby nGeniusONE is not ready to be transitioned to the
nGeniusONE kit.
l Based on the recommendation of Customer Support, you are ready to transition from the
PM kit to nGeniusONE kit.
l nGenius Deployment Database can also provide statistics on CDM flows to help determine
if the system is ready for transition. Transitioning with active CMD flows will result in the
loss of access to CDM flow data.
After successful verification, installation steps remain the same except for the use of an
nGeniusONE kit instead of a PM kit.
Before you begin, you will need the information from the configuration worksheets.
l For Linux servers, refer to: Using the nGApplianceConfig Script (Linux)
l For Windows servers, refer to : Configuring the Server (Windows)
l For virtual environments refer to: Options for Virtual Environments
Procedure
This procedure is applicable for use the first time you set up your server, optionally after an
upgrade, or when you need to change settings.
Note: If you to exit the script, use CTRL-C before responding to the summary page.
1. The script does not prompt with existing values, so it is best to complete the configuration
worksheet before you begin.
eth1 - If you are installing on hardware that includes an eth1 interface, you have the
option of configuring its address with the script, or selecting no to configure it later or not
at all. Configuring this interface is not required, but if you opt to do so, the script requires
an IP Address, a subnet mask and gateway.
Note: Use the installation and configuration worksheets as a guide before you begin, to
ensure you are prepared to provide requested details.
l Changing the IP Address
l Changing the Web Port Number
l Changing the Host Name
l Changing the Date / Time or Time Zone
l Changing the Server Type
Note:
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
Note:
l All servers in the deployment must use the same port number.
l The script used in this procedure modifies nGeniusONE files, not system files such as
/etc/sysconfig/iptables. If you modified iptables, which may be required for some
environments, you must update it separately.
l If you are changing the server to a secured port, you must also install a certificate. Use
the nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the
managing / primary server, and then copying that truststore to the other nodes in the
deployment.
l Supports well-known, nonstandard HTTP (80, 8080) and HTTPS (443, 8443) ports.
Websecure accepts a port number in the command line. Ports 80 and 8080 can be
configured only for HTTP, ports 443 and 8443 only for HTTPS.
Procedure
1. For Windows: Log in to the Windows server with an account that has administrator
privileges. (Do not use a cloned version of the Administrator account.)
For Linux: Access the system command-line as the root user. If you have logged in as a
different user and assumed privileges with su, be sure to use su -l <root account> so that
the full environment is instantiated before you proceed.
2. Navigate to the <NETSCOUT install>/rtm/bin folder.
3. Run the following script:
Follow these steps to change the ports in a Global Manager (GM) or Dedicated Global Manager
(DGM) environment:
Validation:
You can use curl to validate the change without using a web browser, substituting http and https
as appropriate, and using the IP address:port number for the server you want to test.
# curl -I <http|s>://<server_ip_address:port>/ -k
If the port change was successful, you will see a response such as:
HTTP/1.1 200 OK
For example:
# curl -I https://10.20.160.14:8443/ -k
HTTP/1.1 200 OK
Note: If you want to change the host "friendly name" as it appears in the nGeniusONE
deployment, access the parent server in your cluster and modify it from the Server
Management GUI or the Server Map editing procedure.
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
2. Access Control Panel>System>Change Settings>Change..., and modify the Computer
Name and/or domain, as needed.
3. Stop the nGeniusONE server.
4. Navigate to the <nGeniusONE install>\rtm\bin folder.
5. Edit pm_env.bat.
6. Locate the line with NSHOST and modify it to the new name.
7. Save and exit the file.
8. Start the nGeniusONE server.
9. Make sure that you modify the corresponding entry in your DNS servers or the hosts file
of every system that connects to the server, the parent server and any related data
sources.
Note: NETSCOUT recommends you use the same time server for all systems in the
deployment.
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
2. Access Control Panel>Date and Time, and modify as needed.
3. Restart the nGeniusONE server.
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
2. Navigate to the C:\NetScout\rtm\bin folder.
After you have performed an uninstall or reimage, you can then proceed reinstalling the
software application. The last step of installation includes guidance for licensing and
configuration. If you reimaged the system, or opted not to retain settings, you will need to
perform those steps as well.
Based on your recovery needs, or as guided by Customer Support, select one of the procedures
below:
l Uninstall Software
l Reimage the Operating System
Linux
1. Complete installation and configuration worksheets.
2. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
3. Stop the NETSCOUT processes (the installer does not run if any NETSCOUT process are
running)). Refer to Stopping and Restarting the System, if needed.
4. If guided by support, create a full backup and/or a configuration backup of your server
into a location outside of the <nGeniusONE install> folder. Ensure a copy of the following
license file is also saved:
<nGeniusONE install>/rtm/bin/admin/.license.properties
5. Navigate to the /opt directory and run the following command:
root@host /opt ]# <nGeniusONE install>/rtm/bin/uninstall.sh
6. Respond to the script's prompts to uninstall nGeniusONE.
Note: The script prompts whether you want to save configuration settings. If guided by
Customer Support, specify No, to ensure a full uninstall.
7. After the uninstall completes, reboot the nGeniusONE server .
8. The uninstall process leaves certain files and folders intact, since a complete uninstall is
not always required. If guided by Customer Support, you should remove these manually.
a. Log back in to the server as the root user.
b. Navigate to the /opt directory (or other location in which you installed the nGeniusONE
software).
c. Manually delete the residual directory to ensure a clean re-installation. Example:
root@host ~]# cd /opt/
root@host /opt]# rm -rf NetScout
9. Your server is now ready to use the nGeniusONE installer.
Windows
1. Complete installation and configuration worksheets, locate your licenses, and download
and have your software available.
2. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
3. Stop the nGeniusONE Server by accessing Start > Programs > NetScout nGenius Server
and selecting Stop nGenius Server. (The installer does not run if any nGeniusONE
process are running.)
4. Open the Task Manager and ensure that all nGeniusONE processes are stopped before
proceeding. (Refer to Server Processes , if needed.)
5. Access Start > Programs > NetScout nGenius Server and select Uninstall nGenius
Server. An uninstall wizard opens.
6. Click the Next button to begin.
7. The wizard prompts whether you want to save configurations for a future reinstall. Select
the radio button for Yes or No, then click Uninstall.
8. After the uninstall completes, a reminder is posted that the some items are not removed.
The uninstall process leaves certain files and folders intact, since a complete uninstall is
not always required. Click Done to exit the wizard.
9. Note that the wizard does not remove the nGenius Client software, which is automatically
included with the server software installation. If needed, access Start > Programs >
NetScout > nGenius Client and select Uninstall nGenius Client.
10. Click Uninstall to remove the software, then Done to exit the uninstall wizard.
11. Reboot the server.
12. If guided by Customer Support, you may now manually remove the residual folders.
a. Log back in to the server as an administrative user.
b. Navigate to the folder into which the nGeniusONE software was originally installed
(C:\NetScout, by default).
c. Manually delete the NetScout directory.
13. Your server is now ready to use the nGeniusONE installer.
Note:
l These procedures are applicable for Linux-based configurations for NETSCOUT-
provided hardware. For custom Linux deployments or for Windows deployments, you
will need to use your own kernel kit to recover the operating system, if necessary.
l Reimage procedures completely format the hard drive. If possible, be sure to back up
the configuration data and properties files beforehand.
l Contact Customer Support before using a restore DVD or ISO on any hardware other
than the original model.
l Before you begin:
o If possible, save the license file from your server. Otherwise locate the software keys
used to register and create your licenses.
o Review the installation and configuration worksheets in case you need to re-enter
settings during recovery.
o For reimages, locate the DVD you received with your order, or download an
applicable ISO from the NETSCOUT Customer Support website.
o Locate the application software you want to use, either from your DVD or from the
Customer Support website.
4. The DVD automatically runs the reimaging procedure, and a static IP of 10.10.10.10 is
assigned.
5. When the Operating System installation is complete, reboot the system (when prompted).
6. When the DVD tray opens, remove the DVD.
7. You may now use the installer chapter to install the application software.
8. After installing the software, you must install licenses and configure the server.
For NETSCOUT-built hardware with an iDRAC interface, you can optionally use an ISO or DVD on
your local system, rather than a physical drive on the remote system, to remotely reimage that
operating system.
1. Back up your files. Also see "Performing Database Backups" in the help.
2. Reimage and install the Oracle Linux or Red Hat upgrade OS.
3. Reinstall the NETSCOUT product software.
4. Restore the database.
For deployments that utilize the nGenius Client / Performance Manager, refer to Installing and
Accessing the nGenius (Performance Manager) Client.
Note: Default user logins are provided in this chapter, to facilitate initial setup. However,
NETSCOUT strongly recommends changing these and performing other steps to enhance
security of your deployment.
1. If you have not already done so, use the DB9 cable provided with your system's kit to
connect a console terminal or Windows system COM1 serial port to the serial port located
on the back of the system.
Note: Attach or remove the console cable only while the appliance is powered down.
Attaching an unterminated cable to the console COM port can cause it to become
unresponsive. If this occurs, reboot the appliance.
2. Power up the appliance.
3. Access the system from the console terminal or from a terminal emulator application.
Adjust the following settings, if required:
Bits per second: 57600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Emulation: ANSI
ASCII Setup: Do not wrap lines that exceed terminal width
4. Press Enter until a login prompt for the appliance operating system appears.
5. For initial setup, log in as the root user with the following default values:
Username: root
Password: <root password>
Note: After you log in the first time, change the default root password. For additional
guidance refer to Configuring Security.
8. After the dialog displays Options controlling SSH connections, ensure the Preferred SSH
protocol version is set to 2.
9. Now, click Open to launch the PuTTY connection to that system.
10. If this is the first time you have connected to the server, you may be prompted as below to
verify that the host name or IP address is valid. If the address is as expected, click Yes to
continue the connection.
The server's host key is not cached in the registry
11. Respond to the operating system user login prompt. The default root login is:
Username: root
Password: <root password>
Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
For complete details, refer to the Dell Remote Access Controller Documentation on the Dell website.
l Dell R740 (iDRAC9)
https://www.dell.com/support/article/us/en/19/sln311300/idrac9-home
l Dell R730 (iDRAC8)
https://www.dell.com/support/article/us/en/19/sln310710/idrac8-home
l Dell R720 (iDRAC7)
https://www.dell.com/support/article/us/en/19/sln311149/idrac7-home
Note:
l Refer to the chapter on Requirements for a list of supported web browsers and
versions.
l Disable popup blockers before accessing the nGeniusONE Server using a browser.
l For deployments that utilize the nGenius Client / Performance Manager, refer to
Installing and Accessing the nGenius (Performance Manager) Client.
1. Access the nGeniusONE server using a web browser, navigating to:
https://<nGeniusONE Server host name>:<port number>
You must use a host name or IP address. Use of localhost is not supported.
2. Enter the user name and password created during the installation process.
3. Click Log In.
Tips:
l If a user experiences issues with browser performance on a client system, clear the
browser's cache and have the user log in again.
l Disable virus scanning software. If you prefer not to disable virus scanning completely,
you can disable automatic scanning of all downloaded files and enable the scanning of
program files only as specified by file extension. Consult your virus software
documentation for specific instructions.
l Browser performance can degrade somewhat when the server is busy or under a heavy
load.
l If using Internet Explorer, you must enable Active Scripting (in Security Settings) to
permit logging in to nGeniusONE.
Note:
l To stop and restart the server to which you are currently logged in, you must use the
operating system command-line (see the manual method, below) rather than the Server
Management interface.
l In a clustered environment, you can use the Server Management interface to stop and
start servers managed by the primary, managing server.
1. From Start > (All) Programs > NetScout nGeniusONE Server, select the following
option, as appropriate:
Start nGeniusONE Server
Stop nGeniusONE Server
2. Use the Windows Task Manager to confirm that all processes are running or stopped, as
appropriate. See D.3 Server Processes by Server Type.
3. Confirm that the nGeniusONE services are registered correctly. See D.2 Windows Services.
Linux
Note:
l All servers in a distributed cluster (excluding "related servers with discrete architecture
(nBA, nSI, and Pulse)) must be running the same version of the application software and
configured with the same authentication method.
l All servers must be configured to use the same port number for HTTP/S
communication.
l It is not applicable to add a child server to a Standby Server or type such as nBA, nSI or
Pulse
l If the server you are accessing is a child node of a cluster, you must access the parent
server in order to add a Standby or related server to this node. All configurations in a
cluster are managed at the parent head of the cluster. For this reason, certain
configuration options, such as the Add a server icon, are disabled on child servers.
Procedure:
l If you selected a Local server, select Standby and configure these settings:
Server Information
Type Standby
Server Name A relevant name, or alias, to identify the server. This field can
contain spaces but not these restricted characters:
:,#!@=$%^&*()+<>?;|~"/'
Address / Host name Provide an IPv4 or IPv6 address, or a fully qualified domain
name.
Web Port Use the same web port number used by the Local Server
selected above.
User Login Information
User Name Provide the administrative web user name and password you
provided during installation of the Standby Server
Password
Additional Information
Alarm Suppression Time Duration in ms before a Standby alarm is re-issued
Backup Check Timeout Duration in ms for Standby to hear from its Primary server
(the local server it is backing up)
l If you selected a Global and are adding a cluster child, use these settings:
Server Information
Type Local Server (This is the remote Standalone child server you
want to add to the cluster)
Server Name A relevant name, or alias, to identify the server. This field can
contain spaces but not these restricted characters:
:,#!@=$%^&*()+<>?;|~"/'
Address / Host name Provide an IPv4 or IPv6 address, or a fully qualified domain
name.
Web Port Use the same web port number used by the parent server
selected above.
User Login Information
User Name Provide the administrator web user name and password you
provided during installation of the Standby Server
Password
Server Restart
Restart server after adding it For child servers that inherit configurations from the
managing server, it is optimal to restart the child server after
the add has been done. When such an operation is
applicable, this check box is displayed. If you intend to do
more configuration changes that need to be pushed to the
child server, you can uncheck this box to defer the restart and
perform it manually.
l If you selected a Global or ConfigManager and are adding a related server child, use
these settings:
Server Name A relevant name, or alias, to identify the server. This field can
contain spaces but not these restricted characters:
:,#!@=$%^&*()+<>?;|~"/'
Address / Host name Provide an IPv4 or IPv6 address, or a fully qualified domain
name.
Web Port Use the same web port number used by the parent server
selected above.
The following server types can be added using in Server Management on a Standalone server, a
Global Manager, a Dedicated Global Manager (and for nGenius Business Analytics, nGenius
Configuration Manager).
Note: For each of the products below, refer to that product's documentation for more details,
including installation and configuration instructions.
l nGenius Business Analytics : Integrating this server type allows it to authenticate to other
cluster nodes as a standard member, polling data directly from the devices managed by
the cluster nodes (or the Standalone).
l nGenius Subscriber Intelligence: This server type uses the ASRs from nGeniusONE
deployments. It can be integrated to use the User Management and Authentication options
from the managing server.
l nGeniusPULSE: When integrated with nGeniusONE, this product retrieves configurations
from the managing server (which applications to transmit to the Pulse server), and access
certain statistics computed on the nGeniusONE about the monitored data. It does not
transmit ASI data. Note that integration requires additional steps, as mentioned in Pulse.
Of the above, only nGenius Business Analytics is supported for adding in nGenius
Configuration Manager.
Procedure:
4. Select the row for the server to which you are adding a child. The type for hte row you
select must be either Global or ConfigManager, not Local.
5. Click the Add Server icon.
6. A dialog box displays with options applicable to the type of server row you selected above.
Enter the required information for the server type you want to add.
Server Name A relevant name, or alias, to identify the server. This field can
contain spaces but not these restricted characters:
:,#!@=$%^&*()+<>?;|~"/'
Address / Host name Provide an IPv4 or IPv6 address, or a fully qualified domain name.
Web Port Use the same web port number used by the parent server
selected above.
For applicable products based on nGeniusONE architecture, the Authentication Source module
displays one or both of nGenius CM and OAM authentication options. These types are specific
to NETSCOUT and used to enable this trusted relationship.
l nGenius Session Analyzer and nGenius Subscriber Cache: Must be set to either nGenius
CM or OAM. The nGenius CM option can be set to either an nGeniusONE or nGenius
Configuration Manager server.
Note:
l The Native mode of authentication is available for all server types, to allow for basic
configuration and recovery should the managing server become unavailable. For certain
servers, however, the primary capabilities that rely on data are not functional until the
data source information and other details are transmitted from the managing
configuration server.
l Related nGenius Session Analyzer and nGenius Subscriber Cache servers must use the
same authentication source server and type.
l For nGenius Session Analyzer / nGenius Subscriber Cache deployments, those
supporting data sources must have geo-xxxx-yyy.bin software installed and configured
during that installation to operate in Local Mode. For more details on the device
requirements, refer to the nGenius Session Analyzer Release Notes and the InfiniStreamNG
Deployment Guide.
Procedure:
Parameter Description
nGenius CM IP/Host IP address or hostname of nGeniusONE or nGenius
Configuration Manager server. Note that for Omnis Cyber Investigator,
this must be an nGeniusONE server.
nGenius CM Port Usually 8443
nGenius CM User User name
For OAM:
Parameter Description
UUMS IP/Host IP address or hostname of UUMS server. Use the hostname that matches
the SSL certificate used by the UUMS server.
UUMS Port UUMS port number. Usually 1199.
OAM IP/Host IP address or hostname of OAM server. Use the hostname that matches
the SSL certificate used by the OAM server.
OAM Port OAM port number. Usually 8443.
Webservice Port TCP port number of OAM server. Usually 11055.
Note:
l If needed, you can revert a server to Native mode authentication.
l Do not install the nGeniusONE and external server software on the same system.
NETSCOUT Options
l Native Mode (present for all servers)
l nGenius CM
l OAM
nGeniusONE uses only one form of authentication at a time, either local or one of the supported
external methods, and responds with an error message to invalid login attempts. That is, if a
user cannot be authenticated according to the main authentication method and server,
nGeniusONE rejects the login.
In a distributed server environment, the Global Manager and all Local Servers in the server
cluster must use the same authentication mechanism, either the local nGenius authentication or
one of the external methods. You cannot use different authentication methods on different
servers within the same distributed environment.
All of the supported external methods perform the task of authenticating users for logging in to
nGeniusONE. Once logged in, users’ authorization for accessing various features is managed
differently depending on the external method.
however, that the primary function of certain servers (such as those that do not directly manage
data sources) requires additional settings that are provisioned when the server is configured for
authentication to an OAM server, an nGeniusONE server or nGenius Configuration Manager.
Access the server console as an administrative user and open the Authentication Source module.
Double-click the red icon next to Native to change the setting, then restart the server. If you are
not able to access the web server as an administrative user, you can revert the mode from the
system command-line, as described in Reverting to Native Mode Authentication
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Stop the NETSCOUT processes (the installer does not run if any NETSCOUT process are
running). Refer to Stopping and Restarting the System, if needed.
3. Navigate to <nGeniusONE install>/rtm/bin.
4. Run the following script:
# ./EA_set_default.sh
5. Restart the server.
6. Log in to the server web page using administrative account credentials. Following are the
NETSCOUT default values for the web administrative account:
User: administrator
Password: <administrator password>
7. Navigate to Authentication Source and reconfigure the settings for a new external
authentication server. Note that if you are changing the type of authentication server on
the parent of a cluster, such as a Global Manager, all servers in the cluster must use the
same authentication model.
8. Restart the server. If the server is the parent of a cluster, such as a Global Manager, restart
all the servers in the cluster.
6.4.4 SAML
6.4.4.1 Authentication: SAML
Security Assertion Markup Language (SAML) is an XML-based open-standard for transferring
identity data between an authentication Identity Provider (IdP) such as SailPoint, Okta, or Auth0,
and an application referred to as a Service Provider (SP), which is nGeniusONE or nGenius
Configuration Manager. SAML support enables secure Single Sign-On (SSO) to nGeniusONE and
its trusted servers. When SAML is enabled, REST APIs can only be authenticated via a user-
generated key or trusted-server-generated key.
SAML requires a redirect of the nGeniusONE URL upon user authentication. The following text
shows a sample redirect URL:
https://serverhostname:8443/console/samlIdpInitCallback
See your Identity Provider's documentation for information on enabling SAML from the IdP side.
Use the following procedure to configure SAML authentication for nGeniusONE. When
configured on a Global Manager, the SAML configuration is automatically propagated to Local
and Standby servers.
1. On the SAML server, add the nGeniusONE Server IP address to the list of hosts with
permission to connect. Refer to your vendor documentation for instructions.
2. From the nGeniusONE server, access the Authentication Source module.
3. Click SAML. The Configure SAML server for Authentication page appears.
4. Locate and change the parameters described in the following table. Ensure that you
specify values for all of the properties marked with asterisks (*) either by entering your
own parameters or by accepting the defaults. You may leave optional properties blank.
Parameter Description
Servers Servers and related metadata and SSOs that can be configured to use
SAML. Click these icons to search, delete, and upload entries:
l to search by server name, SAML metadata XML, or SSO URL.
l
to hide the search fields.
l
to clear the filter search fields.
l
to delete a server entry.
l
to upload SAML metadata from an XML file
Server Name Name of each server eligible for SAML configuration. The eligible server
names appear automatically:
l On Global Manager servers, managed Local and Standby
nGeniusONE servers appear automatically along with the Global
Manager when SAML authentication is selected.
l For nGenius Session Analyzer, eligible servers available for SAML
configuration appear when clicking Enable SAML Authentication on
the nGenius CM tab.
SAML Metadata XML XML snippet from the SAML provider used for connecting the Single Sign-
On (SSO) server and validating the response from the SSO server in a
mode of SSL connection. Copy or upload SAML metadata XML into this
field for each server.
This metadata is unique to each server. For the Global Manager or
Primary server, the metadata for that server is stored from the SAML
authentication UI to <NETSCOUT Install>rtm/samlmetadata.
SSO URL Read-only single sign-on URL from the SAML Metadata XML.
User SAML Attribute Maps nGeniusONE or nGenius Configuration Manager user values to
Mapping SAML markup attributes:
l User name
l First name
l Last name
l Email
5. Choose to use local server or SAML server settings. The following table shows local server
settings. Proceed to the following step for SAML server settings.
6. Use the table below to configure groups and roles using SAML server settings.
7. Click OK.
8. Click icon next to the SAML authentication option. You are prompted to approve changing
authentication for that server to SAML.
9. Click Yes.
10. Stop and restart the nGeniusONE Server to implement your changes.
6.4.5 nGenius CM
6.4.5.1 Authentication: nGenius CM
Certain server types are intended to operate in a standalone mode. Some, however, can be
integrated with a managing server for centralized configuration and authentication. For servers
that offer nGenius CM as an authentication option, use the procedure below to establish it as a
trusted server to a managing nGeniusONE server or nGenius Configuration Manager server.
Note:
l nGenius CM authentication was formerly called "nCM authentication."
l nGeniusONE must be integrated with a separate server to provide protocol
configurations, authentication, and management of the data sources providing metrics.
Use the procedure below for integrating it with nGeniusONE server or nGenius
Configuration Manager, or you can integrate it with an OAM Server.
l Setting the authentication method to nGenius CM automatically modifies the current
server to obtain both authentication AND configuration details from the specified
managing server.
l Related nGenius Session Analyzer and nGenius Subscriber Cache (SCS) servers must use
the same authentication server and type.
l For Omnis Cyber Investigator, the child server is added to the managing parent server
as a TrustedServer type. It is listed as if it were added from the Server Management
menu on the parent server. Note that you can DELETE this server from the parent using
that server's Server Management utility. You cannot add it directly.
l In this mode, applicable data sources in Device Configuration on the managing server
are made known to this server.
Parameter Description
nGenius CM IP/Host IP address or hostname of nGeniusONE or nGenius
Configuration Manager server.
When in IPV6 mode, use the nGeniusONE or nGenius
Configuration Manager server IPV6 address wrapped in
[ncmipv6address] square brackets, add
resthelper.disable.ipv6.hostname.lookup=false in the nGeniusONE or
nGenius Configuration Manager serverprivate.properties file, and restart
the nGeniusONE/ nGenius Configuration Manager, nGenius Session
Analyzer, and nGenius Subscriber Cache (SCS) servers.
nGenius CM Port Usually 8443
Enable SAML For nGenius Session Analyzer only, click this option to display SAML
Authentication options if Security Assertion Markup Language (SAML) authentication is
configured on the nGenius CM server.
When configured on an nGenius Session Analyzer Primary server, the
SAML configuration is automatically propagated to any related nGenius
Session Analyzer Secondary servers.
Parameter Description
Servers Servers and related metadata and SSOs that can be configured to use
SAML. Click these icons to search, delete, and upload entries:
l to search by server name, SAML metadata XML, or SSO URL.
l
to hide the search fields.
l
to clear the filter search fields.
l
to delete a server entry.
l
to upload SAML metadata from an XML file
Server Name Name of each server eligible for SAML configuration. The eligible server
names appear automatically:
l On Global Manager servers, managed Local and Standby
nGeniusONE servers appear automatically along with the Global
Manager when SAML authentication is selected.
l For nGenius Session Analyzer, eligible servers available for SAML
configuration appear when clicking Enable SAML Authentication on
the nGenius CM tab.
SAML Metadata XML XML snippet from the SAML provider used for connecting the Single Sign-
On (SSO) server and validating the response from the SSO server in a
mode of SSL connection. Copy or upload SAML metadata XML into this
field for each server.
This metadata is unique to each server. For the Global Manager or
Primary server, the metadata for that server is stored from the SAML
authentication UI to <NETSCOUT Install>rtm/samlmetadata.
SSO URL Read-only single sign-on URL from the SAML Metadata XML.
User SAML Attribute Maps nGeniusONE or nGenius Configuration Manager user values to
Mapping SAML markup attributes:
l User name
l First name
l Last name
l Email
Follow these steps to enable Security Markup Language (SAML) authentication on a server is
already using nGenius CM authentication.
6.4.6 OAM
6.4.6.1 Authentication: OAM
An nGeniusONE server must be integrated with a separate server to provide protocol
configurations, authentication, and management of the data sources providing metrics. The
options for authentication are either an Iris OAM Server, or an nGeniusONE or nGenius
Configuration Manager. Related nGenius Session Analyzer and nGenius Subscriber Cache
servers must use the same authentication server and type.
Follow these steps to configure the nGenius Session Analyzer or nGenius Subscriber Cache
server to authenticate via an Iris OAM server.
Parameter Description
UUMS IP/Host IP address or hostname of UUMS server. Use the hostname that matches
the SSL certificate used by the UUMS server.
UUMS Port UUMS port number. Usually 1199.
OAM IP/Host IP address or hostname of OAM server. Use the hostname that matches
the SSL certificate used by the OAM server.
OAM Port OAM port number. Usually 8443.
Webservice Port TCP port number of OAM server. Usually 11055.
4. Click OK.
5. In the Authentication Server list, locate the OAM row in the Authentication Server pane
and click the icon in that row to switch methods.
6. Respond to the confirmation dialog that you do want to change authentication methods.
7. Stop and restart the nGenius Session Analyzer or nGenius Subscriber Cache Server to
implement your changes.
The nGenius Session Analyzer or nGenius Subscriber Cache server now authenticates users via
the OAM server specified for authentication.
6.4.7 Authentication: LDAP
You can use an LDAP server to authenticate users logging in to nGeniusONE Server. In a
distributed nGeniusONE environment, updating the authentication source on the Global
Manager updates the authentication source on its local child servers after they are restarted.
However, you must update LDAP configuration properties on the Global Manager and its child
servers.
1. On the LDAP server, add the nGeniusONE Server IP address to the list of hosts with
permission to connect. Refer to your LDAP Server's vendor documentation for
instructions.
2. From the nGeniusONE server, access the Authentication Source module.
3. Click LDAP. The Configure LDAP server for Authentication screen is displayed.
Note: You can configure all the options before you switch the authentication mode to use
LDAP. Until you click the red icon next to LDAP, the mode is not fully switched, allowing
you to work on configuration details and change the mode at a later time. Switching to
LDAP mode is the last step in this procedure.
4. Modify the Server Configuration options in the top part of the screen, referring to the
parameters list below. Ensure that you specify values for all of the properties marked with
asterisks (*) either by entering your own parameters or by accepting the defaults. You may
leave optional properties blank. If you are using ldaps as protocol, add the property
ldap.url.scheme=ldaps in the serverprivate.properties file.
Parameter Description
*Server IP/Host IP address or hostname of the LDAP Server
Alternate server IP/Host A secondary LDAP server IP address or hostname
(optional)
*Search base Domain name of LDAP server. Use dc= to indicate each domain
component, separated by commas. For example:
dc=mycompanynam,dc=com
*Timeout Timeout in milliseconds for connecting to the external server.
Minimum for external database environments is 10000 (10
seconds).
*Group Organizational unit or user group defined in LDAP server. The
(on LDAP server) default group name is People. If the DN Style is configured as
raw, the “Group” and “DN Prefix” configurations are not used.
*Server Port Connection port for the LDAP Server. The default value is 389. If
you enable SSL connections, ensure the port number is
changed to match the port used for configuring your LDAP
server to use LDAPS. Typically 389 for LDAP and 636 for LDAPS.
DN Prefix (optional) The attribute used by the LDAP server to look up user
distinguished names.
The default value of uid (userID) applies to OpenLDAP server
implementations.
If you have an Active Directory or other LDAP implementation,
enter cn (commonName). For example:
ldap.dnprefix=cn
Note: The ldap.dnprefix value is used only if the DN Style value
is normal.
If the DN Style is configured as raw, the “Group” and “DN Prefix”
configurations are not used.
Parameter Description
DN Style (optional) Format of the LDAP user credentials.
The default value of normal specifies full LDAP login credentials
using the cn (commonName) or uid (UserID) attribute. For
example:
cn=pm-
systemadmin,ou=sec,dc=mycompanyname,dc=com
where:
- cn=Common Name (example: systemadmin)
- ou=Organizational Unit (example: security)
- dc=Domain Component (examples:netscout, com)
The optional value of raw allows login with another credential
such as a full email address (plumberj@mycompanyname.com).
If the DN Style is configured as raw, the “Group” and “DN Prefix”
configurations are not used.
Enable SSL Connection (optional) Specify whether the authentication request from the
nGeniusONE Server to the LDAP server should use SSL. Note
l A separate procedure is required to import the
LDAP Server's SSL Certificate to the nGeniusONE Server.
l Ensure the server port above matches that used for LDAPS
on your LDAP server.
5. Modify the User Configuration options in the lower part of the screen. The user
configuration options vary based on whether the roles and groups are derived from the
local nGeniusONE server, or the LDAP server. Select one of the following and configure as
indicated:
l Use local server settings is the default. This allows logins to be authenticated against
the LDAP server, but the user roles for nGeniusONE functionality are defined locally on
the nGeniusONE Server.
l Use LDAP server settings if you want to allow the LDAP administrator to control
assignment of users based on membership in the LDAP database.
Parameter Description
Group Configuration Enter the full LDAP group definition for the role. Entries are not
(on LDAP server) case sensitive. For example, if the DN prefix = cn, the group
configuration might be:
cn=pm-systemadmin,ou=security,dc=netscout,dc=com
where:
o cn=Common Name (example: systemadmin)
o ou=Organizational Unit (example: security)
o dc=Domain Component (example: netscout, com)
Each group configuration must have either roles or groups
assigned to it.
Groups Click the Groups radio button to add and remove user groups to
(on nGeniusONE server) configure the user groups you want to associate with Group
Configuration.
Roles Click the Roles radio button to configure the roles you want to
associate with the Group Configuration (the list includes both the
predefined roles below and any custom roles you have previously
configured):
Use + or to delete and add Roles.
Refer to Understanding User Roles for additional details about
roles and access privileges.
Parameter Description
*Membership Attribute Enter the membership attribute for your LDAP configuration. The
default, memberOf, is the membership attribute for Active
Directory.
The membership attribute is used to find group configurations
listed in the Group Configuration row.
Use LDAP Server settings: Decode Option Settings
Parameter Description
SysAdmin Customize the option you want to be the default for all Sys Admin
users. Refer to Configuring Decode Options for details
Default Customize the option you want to be the default for general
users.
6. Click OK.
7. (Optional) To utilize SAM when logging into the nGeniusONE server, enter the following
properties in the <nGeniusONE install>/rtm/bin/serverprivate.properties file on the
nGeniusONE server:
ldap.enable.samaccountname.attr.login=true
ldap.users.common.domain=<domain_name>
ldap.user.principalclass.name=sAMAccountName
8. You are now ready to toggle LDAP authentication on. Return to the Server Management >
Settings pane for the server on which you want to enable LDAP authentication.
9. Display the Authentication Server list.
10. Click icon next to the LDAP authentication option. You are prompted to approve changing
authentication for that server to LDAP.
11. Click Yes.
12. Stop and restart the server to implement your changes.
After restart, users must log back in to nGeniusONE or nGenius Configuration Manager to view
their updated roles or groups.
Only for Linux servers, follow these steps to automatically import an SSL/TSL certificate
automatically with a script.
6.4.7.3.2 Manually Import an LDAP Server SSL/TSL Certificate (Linux and Windows)
1. Before you begin, contact Customer Support to obtain the appropriate password.
2. Obtain the certificate from your LDAP authentication server and copy it to your
nGeniusONE server in the /tmp directory.
3. Log into the nGeniusONE server operating system command line as the root user.
4. Navigate to the <nGeniusONE install>/jre/bin/ directory.
5. Run the following command:
Linux:
./keytool -import -alias <name> -file <certificate path/filename> -keystore <nGeniusONE
install>/rtm/html/ngeniusclient.truststore
Windows:
keytool -import -alias <name> -file <certificate path\filename> -keystore <nGeniusONE
install>\rtm\html\ngeniusclient.truststore
Important: The value for -file must include an absolute path to the filename.
Example:
./keytool -import -alias CompanyCert -file /tmp/ldap_server.cer -
keystore /opt/NetScout/rtm/html/ngeniusclient.truststore
6. The script launches, prompting you to enter the password you obtained from Customer
Support . Provide the password.
Follow these steps to enable a service account to authorize query access to the LDAP store.
6.4.8 RADIUS
6.4.8.1 Authentication: RADIUS
You can use a RADIUS server to authenticate users logging in to nGeniusONE Server using the
process described below.
1. On the RADIUS server, add the nGeniusONE Server IP address to the list of hosts with
permission to connect. Refer to your vendor documentation for instructions.
2. From the nGeniusONE server, access the Authentication Source module.
3. Click RADIUS. The Configure RADIUS server for Authentication page is displayed.
4. Locate and change the parameters described in the following table. Ensure that you
specify values for all of the properties marked with asterisks (*) either by entering your
own parameters or by accepting the defaults. You may leave optional properties blank.
Server Configuration
Parameter Description
*Server IP/Host IP address or hostname of the RADIUS Server. (Default = 127.0.0.1)
*Server Port Connection port for the RADIUS Server. (Default = 1812)
Alternate server IP/Host A secondary RADIUS server IP address or hostname. (Default =
(optional) 127.0.0.1)
*Alternate Server Port Connection port for the secondary RADIUS server. (Default = 1812)
*Shared Secret Key used to encrypt data between the nGeniusONE and RADIUS
servers.
*Timeout (optional) Timeout in milliseconds for connecting to the external server.
Minimum for external database environments is 10000 (10 seconds).
*Scheme Protocol (packet format) and handshake method used for
authentication. Click one of these options:
l CHAP (default)
l PAP
5. Use the table below to complete user configuration for System Administration users and
Default users:
6. Click OK.
7. Click icon next to the RADIUS authentication option. You are prompted to approve
changing authentication for that server to RADIUS.
8. Click Yes.
9. Stop and restart the nGeniusONE Server to implement your changes.
6.4.9 SiteMinder
Login authentication through an external SiteMinder authentication server is supported with
servers based on nGeniusONE architecture. Configuration of SiteMinder authentication requires
steps in both the Authentication Source module and in property files. Refer to the following for
guidance:
l Configuring SiteMinder Authentication
l Mapping SiteMinder Groups to Server Groups
6.4.9.1 Authentication: SiteMinder
You can use a SiteMinder (SM) server to authenticate users logging in to nGeniusONE Server.
When configured, SiteMinder authentication allows users to log in automatically through the
SiteMinder-protected URL. In addition, integrating SiteMinder authentication with nGeniusONE
Server provides you with the following benefits:
l Command line tool to add, delete, and modify user groups
l Logging of session creation events in the nGeniusONE Server audit log
Use the following procedure to enable login authentication through an external SiteMinder
server:
Note:
l Membership of an nGeniusONE Server user in a user group is passed by the SiteMinder
application in an HTTP header. This information is updated in the nGeniusONE Server
database upon login using group membership information provided by SiteMinder.
l Configure group mapping by modifying the serverprivate.properties file (see below).
Adding new groups to the serverprivate.properties mapping automatically creates the
group in nGeniusONE Server.
l Groups passed by SM that are not mapped in the nGeniusONE Server are ignored. If no
nGeniusONE group mapping entry exists for any group provided by SM, access to
nGeniusONE is denied.
l User roles in nGeniusONE Server are based on group roles assigned in the nGeniusONE
Server.
Examples:
sso.group.memberof.PMCustomer=WestCoast
sso.group.memberof.PMSales=SalesTeam
4. By default, new users and groups you create in SiteMinder inherit the Help Desk role in
the nGeniusONE Server. You can assign one or more different roles by defining properties
in the same serverprivate.properties file. Separate multiple entries using commas.
Examples:
SiteMinder.group.roles=SYSADMIN, NTWKADMIN, NTWKOPER, APROVR,
HELPDSK
SiteMinder.user.roles=SYSADMIN, NTWKADMIN, NTWKOPER, APROVR,
HELPDSK
5. Save and exit the serverprivate.properties file.
6. Load changes to group mappings and the allowedpmusers.dat file, execute the following
command: siteminderdatainit
You can also map multiple SiteMinder groups to a single group in nGeniusONE Server by
separating the SiteMinder groups with commas:
sso.group.memberof.PMGroup4=SMGroup2,SMGroup5,SMGroup6,SMGroup<n>
Example:
sso.group.memberof.PMCustomer=NewYork,WestCoast,SalesTeam
6.4.10 TACACS+
For a Cisco Secure Access Control Server (ACS) or Identity Services Engine (ISE) user to log in to
nGeniusONE Server using the Terminal Access Controller Access Control System Plus (TACACS+)
protocol, two criteria must be met:
1. The user name and password entered on the Home page must be correct.
2. The ACS or ISE user must have the appropriate authorization for the nGeniusONE Server.
Authorization can be provided to an ACS or ISE user or group. For user groups, all members of
the group are authorized to log in to the nGeniusONE Server.
If you authorize a user, the user can then be added to an ACS or ISE group and maintain
authorization for the nGeniusONE Server. Conversely, an ACS or ISE user who is already a
member of an ACS or ISE group can individually be given authorization without other members
of the group being authorized.
After ACS or ISE is enabled, any user defined in the ACS or ISE system overrides a user of the
same login name that existed in the nGeniusONE Server database prior to the transition.
Cisco Secure TACACS+ provides both authentication and authorization for users logging in to the
NETSCOUT server. When a user is authenticated for the first time using TACACS+, the NETSCOUT
server creates the user profile and stores the user’s information in a database. For subsequent
authentications, the NETSCOUT server modifies the database information according to the
profile, user role, server list, and user groups provided by the TACACS+ external server.
If you authenticate with TACACS+ but maintain all user information locally on the NETSCOUT
server, you configure additional settings on the local server. Refer to the NETSCOUT server's
online help for more details working with the Authentication Source and User Management
modules. See these sections:
l Configuring TACACS+ Authentication
l ISE
l ACS v5.x
l ACS v4.x
1. Log in to the nGeniusONE Console and go to Servers and Users > Authentication
Source and click TACACS+.
2. Locate and change the parameters described in the following table. Ensure that you
specify values for all of the properties marked with asterisks (*) either by entering your
own parameters or by accepting the defaults. You may leave optional properties blank.
Server Configuration
Property Description
*Server IP/Host The primary ACS or ISE Server IP address or hostname.
*Server port The port number on which the TACACS+ server is running. The default port is
49.
*Encryption Key The shared private key used to encrypt packets between the nGeniusONE
Server and the ACS or ISE Server. To ensure encryption, this setting cannot be
blank.
Note: When configuring the ACS or ISE Authentication Service, enter the same
value in the Key field (for Windows) or the NAS Secret field (for UNIX) that you
enter here.
Alternate Server Values for a secondary ACS or ISE Server.
IP/Host (optional)
*Alternate Server
Port
*Alternate
Encryption Key
*Local port Connection starting port. The default starting port is 9540.
*Protocol The application to be associated with the NGENIUS Service. The default setting
is IP.
Note:This setting must beIPfor Windows ACS or ISE Servers.
*Service Automatically populated as NGENIUS when "Use server user settings" is
selected.
*Timeout Timeout in milliseconds for socket connection. Minimum for external
database environments is 15000 (15 seconds).
3. Modify the User Configuration options in the lower part of the screen. The user
configuration options vary based on whether the roles and groups are derived from the
local nGeniusONE server, or the TACACS server. Select one of the following and configure
as indicated:
l Use local server settings is the default. This allows logins to be authenticated against
the LDAP server, but the user roles for nGeniusONE functionality are defined locally on
the nGeniusONE Server.
l Use server user settings if you want the user roles for access to nGeniusONE
features to be retrieved from the TACACS server. For this option, use the table below
to provide names of custom attributes defined in TACACS server; these fields are
required (*) and must match settings defined in the authentication server you are
using:
o ISE
o ACS v5.x
o ACS v4.x
In general, it is recommended that you accept the default values.
When you use ACS or ISE Server user settings for authentication, all new and existing
user account information must be maintained through Cisco Secure ACS or ISE.
4. Click OK.
5. (Optional) Click ^ Server Management Operations Progress to view the progress of your
configuration and any related status messages.
6. Click icon next to the TACACS+ authentication option. You are prompted to approve
changing authentication for that server to TACACS.
7. Click Yes.
8. Stop and restart the nGeniusONE Server to implement your changes.
6.4.10.2 ISE
*Important Requirements and Restrictions*
l There is no upgrade path from ACS v5.x to Identity Services Engine (ISE) configuration. To
support ISE you must perform the specified configurations.
l Reserve a System Administrator user account in nGeniusONE . The account cannot have
the same login name in ISE. Cisco ISE account names override account names in the
nGeniusONE Server. If you later want to revert to nGeniusONE authentication, you will
need the username and password for the reserved account.
l nGeniusONE supports a single identity store. An identity sequence is not supported. You
can use either Single Result Selection or Rule Based Selection.
l ISE must be configured to work with Active Directory and security groups must be defined.
l nGeniusONE does not support an authorization profile containing multiple group sources.
The configurations you must perform to use Cisco ISE with the nGeniusONE Server vary
depending on whether you plan to use an internal or an external identity store.
Ensure that you refer to the www.cisco.com Secure Access Control System 5.x user guides
for instructions as you perform these procedures, and see these sections:
l Policies Required for Internal Identity Stores
l Policies Required for External Identity Stores
l Configuring an Identity Policy
Define a Network Device and AAA Client for the nGeniusONE Server
Define a network device and AAA Client for the nGeniusONE Server. Follow these steps to define
a network device and configure an AAA client.
1. Log in to Cisco Identity Services Engine (ISE) using an account granted the System Admin
or Super Admin role.
2. Go to Work Centers > Device Administration > Network Resources > Network
Devices.
3. Under Network Devices, click Add and do the following:
a. In the Name and Description fields, enter the information for your nGeniusONE Server.
b. Select IP Address or IP Range enter the address of your nGeniusONE Server or
servers.
c. Select Cisco from the Device Profile menu.
d. In Network Device Groups, select the appropriate location and device type.
e. Select the TACACS Authentication Settings check box and click the arrow to display
the settings.
f. In the Shared Secret field, enter the same key (uses MD5 encryption) used by both the
nGeniusONE Server and ISE to encrypt the data exchange between the servers. On the
nGeniusONE Server, this entry must match the Encryption Key field.
g. Select the TACACS Draft Compliance Single Connect Support radio button.
Define shell profiles with custom attributes for authorization to nGeniusONE (Internal
Identity Stores only)
Important: Shell profiles define the level of access in the nGeniusONE Server. You must
configure a minimum of one shell profile that defines the NTWKADMIN role. If you do not
configure a shell profile with NTWKADMIN permissions you will be unable to perform any
administrative functions in the nGeniusONE Server when you log in.
Define a TACACS Service Selection Policy (Both Internal and External Identity Stores)
Refer to the Service Selection Policy information in the www.cisco.com Identity Services Engine
user guides for instructions.
You must create a rule-based policy to determine which service to apply to any incoming
requests. The policy must contain a single identity store. The following procedure shows an
example of creating an identity policy and store. Refer to www.cisco.com Identity Services
Engine user guide documentation for more information on how to create an identity policy for
both internal and external identity stores.
1. Got to Work Centers > Device Administration > User Identity Groups and click + Add.
2. Enter a name and description and click Submit.
3. Select the group you created from the list under the User Identity Groups folder.
4. Under Member Users > Users, click +Add to display the user list, and then double-click
the user(s) you want to add.
5. Click Identities. The user(s) appear in the Network Access Users list with their associated
group(s) under the User Identity Groups column.
Authorization Policies work with shell profiles to define the level of access to the nGeniusONE
Server based on the Cisco ISE security group.
Refer to the Authentication Policy information and the Shell Profile for Device Administration
information in the www.cisco.com Secure Access Control System user guides for instructions
when you create your authorization policy.
Authorization Policies work with shell profiles to define the level of access to the nGeniusONE
Server based on the security group. The following procedure shows an example of creating an
identity policy and store. Refer to the Authentication Policy information and the Shell Profile for
Device Administration information in the www.cisco.com Identity Services Engine user guides
for instructions when you create your authorization policy.
1. Got to Work Centers > Policy Elements > Results > TACACS Profiles and click + Add.
2. Name the profile and define tasks and attributes.
3. Click Save.
The configurations you must perform to use Cisco ACS v5.x with the nGeniusONE Server vary
depending on whether you plan to use an internal or an external identity store.
l Define a network device and AAA client of the ACS server for the Server
l Define shell profiles with custom attributes for authorization to the Server
l Define a TACACS Service Selection Policy
l Enable Cisco Secure ACS v5.x authentication on the Server
Ensure that you refer to the www.cisco.com Secure Access Control System 5.x user guides for
instructions as you perform these procedures, and see these sections:
l Policies Required for Internal Identity Stores
l Policies Required for External Identity Stores
l Configuring an Identity Policy
Define a network device and AAA Client for the nGeniusONE Server
Follow these steps to define a network device and configure an AAA client.
1. Log in to Cisco Secure ACS using an account granted the System Admin or Super Admin
role.
2. In the left pane, select Network Resources > Network Devices and AAA Clients.
3. In the right pane, click Create and do the following:
a. In the Name and Description fields enter the information for your nGeniusONE Server.
b. In Network Device Groups, select the appropriate location and device type.
c. Select Single IP Address to enter the address of your nGeniusONE Server or IP Range
(s) to enter multiple nGeniusONE Servers.
d. In Authentication Options, select the TACACS+ check box.
e. In the Shared Secret field, enter the same key (uses MD5 encryption) used by both the
nGeniusONE Server and ACS to encrypt the data exchange between the servers. On
the nGeniusONE Server, this entry must match the Encryption Key field.
f. Select the Single Connect Device check box.
g. Select the Legacy TACACS+ Single Connect Support radio button.
Define shell profiles with custom attributes for authorization to nGeniusONE (Internal
Identity Stores only)
Important: Shell profiles define the level of access in the nGeniusONE Server. You must
configure a minimum of one shell profile that defines the NTWKADMIN role. If you do not
configure a shell profile with NTWKADMIN permissions you will be unable to perform any
administrative functions in the nGeniusONE Server when you log in.
1. In the left pane, select Policy Elements > Authorization and Permissions > Device
Administration and select Shell Profiles.
2. In the right pane, click Create and perform the following configurations to create a shell
profile. The following profile defines the nGeniusONE user first name, last name, email
address, data capture slice size, data capture override, and intelligence header
parameters to be passed to the nGeniusONE user during authorization:
l In the General tab, enter a name for the profile.
l In the Custom Attributes tab, define the following attributes:
a. In the Attribute field enter: NSROLES
b. From the Requirement dropdown select Mandatory.
c. From the Attribute Value dropdown select Static and, in the text box, enter:
NTWKADMIN
d. Click Add.
e. In the Attribute field enter: NSPROFILE
f. From the Requirement dropdown select Mandatory.
g. Enter the IP address(es) of the nGeniusONE Server(s).
h. From the Attribute Value dropdown select Static and, in the text box, enter:
network,admin,netadmin@mycompany.com,2048,0,0
i. (Optional) Create additional shell profiles for nGeniusONE users granted different
levels of access. The following entries are valid for the NSROLES attribute:
o NTWKADMIN (Network Administrator)
o SYSADMIN (System Administrator)
o APROVR (Approver)
o NTWKOPER (Network Operator)
o HELPDSK (Help Desk)
o Custom_Role (nGeniusONE custom-defined role)
3. Click Submit to commit your changes.
Define a TACACS Service Selection Policy (Both Internal and External Identity Stores)
Refer to the Service Selection Policy information in the www.cisco.com Secure Access Control
System 5.x user guides for instructions.
In the Cisco Secure ACS administration, enter the following information as appropriate for your
environment. Ensure that you refer to the Configuring AAA Clients information in the
www.cisco.com Secure Access Control System user guides for instructions.
Windows
l AAA Client Hostname — Enter the hostname of the nGeniusONE Server.
l AAA Client IP Address — Enter the IP address of the nGeniusONE Server.
l Key — Enter the encryption key used for MD5 encryption. The key must match the
Encryption Key defined in nGeniusONE . Do not leave blank.
l Authenticate Using — TACACS+ (Cisco IOS).
UNIX
l Select AAA Configuration.
l Select TACACS+ NAS Configuration.
l Enter the fully qualified domain name of the nGeniusONE Server (if the name can be
resolved through DNS). Otherwise, enter the nGeniusONE Server IP address.
l NAS Secret — Enter the encryption key used for MD5 encryption. The key must match the
Encryption Key defined in nGeniusONE Do not leave blank.
See Cisco Secure ACS v4.x: Authorizing Cisco Secure ACS Users.
6.4.10.4.1 Cisco Secure ACS v4.x: Authorizing Cisco Secure ACS Users
To configure authorization for nGeniusONE Server and Cisco Secure ACS individuals and groups,
you must add the NGENIUS service and define custom attributes.
Note: This topic provides general Cisco Secure ACS configuration instruction guidelines. You
must refer to www.cisco.com documentation for configuration instructions for your specific
Cisco Secure ACS version.
The Cisco Secure ACS Administrator must first add NGENIUS as a service.
Windows
UNIX
After adding the NGENIUS service, you can define attributes for individuals and groups.
In the User Setup configuration for Cisco Secure ACS, the Cisco Secure ACS administrator must
define the NSROLES, NSPROFILE, and NSSERVERLIST attributes.
Note:
l Windows: The Cisco Secure ACS administrator defines these attributes under the
TACACS+ Settings of the Interface Configuration section.
l UNIX: The Cisco Secure ACS administrator must use the Advanced administration
interface and define the three attributes in the Service-String folder for each profile.
NSROLES
Defines the nGeniusONE Server role for the user logging in through ACS.
Syntax:
Enter one or more of the following codes, separated by commas, for the nGeniusONE Server
predefined user roles:
l APROVR — Approver
l HELPDSK — Help Desk
l NTWKADMIN — Network Administrator
l NTWKOPER — Network Operator
l SYSADMIN — System Administrator
l NPVIEWER — NewsPaper/Report Viewer
For example, to assign Network Administrator and System Administrator roles to a user, enter
the following for NSROLES:
NSROLES=NTWKADMIN,SYSADMIN
NSPROFILE
Syntax:
NSPROFILE= <Firstname>,<Lastname>,<emailaddress>, <data_capture_slice_
size>,<override_data_capture>,<restrict_frame_header>
The Firstname, Lastname, and Email parameters must not be blank. The email address must be
syntactically correct (name@domain).
The data capture decode slice size field defines the number of bytes that can be captured and
decoded by the individual. This parameter cannot be blank. Enter 0 for no slice size restrictions;
enter 1-2048 to restrict slice size for the individual.
The override_data_capture parameter allows users who are assigned the Network Administrator
role to view and clear other users' data captures. Enter 0 to disable override_data_capture; enter
1 to enable the override.
Note: If the user is not assigned the Network Administrator role, nGeniusONE Server
ignores the override_data_capture setting.
The <restrict_frame_header> parameter restricts the user to frame header only. Enter 0 for no
restrictions; enter 1 to restrict the user to frame header only.
For example, to set the NSPROFILE for John Doe with slice size restricted to 1512, override_data_
capture disabled, and restrict_frame_header enabled enter:
NSPROFILE=John,Doe,jdoe@mycompany.com,1512,0,1
NSSERVERLIST
Syntax:
NSSERVERLIST=ALL|<ipaddress1[,ipaddress2,ipaddress3,...]>
Enter ALL for access to all valid nGeniusONE Server systems. You can optionally restrict user
access to specific nGeniusONE Servers by entering a comma separated list of valid nGeniusONE
IP addresses.
For example:
NSSERVERLIST=ALL
or
NSSERVERLIST=192.168.143.1,192.168.143.2
To provide authorization for nGeniusONE Server to a group, define the NSROLES, NSPROFILE,
and NSSERVERLIST attributes using the Cisco Secure ACS Group Setup configuration.
The ACS administrator may elect to have all users of a group share the same attributes. This is
useful for setting up groups according to the nGeniusONE security roles, such as Network
Administrators or System Administrators. Alternatively, the administrator may assign unique
attributes to individual users. Individual user attributes always override the attributes for the
group to which that user belongs.
NSROLES (Group)
Defines the nGeniusONE role for all members of the group logging in through ACS.
Syntax:
Enter one or more of the following codes, separated by commas, for the nGeniusONE predefined
user roles:
l APROVR — Approver
l HELPDSK — Help Desk
l NTWKADMIN — Network Administrator
l NTWKOPER — Network Operator
l SYSADMIN — System Administrator
l NPVIEWER — NewsPaper/Report Viewer
For example, to assign Network Administrator and System Administrator roles to a group, enter
the following for NSROLES:
NSROLES=NTWKADMIN,SYSADMIN
NSPROFILE (Group)
Syntax:
NSPROFILE= <Firstname>,<Lastname>,<emailaddress>, <data_capture_slice_
size>,<override_data_capture>, restrict_frame_header
When defining NSPROFILE for a group, you must enter placeholder values for the Firstname,
Lastname, and Email. The email address must be syntactically correct (name@domain).
The data capture decode slice size field defines the number of bytes that can be captured and
decoded by the group. This parameter cannot be blank. Enter 0 for no slice size restrictions;
enter 1-2048 to restrict slice size for the group.
The override_data_capture parameter allows members of a group that is assigned the Network
Administrator role to view and clear other users' data captures. Enter 0 to disable override_data_
capture; enter 1 to enable the override.
Note: If the group is not assigned the Network Administrator role, nGeniusONE ignores the
override_data_capture setting.
The <restrict_frame_header> parameter restricts the user to frame header only. Enter 0 for no
restrictions; enter 1 to restrict the user to frame header only.
For example, to set NSPROFILE for a group with a slice size restriction of 64 bytes, override_
data_capture disabled, and restrict_frame_header enabled enter:
NSPROFILE=network,admin,netadmin@mycompany.com,64,0,1
NSSERVERLIST (Group)
Syntax:
NSSERVERLIST=ALL|<ipaddress1[,ipaddress2,ipaddress3,...]>
Enter ALL for access to all valid nGeniusONE Server systems. You can optionally restrict group
access to specific nGeniusONE Servers by entering a comma separated list of valid nGeniusONE
IP addresses.
For example:
NSSERVERLIST=ALL
or
NSSERVERLIST=192.168.143.1,192.168.143.2
Refer to the www.cisco.com Secure ACS documentation for instructions on setting up and
adding users to groups.
NSGROUP
Defines the nGeniusONE Server role for the user logging in through ISE.
Syntax:
Enter one or more of the following codes, separated by commas, for the nGeniusONE Server
predefined user roles:
l APROVR — Approver
l HELPDSK — Help Desk
l NTWKADMIN — Network Administrator
l NTWKOPER — Network Operator
l SYSADMIN — System Administrator
l NPVIEWER — NewsPaper/Report Viewer
For example, to assign Network Administrator and System Administrator roles to a user, enter
the following for NSROLES:
NSROLES=NTWKADMIN,SYSADMIN
NSPROFILE
Syntax:
NSPROFILE= <Firstname>,<Lastname>,<emailaddress>, <data_capture_slice_
size>,<override_data_capture>,<restrict_frame_header>
The Firstname, Lastname, and Email parameters must not be blank. The email address must be
syntactically correct (name@domain).
The data capture decode slice size field defines the number of bytes that can be captured and
decoded by the individual. This parameter cannot be blank. Enter 0 for no slice size restrictions;
enter 1-2048 to restrict slice size for the individual.
The override_data_capture parameter allows users who are assigned the Network Administrator
role to view and clear other users' data captures. Enter 0 to disable override_data_capture; enter
1 to enable the override.
Note: If the user is not assigned the Network Administrator role, nGeniusONE Server
ignores the override_data_capture setting.
The <restrict_frame_header> parameter restricts the user to frame header only. Enter 0 for no
restrictions; enter 1 to restrict the user to frame header only.
For example, to set the NSPROFILE for John Doe with slice size restricted to 1512, override_data_
capture disabled, and restrict_frame_header enabled enter:
NSPROFILE=John,Doe,jdoe@mycompany.com,1512,0,1
NSSERVERLIST
Syntax:
NSSERVERLIST=ALL|<ipaddress1[,ipaddress2,ipaddress3,...]>
Enter ALL for access to all valid nGeniusONE Server systems. You can optionally restrict user
access to specific nGeniusONE Servers by entering a comma separated list of valid nGeniusONE
IP addresses.
For example:
NSSERVERLIST=ALL
or
NSSERVERLIST=192.168.143.1,192.168.143.2
To provide authorization for nGeniusONE Server to a group, define the NSROLES, NSPROFILE,
and NSSERVERLIST attributes using the Cisco Secure ACS Group Setup configuration.
The ACS administrator may elect to have all users of a group share the same attributes. This is
useful for setting up groups according to the nGeniusONE security roles, such as Network
Administrators or System Administrators. Alternatively, the administrator may assign unique
attributes to individual users. Individual user attributes always override the attributes for the
group to which that user belongs.
NSROLES (Group)
Defines the nGeniusONE role for all members of the group logging in through ACS.
Syntax:
Enter one or more of the following codes, separated by commas, for the nGeniusONE predefined
user roles:
l APROVR — Approver
l HELPDSK — Help Desk
l NTWKADMIN — Network Administrator
l NTWKOPER — Network Operator
l SYSADMIN — System Administrator
l NPVIEWER — NewsPaper/Report Viewer
For example, to assign Network Administrator and System Administrator roles to a group, enter
the following for NSROLES:
NSROLES=NTWKADMIN,SYSADMIN
NSPROFILE (Group)
Syntax:
NSPROFILE= <Firstname>,<Lastname>,<emailaddress>, <data_capture_slice_
size>,<override_data_capture>, restrict_frame_header
When defining NSPROFILE for a group, you must enter placeholder values for the Firstname,
Lastname, and Email. The email address must be syntactically correct (name@domain).
The data capture decode slice size field defines the number of bytes that can be captured and
decoded by the group. This parameter cannot be blank. Enter 0 for no slice size restrictions;
enter 1-2048 to restrict slice size for the group.
The override_data_capture parameter allows members of a group that is assigned the Network
Administrator role to view and clear other users' data captures. Enter 0 to disable override_data_
capture; enter 1 to enable the override.
Note: If the group is not assigned the Network Administrator role, nGeniusONE ignores the
override_data_capture setting.
The <restrict_frame_header> parameter restricts the user to frame header only. Enter 0 for no
restrictions; enter 1 to restrict the user to frame header only.
For example, to set NSPROFILE for a group with a slice size restriction of 64 bytes, override_
data_capture disabled, and restrict_frame_header enabled enter:
NSPROFILE=network,admin,netadmin@mycompany.com,64,0,1
NSSERVERLIST (Group)
Syntax:
NSSERVERLIST=ALL|<ipaddress1[,ipaddress2,ipaddress3,...]>
Enter ALL for access to all valid nGeniusONE Server systems. You can optionally restrict group
access to specific nGeniusONE Servers by entering a comma separated list of valid nGeniusONE
IP addresses.
For example:
NSSERVERLIST=ALL
or
NSSERVERLIST=192.168.143.1,192.168.143.2
Refer to the www.cisco.com Secure ACS documentation for instructions on setting up and
adding users to groups.
NSGROUP
NSGROUP
Refer to the Authentication Policy information and the Shell Profile for Device Administration
information in the www.cisco.com Secure Access Control System user guides for instructions
when you create your authorization policy.
6.4.11 Windows
6.4.11.1 Authentication: Windows
Configure Windows Domain (Active Directory) authentication by performing the steps below.
Note: Users who require authentication across multiple domains can do so by adding their
domain name to their user name when logging into the nGeniusONE Server.
1. On the Windows Domain server, add the nGeniusONE Server IP address to the list of hosts
with permission to connect. Refer to your vendor documentation for instructions.
2. From the nGeniusONE Console, access the Authentication Source module and select the
option for Windows .
3. Locate and change the parameters described in the following table. Ensure that you
specify values for all of the properties marked with asterisks (*) either by entering your
own parameters or by accepting the defaults. You may leave optional properties blank.
4. Locate and change the parameters described in the following table. Ensure that you
specify values for all of the properties marked with asterisks (*) either by entering your
own parameters or by accepting the defaults. You may leave optional properties blank.
Server Configuration
Parameter Description
*Server IP/Host IP address or hostname of the Windows Domain Server. (Default =
127.0.0.1)
Alternate Server IP/Host A secondary Windows Domain server IP address or hostname. (Default =
(optional) 127.0.0.1)
*Search Base Domain name of Windows server. For example: netscout.com
*Timeout Timeout in milliseconds for connecting to the external server. Minimum
for external database. environments is 10000 (10 seconds).
5. Use the table below to complete user configuration for System Administration users and
Default users:
6. Click OK.
7. (Optional) Click ^ Operations Progress to view the progress of your configuration and any
related status messages.
8. Click icon next to the Windows authentication option. You are prompted to approve
changing authentication for that server to Windows.
9. Click Yes.
10. Stop and restart the nGeniusONE Server to implement your changes.
nGenius Description
Configuration Manager
Privilege
nSA - Saved Session Read Only Allow launch of nSA with a saved .nSA file in restricted, view-only
mode. This privilege disables these nSA options:
l New user queries
l Home button
l Access to other modules - Only the Session Analyzer Module is
accessible for saved .nSA session URL launch
When enabled, this privilege overrides all other nSA privileges.
nSA - Show MOS-CQ Not LQ View either MOS-CQ or MOS-LQ values for PDUs in the ladder
diagram for G10 probes:
l Enabled (checked): View MOS-CQ values.
l Disabled (unchecked): View MOS-LQ values.
nSA - SMS Full Content Privilege For SMS content:
l Enabled (checked): Allows the viewing of SIP messages
including SMS content.
l Disabled (unchecked): Allows the viewing of SIP messages with
user content concealed with asterisks (*).
nSA - User Content Analysis Export all user content (SMS, MSRP) data packets per flow to PCAP or
Privilege PCAPng.
nSA - User Content Capture For user content:
Privilege l Enabled (checked): Allows capture of SMS and MSRP content.
l Disabled (unchecked): User content concealed with asterisks
(*).
The User Plane Sessions module appears when this privilege is
enabled.
nSA - User Plane Analysis Privilege Expand flows in the Session Trace Ladder Diagram and view the
corresponding user plane PDUs. Export all user plane, media (RTP,
DTMF, Event Tones, T38) and non-media (HTTP) data packets per
flow to PCAP or PCAPng.
nSA - User Plane Capture Privilege Manage User Plane Capture and Media sessions:
l Configure filters to identify media (RTP, DTMF, Event Tones, T38)
and non-media(HTTP) streams to capture.
l Capture and monitor media (RTP, DTMF, Event Tones, T38) and
non-media (HTTP) streams.
The User Plane Sessions module appears when this privilege is
enabled.
Masking - View User Content On the Packet Decode page, unmask identifying information for all
applicable protocols. When disabled, a portion of the field is masked
(according to the masking value set for that user in (Server
Management>Users); allowing analysis to occur without
compromising the secure data.
Masking - View User Identity On the Packet Decode page, unmask sensitive subscriber
information in payload data, such as passwords or SIP-based SMS
messages. When disabled, the entire masked content is replaced
with an X.
Because Frame Header slicing conceals all content below the
transport layer, this privilege is not applicable when Frame Header
slicing enabled.
Masking - View USSD Body View Unstructured Supplementary Service Data (USSD):
l Enabled (checked): View USSD values.
l Disabled (unchecked): Mask USSD values.
This option is disabled (unchecked) by default.
Masking - View SIP/XML Body View SIP XML data:
l Enabled (checked): View SIP XML values.
l Disabled (unchecked): Mask SIP XML values.
This option is disabled (unchecked) by default.
Masking - View Diameter SH Service View Diameter Sh interface service data:
Data l Enabled (checked): View Diameter Sh values.
l Disabled (unchecked): Mask Diameter Sh values.
This option is enabled by default for the Network Administrator role
and disabled by default for all other default roles.
Masking - View Flow User Plane View user plane flow metadata:
Metadata l Enabled (checked): View user plane flow metadata.
l Disabled (unchecked): Mask user plane flow metadata.
This option is disabled by default.
Masking - View User Plane Payload View user plane payload data:
l Enabled (checked): View user plane payload.
l Disabled (unchecked): Mask user plane payload.
This option is disabled by default.
View Inner and Outer IP Options These options are not privileges included in the User Management
Roles tab. They are per-user options on the Users tab that grant or
restrict IP viewing privileges.
This section refers to settings made in the User Management module, including privileges
specified in the Roles tab and Decode related options accessed from the Users or Groups tabs,
as shown below. (The Data Capture override toggle allows users to delete other users' capture
files, and is not described further in this topic.)
l Slicing Packets
l Masking IP Addresses (Service Provider only)
l Masking-related Privileges (Service Provider only)
IMPORTANT:
l The following applies to all of the settings described in this topic. For users with Frame
Header masking enabled and/or the Masking - View User Identity/ Masking - View
User Content privileges disabled, the following occurs:
o The Data Mining > Export tab is disabled.
o The Data Mining > Capture tab does not permit save directly from the tab; a decode
is required and save is permitted from the decoded result.
o The Trace Archive save to desktop icon is not available; a decode of the trace is
required (with save from the decode view being supported)
o Within the Decode interface, the identity details are masked in the Detail and Hex
panes.
o Users can save / export decodes from within a decode view. The masking is
preserved; the Xs shown for masked data are replaced with 0s (zero) in the saved file.
o Defaults for some of these options can be set even when the server is configured for
certain external authentication types. However, the digit masking option setting is
configurable only when the authentication method is set to Native.
l These options operate independently of masking and slicing configurations done
directly at the data source. For example, credit card PAN details can be masked at the
appliance independently of these settings using the agent utility's set iso8583
command. For more details on agent configuration options, refer to topics in the Agent
Configuration Utility Administrator Guide.
By default, the right-most 4 characters of the applicable fields are masked. Digit masking can be
overridden by nGeniusONE administrator, per user or per group of users in the User
Management module. The digit masking is configured using the Users tab and can be
customized for individuals or groups. The example above shows Digit Masking set to 6
characters for this user, rather than the default of 4.
Masking - View User Content. Use of this option allows analysis of the payload, while still
providing protection of identity for the sensitive information in specific fields. If masking of the
full payload is required, review Slicing Packets, below.
Slicing Packets
A third option can be employed in addition to the above. While the slicing method can be
customized for each application in Global Settings, administrators can override this for individual
users or groups of users. From User Management>Users tab, administrators can customize the
Decode Options for that user or group to use a different slice size or to use the frame header.
When the Frame Header option is selected, the decode slices the entire packet below the
transport layer. Note that this style of slicing is supported for the first transport layer of TCP- ,
UDP-, and SCTP-based traffic.
The example below shows a set of DNS fields after the UDP transport layer replaced with Xs
when the user has the Decode option set to Frame Header instead of a specific slice size. The
data is replaced with Xs, as shown below.
For Data Mining and Trace Archive modules, and Packet Decode drilldowns from other modules,
these settings have the following impact:
l IPv4 / IPv6 octets are masked with an X character. Number of octets is as specified (in
bytes) in User Management (depicted above).
l For saved CSV files, the X is replaced with a 0.
l The Data Mining > Export tab is disabled
l The following, which depend on IP addressing, are disabled:
o Enhanced Decode
o Bounce charts
o Protocol Settings>Decode As
o View Options>IP Address Resolution
o From Chart View (4-pane) : Objects Tab
o Any filter options based on IP addressing
For guidance understanding the affect of these privileges refer to the nGenius Session Analyzer
help topics.
l Masking - View USSD Body (Uncheck for nSA workflows only)
l Masking - View SIP/XML Body (Uncheck for nSA workflows only)
l Masking - View Diameter SH Service Data (Uncheck for nSA workflows only)
l Masking - View Flow User Plane Metadata (Uncheck for nSA workflows only)
l Masking - View User Plane Payload (Uncheck for nSA workflows only)
Basic options:
l Change the user name and the password from the default name and password when
prompted during installation or upgrade.
l Change the default root user password using the passwd command from the OS
command line .
l If you have not already changed the nGeniusONE web client user names and passwords to
more secure versions, or if you want to modify either the user name or password, do so
from the User Management module of nGeniusONE.
Additional options:
l Configuring the Server for SSL Communication
l Enabling a Login Security Message
l Managing Passwords
l Configuring Authentication for Web Access
o LDAP
o Native (Local)
o RADIUS
o SiteMinder
o TACACS+
o Windows/Active Directory
o OAM
o nGenius CM
l Configuring Decode Options
l Configuring Syslog Forwarding
l Changing the Database Password
The security features on the server consist of configuration settings (incorporated into the
system configuration) that greatly increase the security of the server, including:
l Removing unnecessary services, leaving only those services that are essential to server
operation
l Restricting access to only essential TCP/UDP ports
l Restricting user accounts
l Enabling rigorous auditing
Component Description
Operating System Configuration The boot, opt and "/" disk partitions are formatted as ext3, and the
swap space partition is formatted as swap.
Servers based on Dell R730 or later models, utilize CentOS Linux.
Earlier models utilized Red Hat Enterprise Linux.
Encrypted Database Password The nGeniusONE database password is encrypted and stored in the
db.properties file (by default). That password is not viewable in clear
text by an nGenius user, including the system administrator.
Additionally, nGenius users cannot view the password when executing
the PS command in the Linux operating environment.
Apache Web Server nGeniusONE software on the server hardware uses Apache for web
services. NETSCOUT evaluates each new release of Apache to
determine if additional security enhancements require an update to
the server.
Component Description
Apache Tomcat servlet container nGeniusONE software on the server hardware uses Apache Tomcat as
a servlet container. NETSCOUT evaluates each new release of Tomcat
to determine if additional security enhancements require an update to
the server.
OpenSSL The nGeniusONE server uses OpenSSL.
Physical Security The nGeniusONE Server hardware includes a front panel door that
locks. This restricts physical access to the CD/DVD-ROM drive.
Enhanced Password Security nGeniusONE Server Hardware password security requires a minimum
password length of eight characters (and must include numbers).
Outbound Connections Filters are applied to permit outbound connections from the server
hardware for basic infrastructure services, such as DNS and SMTP.
Outbound FTP is allowed, along with access to HTTP, SSL, and SNMP.
Inbound Connections Filters are applied to permit inbound connections to the server
hardware for basic infrastructure services. Inbound access to HTTP,
SSL, and SNMP is allowed. Inbound FTP and Telnet are disallowed.
The overall threat to the server is very low if you follow best practices and implement effective
strategies when deploying the server. Typically, you should deploy the platform well inside your
Intranet (behind firewalls) and not exposed to the Internet.
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Edit the indicated properties file.
3. # vi <nGenius install>/rtm/html/client.properties
a. Locate the section #client.properties in the file, then add this line:
rtm.user.password.minimumlength=16
b. Save and exit the file.
4. Edit the second properties file:
# vi <nGenius install>/rtm/html/umcclient.properties
a. Add the following line:
rtm.user.password.minimumlength=16
b. Save and exit the file.
5. For deployments using the legacy Performance Manager product, edit the preferences
properties file:
# vi <nGenius install>/rtm/bin/preference.properties
a. Find the following line:
rtm.user.password.minimumlength=8
b. Change the line to:
rtm.user.password.minimumlength=16
c. Save and exit the file.
6. (Optional) The following parameters may optionally be used to strengthen the
password complexity. If desired, add and set the properties below to the above three
property files before restarting the server processes in the next step:
l To enforce alphanumeric validation:
rtm.user.password.enforce.AlphaNumericValidation=true
l To control the number of numbers in an AlphaNumeric password:
rtm.user.password.enforce.AlphaNumericValidation.minimum.number=
1
l To control the number of minimum lowercase characters in a password:
rtm.user.password.enforce.AlphaNumericValidation.minimum.lowerca
se=1
l To control the number of minimum uppercase characters in a password:
rtm.user.password.enforce.AlphaNumericValidation.minimum.upperca
se=1
l To enforce special character validation:
rtm.user.password.enforce.SpecialCharacterValidation=true
l To control the minimun number of special characters in a password:
rtm.user.password.enforce.SpecialCharacterValidation.minimum.spe
cialCharacter=1
l To control the maximum number of consecutive characters in a password:
rtm.user.password.enforce.consecutiveCharacter.maximum=2
l To control the maximum number of repeat characters in a password:
rtm.user.password.enforce.repeatCharacter.maximum=2
l To enforce case sensitive validation:
rtm.user.password.enforce.CaseSensitiveValidation=true
7. (Optional) Add the following properties in <nGenius
Install>/rtm/bin/serverprivate.properties to disable accounts for users who do not log in
and change their passwords within 24 hours:
l rtm.user.password.enforce.PasswordReset.days=10
l rtm.user.password.expiration.days=60
l rtm.user.password.expiration.notify=10
Until password expiration, password change is only required on first login. Users are not
disabled within 24 hours if these properties are not added.
8. Restart the server.
Note:
l This procedure requires you to supply the existing database password. If you do not
know your current password, contact Customer Support.
l Do not stop the nGeniusONE Server when changing the database password.
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Navigate to the <nGeniusONE install>/rtm/bin directory.
3. Run PasswordChange.sh script.
4. When prompted, enter the current password.
5. Then, when prompted for the new password, provide a new password with the following
considerations:
l Use 1 to 15 alphanumeric characters (first character cannot be a number)
l Non-printing characters such as spaces or tabs are not allowed.
l PostgresSQL keywords are not allowed.
When you press enter, the password is encrypted and stored.
Example:
[root@DOCPM14 bin]# ./PasswordChange.sh
************************************************************************
**********
* ============================================ *
* nGenius Database Password Change Utility *
* ============================================ *
* *
* This utility allows you to change the database password. You must
supply the *
* current database password, then enter and validate the new database
password. *
* This utility requires that the database engine is currently running. *
* *
* (Type 'exit' at any prompt to exit from this utility.) *
************************************************************************
**********
[12:36:46](main)Debug:Debug initialized (level 1), logging disabled
Enter current database password:
Enter new database password: d:
Re-enter new database password:
Stored password is Encrypted in Version2
[12:36:52](main)ConnectionPoolImpl:Initialized connection Pool size,
count : 0
[12:36:52](main)ConnectionPool:Creating ConnectionPool Default Instance
Stored password is Encrypted in Version2
When enabled, the dialog box with default text strings and graphic resembles the screen below.
Users can move and resize the box in their browser windows.
6. Customize the dialog box width by adding your preferred width (in pixels) using
confirmDefaultWidth= nnn (The default width is 350 pixels. Users with long security
messages may use this parameter to modify the dialog box dimensions.)
7. Save and exit the umcclient.properties file.
8. (Optional) Replace the background image for the dialog box title with your own graphic as
follows:
a. Format your graphic as a .PNG file and name it: CompanyLogo.png.
b. Size the graphic to be 640x71 pixels for best results.
If necessary, you can adjust the graphic size; for example, to accommodate a lengthy
login statement. The graphic is anchored at the top left corner of the dialog box.
c. Place the file in the following folder (overwriting the default version):
<nGeniusONE install>/tomcat/content/webapps/common/assets
d. Clear your browser cache and refresh the browser.
After updates are complete, the nGeniusONE Server does not need to be restarted. However, a
browser refresh may be necessary to see the consent dialog box with the specified strings.
Warning:
l NETSCOUT strongly recommends customers use their own self-signed certificates to
replace the default, self-signed certificates from NETSCOUT.
l Launch errors of the packet analysis window may ensue if you do not use a signature
algorithm stronger than SHA-1.
NSCertUtil
NETSCOUT's NSCertUtil tool makes it easy to manage — including add, delete, import, or
generate — certificates in nGeniusONE. Operating this automated tool requires selecting an
option from the menu and following the prompts, as described below. To select an additional
option, run the tool again.
Important: To avoid a Web display problem after installing a certificate using the nscertutil.sh
script, you must include the RSA password phase in the SSL key file when the RSA password is
required. Refer to Global Settings help on Configuring the Certificate App for instructions.
Windows: <drive>: <nGeniusONE install>\rtm\tools\nscertutil.bat.
************************************************************************
**********
=========================================
NetScout Certificate Generation Utility
=========================================
This utility will require information about your location, email,
server
to generate the certificate
(Type 'exit' to exit from this utility.)
************************************************************************
**********
1. Create and import a self-signed certificate [Default]
2. Import a .crt certificate
3. Add a .crt certificate to truststore
4. Upgrade to a SHA-256 Certificate
5. Import a .cer certificate
6. Add a .cer certificate to truststore
7. Import a .der certificate
8. Add a .der certificate to truststore***
Please type in the option (or exit) >
This option will create and configure nGeniusONE with a new SHA-256 SSL certificate and SSL
key. After you run this option, stop and restart the server.
Note: this option does not use the FQDN of the server as part of the certificate.
If you have a distributed environment where each server has a signed certificate, you must add
each signed certificate to an ngeniusclient.truststore, which you must then copy to each server in
the environment.
After this procedure is performed for all new certificates, the <nGeniusONE
install>/rtm/html/ngeniusclient.truststore must be copied to all the servers (<nGeniusONE
install>/rtm/html directory) in the environment. After the truststore has been copied to a server,
restart the server.
NETSCOUT strongly recommends customers use their own signed certificates to replace the
default self-signed certificates from NETSCOUT.
This tool will prompt you to enter the following information for both the CA and the server itself:
l Country
l State Code
l City Name
l Organization Name
l Organization Unit
l Common Name
l Email Address
l Days before the certificate expires
l Certificate Alias
Deployment Notes
In some environments, you may be required to install a ca-bundle.crt. If this is so, copy the
bundle to either:
or
You must then un-comment the following line in the Linux <nGeniusONE
install>/apache/conf/extra/httpd-ssl.conf file or Windows <drive>:\ <nGeniusONE
install>\apache\conf\extra\httpd-ssl.conf file:
SSLCACertificateFile "conf/ssl.crt/ca-bundle.crt"
On a Linux system, change ownership and permissions using the following commands:
chown ngenius:ngenius <nGeniusONE install>/apache/conf/ssl.crt/ca-
bundle.crt
chmod 750 <nGeniusONE install>/apache/conf/ssl.crt/ca-bundle.crt
Note:
l All servers in the deployment must use the same port number.
l The script used in this procedure modifies nGeniusONE files, not system files such as
/etc/sysconfig/iptables. If you modified iptables, which may be required for some
environments, you must update it separately.
l If you are changing the server to a secured port, you must also install a certificate. Use
the nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the
managing / primary server, and then copying that truststore to the other nodes in the
deployment.
l Supports well-known, nonstandard HTTP (80, 8080) and HTTPS (443, 8443) ports.
Websecure accepts a port number in the command line. Ports 80 and 8080 can be
configured only for HTTP, ports 443 and 8443 only for HTTPS.
Procedure
1. For Windows: Log in to the Windows server with an account that has administrator
privileges. (Do not use a cloned version of the Administrator account.)
For Linux: Access the system command-line as the root user. If you have logged in as a
different user and assumed privileges with su, be sure to use su -l <root account> so that
the full environment is instantiated before you proceed.
2. Navigate to the <NETSCOUT install>/rtm/bin folder.
3. Run the following script:
Windows: # websecure.bat -protocol <HTTP|HTTPS> -port <port>
Linux: # ./websecure.sh -protocol <HTTP|HTTPS> -port <port>
Provide the protocol and port number you want the web service to use. The script
automatically restarts the server.
4. To verify your change, access the server with the new port number and/or by accessing
Server Management and viewing the port number in the General Information tab.
5. By default, NETSCOUT's servers ship with iptables configured to allow ports 80, 8080, 443,
and 8443. If you had customized your iptables to restrict any of these, modify it again to
accept the new port.
6. Repeat this procedure for all servers in the deployment, using the same port number.
Follow these steps to change the ports in a Global Manager (GM) or Dedicated Global Manager
(DGM) environment:
Validation:
You can use curl to validate the change without using a web browser, substituting http and https
as appropriate, and using the IP address:port number for the server you want to test.
# curl -I <http|s>://<server_ip_address:port>/ -k
If the port change was successful, you will see a response such as:
HTTP/1.1 200 OK
For example:
# curl -I https://10.20.160.14:8443/ -k
HTTP/1.1 200 OK
Keep in mind the following considerations regarding SSL certificates and private keys when
upgrading:
l If you have custom certificates that previously resided in the apache/conf/ssl.crt and
apache/conf/ssl.key folders, they are preserved and restored on an upgrade.
l If you have custom settings in the original ssl.conf file, those settings are preserved but not
restored. To restore these settings, you need to manually update the httpd-ssl.conf file
(located in the apache/conf/extra folder) with the desired settings.
l If you previously had user-created folders in the original Apache folder, they are preserved
in the apache_orig folder. If desired, you can move them to the new Apache folder:
These files are automatically restored to their proper locations and no further steps are
required.
Note:
l All servers in the deployment must use the same port number.
l The script used in this procedure modifies nGeniusONE files, not system files such as
/etc/sysconfig/iptables. If you modified iptables, which may be required for some
environments, you must update it separately.
l If you are changing the server to a secured port, you must also install a certificate. Use
the nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the
managing / primary server, and then copying that truststore to the other nodes in the
deployment.
l Supports well-known, nonstandard HTTP (80, 8080) and HTTPS (443, 8443) ports.
Websecure accepts a port number in the command line. Ports 80 and 8080 can be
configured only for HTTP, ports 443 and 8443 only for HTTPS.
Procedure
1. For Windows: Log in to the Windows server with an account that has administrator
privileges. (Do not use a cloned version of the Administrator account.)
For Linux: Access the system command-line as the root user. If you have logged in as a
different user and assumed privileges with su, be sure to use su -l <root account> so that
the full environment is instantiated before you proceed.
2. Navigate to the <NETSCOUT install>/rtm/bin folder.
3. Run the following script:
Windows: # websecure.bat -protocol <HTTP|HTTPS> -port <port>
Linux: # ./websecure.sh -protocol <HTTP|HTTPS> -port <port>
Provide the protocol and port number you want the web service to use. The script
automatically restarts the server.
4. To verify your change, access the server with the new port number and/or by accessing
Server Management and viewing the port number in the General Information tab.
5. By default, NETSCOUT's servers ship with iptables configured to allow ports 80, 8080, 443,
and 8443. If you had customized your iptables to restrict any of these, modify it again to
accept the new port.
6. Repeat this procedure for all servers in the deployment, using the same port number.
Follow these steps to change the ports in a Global Manager (GM) or Dedicated Global Manager
(DGM) environment:
Validation:
You can use curl to validate the change without using a web browser, substituting http and https
as appropriate, and using the IP address:port number for the server you want to test.
# curl -I <http|s>://<server_ip_address:port>/ -k
If the port change was successful, you will see a response such as:
HTTP/1.1 200 OK
For example:
# curl -I https://10.20.160.14:8443/ -k
HTTP/1.1 200 OK
Use the following procedures to configure syslog forwarding. Setup requires steps on all
components be done in a specific order, so are presented in that sequence below.
Note: The procedure assumes that the InfiniStream appliance and nGeniusONE server are
configured to forward to either 514 for regular messages or 1111 for encrypted messages.
These steps are based on a Fedora kernel; adjust as needed for the type of operating system on
your actual syslog server.
Note: The key created above is copied to the TOEs in later procedures, listed in Next Steps,
below.
This service is used for secure log transport between the syslog server and its forwarding clients
(the InfiniStream appliances and nGeniusONE server).
Note: The steps in this section must not be performed until the above procedure is
completed.
cert = /etc/stunnel/stunnel.pem
ciphers=ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-
SHA256:ECDHEECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256
sslVersion = TLSv1.2
4. output = /var/log/stunnel.log
debug = 7
; Use it for client mode
client = no
[syslog]
accept=1111
connect=514
5. Save and exit the stunnel.conf file.
6. Create a new service script with the following commands:
# cd /etc/systemd/system
# touch stunnel.service
7. Edit the new file (stunnel.service) and enter the following lines:
[Unit]
Description=SSL tunnel for rsyslog
After=syslog.target network.target
[Service]
ExecStart=/usr/bin/stunnel /etc/stunnel/stunnel.conf
Type=forking
PrivateTmp=true
[Install]
WantedBy=multi-user.target
8. Save and exit the file.
9. Enable the stunnel daemon with the following commands:
# systemctl enable stunnel.service
# systemctl start stunnel.service
10. Verify the process is running:
# systemctl status stunnel.service
Loaded: loaded (/etc/systemd/system/stunnel.service; enabled)
Active: active (running) since Fri 2018-08-31 14:40:17 EDT; 5 days
ago
Ports 514 and 1111 must be opened in the firewall on the syslog server.
Proceed with configuring nGeniusONE servers and InfiniStream appliances in the cluster for
syslog forwarding. Do not remove the backup key material from the Syslog Server until the
procedures below are complete.
l Configure nGeniusONE Syslog Forwarding
l Configure InfiniStream Syslog Forwarding
The procedures below are used to configure the nGeniusONE server to send message log events
and operating system messages in /var/log/secure, /var/log/messages and /var/log/audit to a
syslog audit server. These steps establish a secure TLS connection for transferring system log
(audit log) events to an external syslog server.
Important: The procedures in this section require that the procedures to configure the
Syslog server have already been performed.
The stunnel service is used for secure log transport between the syslog server and its forwarding
clients (the InfiniStream appliances and nGeniusONE server). Use the steps below to configure
stunnel and the remote system logging service for forwarding.
Note: The steps in this section must not be performed until the external Syslog Server is
configured.
4. Edit stunnel.conf in a text editor and insert the following lines. Note that if you use a
hostname instead of IP Address for the connect parameter, that hostname must be in a
DNS server known to this appliance.
cert = /etc/stunnel/stunnel.pem
ciphers=ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-
ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256
CAfile = /etc/stunnel/ca-bundle.crt
sslVersion = TLSv1.2
debug = 7
syslog = yes
pid = /var/run/stunnel.pid
socket = l:TCP_NODELAY=1
socket= r:TCP_NODELAY=1
client = yes
[syslog]
accept = 127.0.0.1:514
connect = <10.20.179.19>:1111
5. Save and exit the stunnel.conf file.
6. Install the nGeniusONE certificate to communicate with the syslog server.
a. Make a directory for the syslog server certificate:
# mkdir -p /opt/certs/syslog
b. Copy the certificate from the nGeniusONE web server to the stunnel directory:
# cp /opt/NetScout/apache/conf/ssl.crt/server.crt
/etc/stunnel/stunnel.pem
# cat /opt/NetScout/apache/conf/ssl.key/server.key >>
/etc/stunnel/stunnel.pem
# cp /opt/NetScout/apache/conf/ssl.crt/ca-bundle.crt
/etc/stunnel/ca-bundle.crt
7. Enable and start stunnel services
# systemctl enable stunnel.service
# systemctl start stunnel.service
# systemctl status stunnel.service
Loaded: loaded (/etc/systemd/system/stunnel.service; enabled)
Active: active (running) since Fri 2018-08-31 14:40:17 EDT; 5 days
ago
*.* @@127.0.0.1:514
$ModLoad imfile
# auditd audit.log
$InputFileName /var/log/audit/audit.log
$InputFileTag tag_audit_log:
$InputFileStateFile audit_log
$InputFileSeverity info
$InputFileFacility local7
$InputRunFileMonitor
$InputFileName /opt/Netscout/apache/logs/error_log
$InputFileTag tag1:
$InputFileStateFile stat-file1
$InputFileSeverity error
$InputFileFacility local5
$InputRunFileMonitor
# End CC mods
5. Now locate this line:
*.info;mail.none;authpriv.none;cron.none; /var/log/messages
6. Change it to the following syntax:
*.info;mail.none;authpriv.*;cron.none;local7.none;local5.*
/var/log/messages
7. Save and exit the file.
8. Restart the service and verify it is running, with the following commands:
# systemctl restart rsyslog.service
# systemctl status rsyslog.service
Loaded: loaded (/etc/systemd/system/rsyslog.service; enabled)
Active: active (running) since Fri 2018-08-31 14:40:17 EDT; 5 days
ago
You can optionally customize the rotation cycle and the location of the log files to accommodate
capacity and retention requirements. If desired, follow the procedures in Log File Management
Important: The procedures in this section require that the procedures to configure the
Syslog server have already been performed.
debug = 7
syslog = yes
pid = /var/run/stunnel.pid
socket = l:TCP_NODELAY=1
socket= r:TCP_NODELAY=1
client = yes
[syslog]
accept = 127.0.0.1:514
connect = <10.20.179.19>:1111
c. Save and exit the file.
4. Install the InfiniStream appliance certificate to communicate with the syslog server. Copy
the certificate from the InfiniStream lighttpd folder to the stunnel directory.
# cp /etc/lighttpd/ssl/lighttpd.pem /etc/stunnel/stunnel.pem
# cp /opt/certs/ca-bundle.crt /etc/stunnel/ca-bundle.crt
5. Start stunnel services:
l For all appliances except 69xxC and 79xx:
a. Run the following:
# systemctl enable stunnel.service
# systemctl start stunnel.service
b. Verify the service is running:
# systemctl status stunnel.service
Loaded: loaded (/etc/systemd/system/stunnel.service; enabled)
Active: active (running) since Fri 2018-08-31 14:40:17 EDT; 5
days ago
l For 69xxC and 79xx appliances:
a. Run the following:
# chkconfig --add stunnel
# chkconfig stunnel on
# /etc/init.d/stunnel start
b. Verify the service is running:
# ps -ef |grep stunnel
root 6086 1 0 09:47 ? 00:00:00 /usr/sbin/stunnel
/etc/stunnel/stunnel.com
*.info;mail.none;authpriv.none;cron.none; /var/log/messages
d. Change it to:
*.info;mail.none;cron.none;local7.none;authpriv.*
/var/log/messages
e. Save and exit the file.
4. Restart rsyslog system services:
l For all appliances except 69xxC and 79xx:
a. Run the following:
# systemctl restart rsyslog.service
b. Verify the service is running:
# systemctl status rsyslog.service
Loaded: loaded (/etc/systemd/system/rsyslog.service; enabled)
Active: active (running) since Fri 2018-08-31 14:40:17 EDT; 5
days ago
l For 69xxC and 79xx appliances:
a. Run the following:
# /etc/init.d/rsyslog restart
b. Verify the service is running:
# ps -ef |grep rsyslog
root 9340 1 0 10:12 ? 00:00:00 /sbin/rsyslogd -c 4
You can optionally test the above configuration now, or wait until all components of the
deployment are set up. When ready, refer to Test and Troubleshoot Syslog Forwarding.
You can optionally customize the rotation cycle and the location of the log files to accommodate
capacity and retention requirements. If desired, follow the procedures in Log File Management
The default log file location on nGeniusONE servers or InfiniStream appliances reside in the /var
directory, on the operating system disk. Use the procedure to move it to another disk.
When you are certain that logging is occurring in the new location, you can remove the log.orig
directory from /var directories.
Linux logs rotate according to settings in /etc/logrotate.conf. Typically, logs are saved for seven
days then deleted from the system and replaced by new log files. Perform these steps to
customize the logging strategy on all the nGeniusONE servers or InfiniStream appliances as
indicated.
compress
5. When configuring this file on 69xx and 79xx model InfiniStream appliances, locate and
comment out the following lines by inserting a # symbol, as indicated below:
# system-specific logs may be also configured here.
#/var/log/messages {
# rotate 12
# daily
# postrotate
# /sbin/service syslog restart
# endscript
#}
#/var/log/stunnel.log {
# rotate 12
# daily
# postrotate
# /bin/kill -HUP `cat /var/run/stunnel.pid 2> /dev/null` 2>
/dev/null || true
# endscript
#}
#/var/log/snmptrap.log {
# rotate 12
# daily
# postrotate
# /sbin/service syslog restart
# endscript
#}
6. Save and exit the file.
7. On InfiniStream appliances only:
a. Edit the syslog daemon for log rotation:
# vi /etc/logrotate.d/syslog
8. Add /var/log/messages and /var/log/snmptrap.log to the following line as shown:
/var/log/cron
/var/log/maillog
/var/log/secure
/var/log/spooler
/var/log/messages
/var/log/snmptrap.log
{
sharedscripts
postrotate
/bin/kill -HUP `cat /var/run/syslogd.pid 2> /dev/null` 2> /dev/null
|| true
endscript
}
9. Save and exit the file.
10. Restart logging:
# service rsyslog start
11. Stop the application processes.
Note: If your deployment requires forwarding of OS-level events (handled separately from
nGeniusONE alarms) refer to the overall steps to Configuring Syslog Forwarding.
Message fields
Caution: The following process restores your configuration settings only, not data. It creates
a new blank database. Contact Customer Support if you have any questions or need
assistance before using the following procedure.
Note: Because a database failure can result from disk-related errors, you must verify that the
system disk has no errors prior to restarting the nGeniusONE Server.
1. Stop the parent server and all associated child servers. Ensure that all nGeniusONE
processes have stopped.
2. Locate your backup files. (You defined the path when you set up the original backup.)
Within the defined path, locate the <nGeniusONE install>/rtm folder. Note that the
example below and throughout this procedure assumes the backup path is "home/full-
bkup" -- replace this portion with the path for the backup on your own server. Example:
/home/full-bkup/NetScout/rtm.
3. Access the operating system command line and navigate to the <nGeniusONE install>/rtm
directory.
4. Copy the appropriate backup files from the backup location in Step 2 to the <nGeniusONE
install>/rtm directory.
# cp /home/full-bkup/NetScout/rtm/* <nGeniusONE install>/rtm
5. Ensure ownership of the copied files is ngenius:ngenius (for simplicity, this command can
be used for the whole folder):
# chown -R ngenius:ngenius <nGeniusONE install>/rtm/
6. For the configuration restore:
a. Locate the backup directory with configuration files. Example:
/home/full-bkup/NetScout/rtm/database/config-
backup/datafile*latest/
b. Copy those configuration data files to <nGeniusONE install>/rtm/nsaapp/config, using
the dbreload command:
# ./dbreload.sh /home/full-bkup/NetScout/rtm/database/config-
backup/datafile*latest/
c. Start the database by executing the dbstart from the <nGeniusONE install>/rtm/bin
directory. The following message displays:
Please wait while starting the nGeniusONE Server database...
d. To determine the restore status, run tail on the <nGeniusONE
install>/rtm/database/postgresql/pg_log/postgresql-<dayofweek>.log file and monitor
for the following message:
LOG: database system is ready to accept connections
e. After the database is successfully restored, stop the database by executing dbstop
command from the <nGeniusONE install>/rtm/bin directory.
7. Start the nGeniusONE Server.
Important: This procedure makes use of a tool that is intended for use by qualified support
personnel only. Improper use of this tool may result in a loss of data. If needed, contact
Customer Support for guidance before performing these steps. NETSCOUT recommends
making a backup before making modifications.
Procedure
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. For a Global Manager to Standalone conversion do the following steps in Server
Management before you proceed to the next step:
l Access Server Management on the Global Manager and remove any of the remote
child / local servers that are managed by this server. This excludes the local server
residing directly on the Global Manager.
l If any of the child servers are NOT RUNNING, you must enable them to ensure they
properly disassociate from the Global Manager when you remove them.
3. Navigate to the <nGeniusONE install>/rtm/bin directory.
4. Ensure the nGeniusONE Server processes are running. If not, then start them.
5. Start the Server Map utility:
# ./nstool.sh com.netscout.database.util.ServerTool
The following menu options display:
>0
-----------------------------------------------------------------
>5
3. From the Server Operations drop-down menu, select option for Convert to Primary.
4. Verify the IP Address presented in this dialog box before proceeding to the next step. If
the correct IP Address is listed, click Yes.
5. When the conversion completes, a message box displays instructing you to refresh the
clients. Click OK to acknowledge the message. The list displays with the same server
names but the IP Addresses for the Primary and Secondary have been swapped, as shown
below.
6. Ensure your users log out and back in. There is no need to restart servers for this
procedure.
1. Open a PuTTY window to the Primary Server and log in as the root user.
2. Navigate to the bin folder. For example:
# cd /<nGenius Session Analyzer install>/rtm/bin
3. Stop the server processes.
4. Verify all processes are stopped:
# ./PS
The output of this should only be the Xvfb process. If any other nGeniusONE processes
display, run the ./stop command again, or kill the processes.
5. Change to user ngenius with: su - ngenius. This is required to run the next script.
6. Re-navigate to the executable directory:
-bash-4.1 $ cd /<nGenius Session Analyzer install>/rtm/bin
7. Run the script below to change the role of the current server to the opposite of its current
role.
# ./convertsecondaryglobaltoprimaryglobal.sh
The conversion procedure runs and completes, after which the command prompt
displays.
8. Exit the shell for the ngenius user so that you are now the root user.
9. Start the server processes.
10. Repeat this procedure on the Secondary server.
You can now log into it as the primary server. The data that is reported as being under the name
of the primary continues to be reported with that server's alias, even though the IP address is
now that of the original secondary server.
Note: If you are converting the Standby Server to test your recovery procedure, instead, refer
to: Testing the Standby Server.
2. From the Servers tab, locate the Local Server with the Standby Server you want to
promote to a Primary role. Select the Standby Server that you want to promote to primary.
The Standby Server must be running and must be associated with a remote child server.
3. If you have selected a supported server type, the Server Operations drop-down menu
option for Convert to Primary is enabled. Select that option.
4. Verify the IP Address presented in this dialog box before proceeding to the next step. Do
not click the Failback option, this is used only for testing purposes and is not applicable
when you need the Standby to truly assume the role of its primary server.
If the correct IP Address is listed, click Yes.
5. When the conversion completes, a message box displays instructing you to restart the
converted server. Click OK to acknowledge the message.
6. Restart the server(s).
Note: If you are converting the Standby Server to test your recovery procedure, instead, refer
to: Testing the Standby Server.
1. Open a PuTTY window to the Standby Server and log in as the root user.
2. Navigate to the bin folder.
# cd /<nGeniusONE install>/rtm/bin
3. Stop the nGeniusONE server processes.
4. Verify all processes are stopped:
# ./PS
The output of this should only be the Xvfb process. If any other nGeniusONE processes
display, run the ./stop command again, or kill the processes.
5. Change to user ngenius with: su - ngenius. This is required to run the next script.
6. Re-navigate to the executable directory:
-bash-4.1 $ cd /<nGeniusONE install>/rtm/bin
7. Run the script below and specify the IP Address of the server you want to become the
primary:
# ./convertstandbytoprimary.sh <Standby Server IP address> true
The conversion procedure runs and completes, after which the command prompt
displays.
8. Exit the shell for the ngenius user so that you are now the root user.
9. Start the nGeniusONE server processes.
You can now log into it as the primary server. The data that is reported as being under the name
of the primary continues to be reported with that server's alias, even though the IP address is
now that of the original standby server.
the failback mode indicated in this procedure, the roles of the Primary and Standby Server are
reversed with no data loss. The steps are repeated with the opposite IP address to revert the
conversion.
Note:
l Although a GUI-based method is available for certain configurations, the manual
method is supported for all standby configurations so is most suitable for testing
standby conversion.
l This procedure is intended for testing and presumes both the Primary and Standby
servers are online and running normally.
l This procedure is applicable for these server types:
o Local Server (remote as well as the LocalServer located on a Global Manager or
Dedicated Global Manager)
o Standalone nGeniusONE Server
o nGenius Configuration Manager
Syntax
where
<ip address> is the address of the standby server that you want to become the primary
server
Procedure
1. Open a PuTTY window to the Primary Server and its associated Standby Server that you
plan to test. Place them side by side on your monitor.
2. In both windows, log into the operating system command line as the root user.
3. In both windows, navigate to the bin folder.
# cd /opt/NetScout/rtm/bin
4. In both windows, stop the nGeniusONE server processes:
# ./stop
5. In both windows, verify all processes are stopped:
# ./PS
The output of this should only be the Xvfb process. If any other nGeniusONE processes
display, run the stop command again, or kill the processes.
6. In both windows, switch to the ngenius user and instantiate the environment:
# su - ngenius
bash-4.1$
Use the - option with this command. You will now be in the install folder for your server
software (/opt/NetScout, by default) and a new shell command prompt displays.
7. In both windows, ensure you are in the bin folder.
bash-4.1$ cd /opt/NetScout/rtm/bin
8. In both windows, run the script and specify the IP Address of the server you want to
become the primary:
bash-4.1$ ./convertstandbytoprimary.sh <Standby Server IP address>
true
The conversion procedure runs and completes, after which the command prompt
displays.
9. Exit the ngenius user shell and return to the root user shell:
bash-4.1$ exit
logout
#
Restart the nGeniusONE server processes on both servers as the root user:
# ./start
10. To verify the changes, do one of the following:
l Verify in Server Management:
Access Server Management from the nGeniusONE Console on the Standby server. The
Servers tab shows a row for each of the Primary and Standby servers, with the original
hostnames, but the IP addresses are swapped.
Example:
If you had started with the following configuration:
Server Type
⯈ GlobalManager1 Global
10.20.100.161
o LocaltoMyGlobal1 Local
10.20.100.161
⯈BostonPrimary Local
10.20.48.230
o BostonStandby Standby
10.20.50.216
⯈PlanoPrimary Local
10.20.160.14
o PlanoStandby Standby
10.20.160.44
Server Type
⯈ GlobalManager1 Global
10.20.100.161
o LocaltoMyGlobal1 Local
10.20.100.161
⯈BostonPrimary Local
10.20.50.216
o BostonStandby Standby
10.20.48.230
⯈PlanoPrimary Local
10.20.160.14
o PlanoStandby Standby
10.20.160.44
l Verify manually:
On each server, open the file below:
<nGeniusONE install>/rtm/database/configxml/xml/server_map.xml
Locate the name of the primary server you are testing. The <server_config> block
below that will have an <address> block with the IP address of the Standby Server you
tested. Given the example above, you would see:
<server_info>
<id>1</id>
<name>BostonPrimary</name>
<type>Local</type>
<status>UP</status>
<master>0</master>
<Time_Zone>US/Eastern</Time_Zone>
<registryBindnigName>ServiceManager</registryBindnigName>
</server_info>
<server_config>
<address>10.20.50.216</address>
<port>8080</port>
<protocol>HTTP</protocol>
</server_config>
This test ran the script on the Primary server, which is not typical for a real scenario in
which the primary server has failed. This allows you to see both servers and leave them
running and part of the cluster rather than having them competing to both be the Primary
server. Because the settings were changed on both servers, you should now also see the
Standby Server's name with the IP Address of the original Primary server.
11. To revert the sequence and restore the servers to their original Primary and Standby roles:
a. In windows to both servers, still logged in as the user root, stop the nGeniusONE
server processes and verify they are stopped:
# ./stop
# ./PS
b. In both windows, switch to the ngenius user and instantiate the environment, then
navigate to the bin directory:
# su - ngenius
bash-4.1$
bash-4.1$ cd /opt/NetScout/rtm/bin
c. Now, in both windows, run the script and specify the IP Address of the server you want
to become the primary. In this case, use the address of the current standby server,
which you had just changed from primary to standby and now want to revert it to
primary again:
# ./convertstandbytoprimary.sh <Current Standby Server IP
address> true
The conversion procedure runs and completes, after which the command prompt
displays.
d. Exit the ngenius user shell and restart the nGeniusONE server processes on both
servers:
bash-4.1$ exit
logout
#
#./start
If you miss one of the steps on the steps in the conversion process, contact Customer Support
for assistance to correctly configure names and IP addresses.
l Evaluation: This time-based license requires a generated serial number (based on the
software option code) and password, and a date reflecting the duration of the license.
When your evaluation is complete, you can remove this key and install a Permanent
license.
l Permanent: This type of license requires a generated serial number (based on the
software option code) and password, and a Host ID based on the MAC or IP address of the
component. Since the key is locked to the specific hardware, only install a permanent
license when you are ready to deploy in a production environment.
l Incremental: This license type supplements a permanent license to increase the number
of supported streams or interfaces. For nGeniusONE, incremental licensing is supported
for the 50-pack (225) option only, and upgrades for nGeniusONE-5, -10, and -25 license
options are to the nGeniusONE-50 option.
l Standby: License for a backup, failover server. For nGeniusONE, standby is supported for
the 50-pack (225) option only, but standby options vary and are available at other levels for
other products.
l Options: See below for details on common license codes and options.
The following sections contain license type exceptions and nuances that may be applicable to
your deployment. Contact your NETSCOUT representative for additional guidance, if needed.
Omnis 5G Adaptor
The Omnis 5G Adaptor for InfiniStreamNG instrumentation provides 5G processing support to
InfiniStreamNG instrumentation devices. This module is licensed per instrumentation class in
packs of 1, 5, or 25 for the 1-socket or 2-socket options for InfiniStreamNG or vSTREAM vCPU
blocks.
Available in license packs of 10, 50, and 100. Incremental licensing is supported for these
stackable options. Apply this central license on an nGeniusONE Global Manager, Dedicated
Global Manager, Standalone, or nGenius Configuration Manager. Standby licenses are included.
Do not apply this license on a Local Server in a Global deployment. To reprovision a device
after a license is attached, you must remove the device association with the modify operation.
Available in license packs of 1 and 5. Incremental licensing is supported for these stackable
options. Apply this central license on an nGeniusONE Global Manager, Dedicated Global
Manager, Standalone, or nGenius Configuration Manager. Standby licenses are included.
Do not apply this license on a Local Server in a Global deployment. To reprovision a device
after a license is attached, you must remove the device association with the modify operation.
The Omnis Cyber Adaptor does not support nGenius Collector, vSTREAM virtual appliance, or
vSTREAM Agent.
ISNG RAN
License options are available for 1k, 10k, and 50k cells. Additionally, license options are available
for nGenius ASI Stream/nBA RAN Session Record Export. Incremental licensing is supported for
these stackable options.
For more information, refer to the Radio Access System Compliance Document.
If running nGeniusONE without Performance Manager on a 16 GB 4 CPU system, you must use
license option 222 or 308. nGeniusONE OVA (VMware) images use the 16GB 4 CPU option by
default. Fresh installs of nGeniusONE may also run on a 16 GB 4 CPU system.
Note:nGenius Session Analyzer supports the vSTREAM virtual appliance. The Type 1 licensing
of the vSTREAM virtual appliance for nGenius Session Analyzer is similar to that nGeniusONE
and nGenius Business Analytics, where 8 vCPUs are one Type 1 interface. See vSTREAM virtual
appliance documentation for more information about vSTREAM virtual appliance licensing.
nSA RAN
The nSA RAN license grants nGenius Session Analyzer access to ISNG RAN probes and includes
1K, 10K, or 50K cell counts. The authenticating nGenius CM server enforces this global license
that controls display of ISNG RAN probes and their sessions in nGenius Session Analyzer. If any
one of the three nSA RAN licenses exists, the authenticating nGeniusONE or nGenius
Configuration Manager provides the ISNG RAN probes for nGenius Session Analyzer to list in the
probe selection pane.
nGenius Session Analyzer requires an nSA RAN license to show ISNG RAN probe content from a
TrueCall or nGenius TrueCall drill. If there is no nSA RAN license, the drill to nSA yields no
relevant sessions since ISNG RAN probes are not searched without the license.
Note: There is no RAN-specific license based on cell counts for nGenius Subscriber
Cache/SCS. SCS uses Type 1 licenses. When an SCS user searches currently supported cached
subscriber digits, the retrieved content from the core is multi-protocol-correlated with ISNG
RAN content if the related nGenius Session Analyzer has an nSA RAN license.
PFS Monitor
A 2500-pack license allows a total of 2500 ports across different Packet Flow Operating System
(PFOS) devices. Install this centralized license on nGenius Configuration Manager and share with
all attached servers. Incremental licensing is supported for these options.
The former 50-pack licenses for PFS and PFS Standby, 400 and 401, are obsolete. Please
talk to your account team to convert your existing license to a 2500-pack license.
To increase the number of elements you can monitor, you can purchase an additional license.
If you are upgrading from a previous software version or if you are importing devices from
another product, ensure that your license accommodates the required number of monitored
elements.
Note:
l For an overview of license types Understanding License Types and Options
l To register the software using a virtual IP address, the IP address must be bound to the
server you are licensing.
l You need the registration key, from your product order/Registration Coupon, to
generate a license.
Use the procedure below for each of the coupons you have received:
1. Locate all Registration Coupons for which you need to generate licenses.
2. Access your MasterCare account: https://my.NETSCOUT.com
3. Navigate to the product section for your product type.
4. Select the software version of interest, then scroll to the bottom of the page.
5. Click the row corresponding for licensing type:
l Evaluation Licenses
l Permanent/Incremental and Full Licenses
For an explanation of license types, refer to Understanding License Types and
Requirements. The license options vary based on the selected product and release
version.
If the End User License Agreement (EULA) appears, click the I Agree button. The EULA
appears for:
l First-time users of the software download pages.
l Users who have not accessed the page within a year of the last published EULA.
6. Click Continue under "License Registration."
7. The registration field appears at the bottom of the next page. Enter the registration key
from the Registration Coupon you received with your product shipment and click Yes to
confirm your product.
If your deployment includes multiple licenses (such as incremental packs), install the base license
first, then the repeat for each key.
Note:
l Before you begin, you must register the nGeniusONE license to obtain a key for use in
this procedure (see Registering a License).
l When the data sources are managed by child servers, install the key on the child
servers.
l When data sources are directly managed by the parent server, then a key is required on
that parent server.
1. Initiate the licensing utility:
l Windows — From Start > (All) Programs > NETSCOUT>nGenius Server, select Update
License
l Linux — From the <nGeniusONE install>/rtm/bin directory, execute ./LicenseCL.sh.
2. Enter the required information, clicking Next or pressing Enter after each entry:
l Permanent — Serial number, password, MAC or IP address, and software option
number
l Incremental — Serial number, password, MAC or IP address, and software option
number
l Evaluation — Serial number, password, and expiration date
3. (GUI installations) When licensing is complete, click OK.
4. Restart the server.
Important:
l When server map table is modified on a parent server, the change is pushed to all child
servers. If you perform this procedure on a child server, you must also perform it on the
parent server.
l Changes to the /etc/hosts file are not replicated. When you change a server hostname
in /etc/hosts, you must also manually modify the /etc/hosts file on every server and
data source associated with the deployment.
l If you only need to change the "friendly name" of the server, you can do that from the
parent server in the cluster. Access the Server Management GUI from the parent server
of the cluster, and make the change in the General Information tab. That server's name
update is then replicated to all children in the cluster.
For distributed deployments, or deployments with parent/child servers, always do the changes
on the parent first. This replicates the map file for you, which simplifies the steps and mitigates
potential errors.
Note:
l All servers in the deployment must use the same port number.
l The script used in this procedure modifies nGeniusONE files, not system files such as
/etc/sysconfig/iptables. If you modified iptables, which may be required for some
environments, you must update it separately.
l If you are changing the server to a secured port, you must also install a certificate. Use
the nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the
managing / primary server, and then copying that truststore to the other nodes in the
deployment.
l Supports well-known, nonstandard HTTP (80, 8080) and HTTPS (443, 8443) ports.
Websecure accepts a port number in the command line. Ports 80 and 8080 can be
configured only for HTTP, ports 443 and 8443 only for HTTPS.
Procedure
1. For Windows: Log in to the Windows server with an account that has administrator
privileges. (Do not use a cloned version of the Administrator account.)
For Linux: Access the system command-line as the root user. If you have logged in as a
different user and assumed privileges with su, be sure to use su -l <root account> so that
the full environment is instantiated before you proceed.
2. Navigate to the <NETSCOUT install>/rtm/bin folder.
3. Run the following script:
Windows: # websecure.bat -protocol <HTTP|HTTPS> -port <port>
Linux: # ./websecure.sh -protocol <HTTP|HTTPS> -port <port>
Provide the protocol and port number you want the web service to use. The script
automatically restarts the server.
4. To verify your change, access the server with the new port number and/or by accessing
Server Management and viewing the port number in the General Information tab.
5. By default, NETSCOUT's servers ship with iptables configured to allow ports 80, 8080, 443,
and 8443. If you had customized your iptables to restrict any of these, modify it again to
accept the new port.
6. Repeat this procedure for all servers in the deployment, using the same port number.
Follow these steps to change the ports in a Global Manager (GM) or Dedicated Global Manager
(DGM) environment:
Validation:
You can use curl to validate the change without using a web browser, substituting http and https
as appropriate, and using the IP address:port number for the server you want to test.
# curl -I <http|s>://<server_ip_address:port>/ -k
If the port change was successful, you will see a response such as:
HTTP/1.1 200 OK
For example:
# curl -I https://10.20.160.14:8443/ -k
HTTP/1.1 200 OK
Note:
l To change the port for Client<->Server or Server<->Server, refer instead to websecure.
l The data source and nGeniusONE Server must be configured with the same port for
communications.
l HTTP/S port override is supported for NETSCOUT data sources only and is grayed out
for devices such as routers or switches.
l For virtual data sources:
o For vSTREAM Agent deployments, an existing web server on the virtual machine may
already be using port 8080 or 8443, so it may be necessary to customize this
communication port.
o Automatic configuration of the data source in nGeniusONE occurs upon receiving a
new version of the Probe Advertisement Trap. When the server receives a trap for an
existing data source, it updates the data source's configuration. If the data source
does not exist, it is added based on the configuration, which includes the
communication port.
o In the event that traps are not supported in the cloud or errors occur during auto-
discovery, you can use this method to manually configure the port.
Server Procedure
To modify the HTTP/S communication port used between the server and data source:
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Update iptables:
a. Stop the server.
b. Update iptables to add the new port and optionally delete the old port.
c. Ensure you restart iptables before you proceed or reboot the servers.
d. If you did not reboot in the previous step, start the server.
Important: If this server is part of a distributed environment, repeat the iptable
changes on the managing server.
3. Modify the port number for the data source:
a. From the nGeniusONE Console, access Device Configuration.
b. Double-click the Device for which you want to modify the communication port.
c. In the Device Details pane, use the Communication Protocol menu to specify either
HTTP or HTTPS.
d. In the HTTP/HTTPS Port field, specify the custom port.
e. Click OK to save your configuration.
f. You are prompted with a message to reset the device. Click OK and reset the device.
For detailed guidance on modifying this and other settings for this data source, refer to the
appropriate administrator or installation guide, listed above. Generally, however, you perform
the following steps:
vSTREAM Agent Procedure
You can modify the HTTP_PORT or HTTPS_PORT variables using any of the following techniques:
l Use the set vstream_config HTTP_PORT or HTTPS_PORT <0..65535> command from the
Agent Configuration Utility command line.
l Edit the /NetScout/rtm/config/nsagent_config.cfg file directly.
l Reconfigure settings in a new nsagent_config.cfg file, save it to /tmp, and restart the
vSTREAM Agent.
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Ensure the hostname and domain of the server are in the /etc/hosts file. (During
installation, these should have been added as the first entry in the file.)
3. Navigate to <nGeniusONE install>/rtm/bin.
4. Stop the server.
5. In the servermapupdater.sh file, set this line to "true":
PREFERIPV6ADDRESS="java.net.preferIPv6Addresses=true"
6. Save and exit the file.
7. Start the nGeniusONE Server.
1. Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
2. Stop the nGeniusONE server.
3. Navigate to the <nGeniusONE install>\rtm\bin folder.
4. In pm_env.bat set the USE_IPV6 variable to 'true.' The default is false.
set USE_IPV6=true
5. Start the nGeniusONE server.
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Ensure the hostname and domain of the server are in the /etc/hosts file. (During
installation, these should have been added as the first entry in the file.)
3. Navigate to <nGeniusONE install>/rtm/bin.
4. Stop the server.
5. In the serverprivate.properties file, set this line to "true":
server.autoRegister.userHostName=true
6. Save and exit the file.
7. Edit the pm_env.sh file, and ensure that <hostname> in the following line matches the
hostname to be used:
NSHOST=<hostname>
8. Save and exit the file.
9. Start the nGeniusONE Server.
Parameters
The same number of fields, in the same order, are sent as parameters to all CallBack scripts,
regardless of which module calls the script. Based on the type on the type of trigger and other
configurations, some fields may be blank. Following is a list of the parameters that may appear
in the log file.
l Monitored Element
l IP Address of the associated monitored element
l Timestamp of the event
l Severity
l Trap Type
l Trap Variable (the variable on which the alarm was set)
l Trap Value (the actual value of the variable)
l Trap Threshold (the threshold that was applied when the trap was configured)
l Trap Description (Example: ”r;Rising Threshold Reached”)
l Trap Interval (Example: The time interval over which the average value is computed for
comparison threshold value)
l Alert ID (The server reporting the alert, and the alert ID itself. The ID of the server is shown
in the server_map.xml file.
l Alert Evidence
Monitored Element: IS-28:if4
IP Address: 172.21.72.28
Severity: 1
Trap type:ASI2x_THRESHOLD_ALARM
Trap description: Failure for Service:T1App:DNS) has exceeded the config threshold over a 5
minute period (threshold = 1 %; last delta = 16.45 %; cumulative occurrences since start = 1)
Interface number: 4
Custom Scripts
If desired, you can use standard shell commands to create a shell script that parses the incoming
parameters and takes other actions such as logging separately or triggering an email. Here are
key rules for adding a custom script:
l To display in the menus for the configuration modules, the script must reside in the
<nGeniusONE install>/rtm/scripts folder. It must have a .sh extension (or .bat for Windows).
l The file must have ownership/permissions as the other scripts (executable and owned by
the ngenius user, not root)
Note: The KPI Alarm dialog displays all the scripts, although there is not a specific script for
logging KPI Alarms. Either select nsscript, or create a custom script as noted above.
Note: This does not override alert actions defined in Service Configuration, which may specify
particular emails and IP addresses.
Note: If your deployment requires forwarding of OS-level events (handled separately from
nGeniusONE alarms) refer to the overall steps to Configuring Syslog Forwarding.
Message fields
Also see: snmpv3script
1. From the nGeniusONE console, click Global Settings > Application Configuration.
2. Clickhe SNMP Trap Listeners Configuration button.
Note:If the nGeniusONE Server (Global Manager or standalone nGeniusONE Server) is using
two NICs, you must add the both IP addresses.
When you enable this alarm (through a property setting), the alarm engine works in the
background to check for impending certificate expiration. If any certificate has days remaining
less than a default or custom threshold, an alarm is generated.
You can see these alarms in the Notification Center under the category of “Certificate Expiration”
and drill down from them to the Certificate Monitor.
A script is provided to manually reset baselines for an interface or a service. After an interface is
reset, old baselines are not shown in charts. Supply the interface or service and date for the
reset to take place.
To reset baselines:
Usage:
nsResetBaseline.sh [help|list|add][servicename <name>|serviceid <id>|device <ip_address
ifn>] <YYYY>-<MM>-<DD>T<hh>:<mm>
Where:
l add — Add an interface to the reset list.
l list — Show a list of devices and associated interfaces scheduled for reset.
l servicename <name> — Use to specify a service name to add.
l serviceid <id> — Use to specify a service ID to add.
l device <ip_address ifn> — Use to specify a device to add. When ifn is set to -1, it
acts as a wildcard to target all interfaces.
l Optional <YYYY>-<MM>-<DD>T<hh>:<mm> = The date and time (using server timezone)
you want to set on which the alert baselines will begin to be calculated—the baselines
before this time are removed and baselines shown in charts, alerts, and situations are
removed.
If the date and time are not specified, the current time that the script is run is used to
begin to calculate new baselines.
It may take multiple days after this specified date and time (or the current time if no
date and time are specified) for the calculations to complete and to show alert data.
o <YYYY> = Four numbers indicating the year.
o <MM> = Two numbers indicating the month of the year (example: April is 04).
o <DD> = Two number indicating the day of the month (example: the third of the month is
03).
o T -- Enter this character to separate the date from the time in the command line.
o <hh> = Two numbers indicating the hour of the day, in a 24-hour clock (example, 2:00 am
is 02).
o <mm> = Two numbers indicating the minute of the day, in the range from 00 to 59.
Examples:
nsResetBaseline.sh list
nsResetBaseline.sh add servicename LDAP1 2020-08-19T15:00
Complete these steps to upgrade the Decode Pack software on your InfiniStream appliances:
1. Ensure that your environment meets all prerequisites; refer to NETSCOUT Server
Administrator Guide.
2. Choose one of these options (there is one option for nGeniusONE users):
l On the parent server, download the appropriate upgrade file to the nGeniusONE<install
directory>/rtm/pmupgrade directory. (Note that the download directory differs from
that for InfiniStream software.)
Upgrade files have this naming format:
dep-[major version]-[minor version]-[build]-[OS].bin
For example, a v15.1 build 166 upgrade file for Linux would be named: dep-15-1-166-
lin.bin
Note: MasterCare customers can download the binary upgrade files for the latest
version of software from the NETSCOUT Support site:
https://my.netscout.com/mcp/Pages/landing.aspx
You can find the software in the Sniffer Decode and Expert Pack section. Refer to the
appropriate software release notes for your appliance for specific instructions.
l Schedule automatic software download; refer to NETSCOUT Server Administrator Guide.
When using this method in a distributed server environment, you must download the
files to the Global Manager.
3. Go to nGeniusONE > Device Configuration > Upgrade > Decode Pack.
Installed Decode Packs are listed with their current status, name, IP address, model
number, version number and build, and description.
When you upgrade an individual InfiniStream appliance, you can choose to preserve existing
partitions or create factory default partitions, as shown below. Allowable ranges and defaults
vary depending on the appliance total disk free space.
Option Description
Preserve all existing partitions on all selected (Default) When selected preserves current partition
systems sizes for all selected appliances.
Note: Existing NETSCOUT (Raw) file system partitions
are not preserved.
Create factory default partitions on all selected When selected uses the default partition size for all
systems selected appliances.
When you upgrade multiple InfiniStream appliances, you can choose to preserve existing
partitions or create factory default partitions on each device.
Option Description
Preserve all existing partitions (Default) When selected preserves current partition sizes for all selected
on all selected systems appliances.
Create factory default When selected uses the default partition size for all selected appliances.
partitions on all selected
systems
Note: To delete a software package, select it, click Delete, and confirm the deletion.
7. Click Upgrade.
The Upgrade Parameters dialog box is displayed.
8. Configure the upgrade parameters according to the type of upgrade you are performing:
l Individual appliance
l Multiple appliances
Note: If you are upgrading vSTREAM Agent, configuring upgrade parameters does not
apply; go to Step 9.
Note: The first time the Agent starts after an upgrade, the CodecTable settings are
automatically backed up to CodecTable.V<n>. A new CodecTable is created that converts
previous codec settings, and also includes any new payload types. If you modified EVRC or
EVRC-B codecs, verify that your settings were carried forward. Copy any required changes
from the backed up CodecTable to the new CodecTable and restart the Agent to apply.
Troubleshooting
l If the upgrade file upload to the device fails (for example, due to network congestion or
slow connectivity), restart the upgrade.
l If the upload completes, but the upgrade fails on the device, you must manually upgrade
by logging directly into the device.
l Windows
o 6.3.2 or higher – 64-bit installer
o 6.3.1 or lower - 32-bit installer
For guidance configuring localized web login messages, refer to: Enabling a Login Security
Message
Note: If you need to uninstall the software, refer to Uninstalling NETSCOUT Software
Supported Languages
l English
l Japanese
l Korean
l Simplified Chinese
Configuring Localization
To ensure proper display of languages other than American English, you must perform the
following configuration before installing nGeniusONE on the server system.
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Use the following command to determine what languages and character sets are installed:
# locale -a
3. From that list, identify the code that matches the one you wish to configure (of the above
supported sets).
4. Make a backup copy of the system internationalization file:
# cp /etc/sysconfig/i18n /etc/sysconfig/i18n.bak
5. Edit the original file and modify the LANG= line to match the code you selected above. For
example, given the file contents of:
LANG="en_US.UTF-8"
SYSFONT="latarcyrheb-sun16"
You may opt to change the language to Japanese using:
LANG="ja_JP.UTF-8"
SYSFONT="latarcyrheb-sun16"
Use the table below as a guide to understand the abbreviated message names, if needed, and
the:
l Short Message Name column corresponds to the Name designation in the nGeniusONE
Messages screen
l Description column loosely corresponds to the Long name designation in nGeniusONE.
These abbreviated message names are also displayed in the nGenius Performance
Manager (UMC).
The import process does not overwrite existing applications—rules are applied to prevent you
from importing duplicate applications or overlapping ports. If an error occurs during an import,
the Task Progress dialog box reports the error in one of these log files, on a:
Examine the log file to determine the reason for the import error. Example of an error logged in
the importGlobalSettings.txt file:
The following active protocols were not Imported
A_DiameterSQLqry , Probe
null , null
Complete these steps to import custom applications from a source nGeniusONE server to a
destination same-version nGeniusONE server:
If Warning or Errors are shown in the Task Progress Report, click Details and
select the Warnings or Errors tab for more information. For name modifications,
or duplicate applications not being imported, the Details column displays the
directory where you can locate the ImportGlobalSettings.txt file, which provides
more information. When you finish viewing the details information, click Close.
7. Verify that the applications are imported—shown in Application Configuration.
8. Verfiy that the Application Group associations were successfully imported—display the
Application Configuration > Groups tab and select a group to display its members
(applications) in the Protocols pane.
You can use the procedure in this section to add Diameter and Diameter_SCTP application
messages. For those Diameter application messages whose ID is greater than 999, additional
configuration is required.
Note: In a distributed environment, create the message and execute the script on a Global
Manager.
1. Use the nGeniusONE Console and go to Global Settings > Application Configuration >
View: Messages.
2. Select either the Diameter or Diameter_SCTP application set and click to expand your
selection.
3. Click Add Application and enter (Command Code) values in the Add Application
fields, as shown in the example below. The Parameter value maps to the SessionKeyValue
referenced in the getCustomMessages.sql script.
12. Refresh all affected servers to synchronize with the InfiniStream appliance.
13. Choose one of these options:
l If the Common Code value is less than 999, the configuration is complete; go to Step
16.
l If the Common Code value is greater than 999, go to Step 15.
14. Complete these steps:
a. Perform a packet decode on Diameter traffic to learn the ApplicationId, as shown
below.
16. (Optional) To enable decode support for these messages, use the following procedure:
Note: Applicable only when both the data source and the nGeniusONE server are running
v6.2 or later.
a. From the system command line on the nGeniusONE server and the data source, verify
that this file is present (verify only; do not modify):
/opt/NetScout/rtm/pa/decodepack/config/config_diameter_dictionary.xml
1. From the nGeniusONE console, go to Global Settings > Application Configuration >
View: Market Data Feed.
2. Choose one of these options:
l To modify an existing MDF application, select the application you want to modify, click
Modify Application, and go to Step 4.
l To add a single MDF application, select a Product (a protocol stack) from the list, click
Add Application, and go to Step 4.
l To add multiple MDF applications simultaneously, use the bulk import command.
1. From the nGeniusONE console, go to Global Settings > Application Configuration >
View: Messages.
2. Expand the MDF Market/Product for which you want to view application messages.
3. Right-click on any of these messages (you cannot configure any other messages):
l Keep Alive
l Market Data
l MDF Latency
l Retransmission
l Retx Request
l Retx-req-ack
l Type A
l Type B
Note: All of these messages are shared with every MDF application. Type A and Type B
messages can be applied to create custom MDF application message types.
4. Choose any of these options from the right-click menu to configure the message:
l Modify > Short Name
l Reset Default Short Name
l Activate
l Deactivate
l Configure Responsiveness
l Configure KPI Alarm
5. Click Apply.
Use the MDF Monitor > Column Management to select and display KEI message metric
columns.
Latency is:
l Computed as the difference between the packet time stamp and the exchange time stamp
encoded in the message payload.
l Reported for a subset of MDF applications—those that have microsecond timestamps
encoded in their packet payload.
l Configured as a message (MDF > MDF Latency) which must be activated and can be
configured for an alert (using Alert profiles in Service Configuration). Response Time,
Timeouts, and Successful/Failed transactions are reported for this message in the MDF
Monitor.
If you want to use Command Line Device Tools to access custom applications, you must execute
the getProtocolList.sql script. The script updates the data file used by Command Line Device Tools
to include any custom applications you have configured. Execute the script while your database
is running.
Complete these steps to allow the Command Line Device Tools access to your custom
applications:
NETSCOUT provides deep parsing of packet headers. Examining only control data in decodes
limits processing, discovers who and where traffic is routed, whether errors ensued in delivery,
and dispenses with unnecessary user data storage. Limiting slice size also enhances security by
allowing users with the Help Desk or Network Operator role to capture and view packet header
information, but not see actual packet content.
1. From the nGeniusONE console, click Global Settings > Application Configuration.
2. Select the appropriate application. Shift-click, Ctrl-click, or click and drag to select multiple
applications.
3. Right-click the application and select Recording.
o Default — Apply default recording size (128 bytes). You can modify the default
slice size
a. Navigate to each of the following properties files on the server (refer to
NETSCOUT Server Administrator Guide):
client.properties (<nGeniusONE install>/rtm/html)
serverprivate.properties (<nGeniusONE install>/rtm/bin)
globalmanager.properties (<nGeniusONE install>/rtm/bin) — Global
Manager and Dedicated Global Server only
b. Create a backup copy of each file.
c. Using a text editor, add the following property to each file:
Application Payload—The octets are always counted from the start of the
application payload in the packet. Example: Using this option and a custom
recording size of 100 configured HTTP, the 100 bytes will start from the HTTP
header. For example, a non-tunneled HTTP packet, the stored packet will have
the full ethernet header, IP header, and 100 bytes of HTTP.
Notes:
Notes:
l Setting the Agent Utility change capture slice size command (refer to Change capture
slice size in the Agent Configuration Utility Administrator Guide) overrides the application
slice size set in Global Settings if the InfiniStream slice size is the smaller of the two
parameters. For example, for an HTTP packet, if the command line slice size is set to 100
bytes, and the Global Settings slice size is set to 50 bytes, the interface 3 HTTP packet
slice size setting will be 50 bytes.
l The set rtp_ast <ifn> <on | off> command (refer to Command-Line Object: rtp_ast in
the Agent Configuration Utility Administrator Guide) in InfiniStream enables per interface
override of the slice size configuration for Audio and Video traffic. If the slice size option
for Audio or Video is set to Full Optimized, with this command you can disable that
setting per interface on the appliance and capture full packets for that interface. Be
aware that when AST is enabled, Audio packets within RTP streams are recorded with
different slice sizes depending on their size. For example, a 222-byte packet is recorded
as a 128-byte slice while a 66-byte packet is recorded as a 58-byte slice. So to avoid a
situation where two InfiniStreams record RTP packets in different sizes with the same
Global Settings configuration of Full Optimized for the Audio application, be sure to
configure set rtp_ast <ifn>=on.
l You can limit slice slize for specific user accounts (refer to NETSCOUT Server Administrator
Guide).
l Mobile customers — For DHCP and DNS, the recording size setting must be set to Full to
correctly correlate GSM Mobile sessions in the GPRS/UMTS Intelligence view.
l Although you can you can set slice size settings for IuPS and S1AP children, the setting is
applied to the parent applications (RANAP and S1AP respectively) only.
l Be aware that setting an application's slice size to 0 will cause packet recording statistics
to be marked as rejected.
l To avoid incomplete capture errors when exporting WAV files, set the recording size for
Audio to Full.
The Global Settings > Application Configuration View: <category> > the monitoring options
icon Select monitoring options > Responsiveness option allows you to configure upper limits
(boundaries) for these response time buckets, per application:
l 1 - Fast
l 2 - Expected
l 3 - Degraded
l 4- Service Level—Values that exceed this boundary fall into bucket 5 (Availability-High
Jitter).
l 5 - Availability (High Jitter)—Values that exceed this boundary fall into bucket 6 (Time Out-
Max Jitter).
l 6 - Time Out (Max Jitter)—Response times greater than that configured for bucket 5 fall into
bucket 6; you do not need to configure a boundary for bucket 6.
Note: The boundaries you set for the Service Level and Availability buckets define the
thresholds for KPI Responsiveness metrics and KPI Responsiveness alarms.
For non-cyclical Baseline and Threshold alerts based on average response time, the Warning and
Critical severity levels are determined by the response time bucket boundaries for applications in
the service:
l Response times greater than the Fast bucket boundary generate alerts labeled Warning.
l Response times greater than the Degraded bucket boundary generate alerts labeled
Critical.
l Refer to "Configuring Alert Profiles for Application and Network Services" in the
nGeniusONE Help for more information.
For KPI error code alerts, Warning and Critical severity levels and minimum transaction
thresholds are determined by KPI error codes defined for applications in Global Settings.
Response Time bucket boundaries are applied to Service Alerts and Reports. You can view
response times for locations, clients, servers, applications (or combinations of these) using
various response time views in the service monitors.
The the monitoring options icon Select monitoring options > Responsiveness option dialog
box does not specifically configure ageout values.
Ageouts and Timeouts are reported and displayed separately in applicable Service Monitors to
better identify cases for which no response was received:
l Timeouts are reported when a response is received but is longer than the Bucket 5 interval.
l Ageout increments differently, depending on the socket age interval or, in the case of
transactional applications (occurring at the TCP Layer), when it reaches a threshold two
times as great as the Bucket 5 interval.
l Applications that have external tables (request/responses are not received on the same IP
address/port pairs) age out based on that particular application's responsiveness
implementation—refer to Customizing Ageout / Timeout Intervals in the Agent
Configuration Utility Administrator Guide for those applications which use ageout and timeout
interchangeably.
1. For the nGeniusONE server, use the Agent Configuration utility to ensure that the
Software Options > Response Time Monitor is set to on (enabled by default).
2. From the nGeniusONE console, select Global Settings > Application Configuration and
use the View drop down to choose an application category.
3. Navigate to and select one or more supported applications. (If the Responsiveness option
is inactive, one or more selected protocols are not supported.) Shift-click, Ctrl-right-click, or
click and drag to make multiple selections.
4. Click the monitoring options icon Select monitoring options > Responsiveness to
display the Responsiveness dialog box.
5. Use this table to enter response time boundary values:
Notes:
These MMS message types are supported for monitoring and alarming on Responsiveness and
Application Level KPIs (including application error codes):
l m-send (MMS Send)
l m-retrieve (MMS Retrieve)
l m-forward (MMS Forward)
Note:
Because MMS has unique packet types for the request/response, ensure you are familiar with
the way NETSCOUT computes response time for these MMS messages:
l m-send: Response time is calculated by matching the transaction-id found in the "M-
send-req" with the corresponding "M-send-conf" message PDU. The status field "X-
Mms_Response-Status" is used to classify the response as a success for failure for QoE
and KPI reporting.
l m-retrieve: Response time is calculated as the elapsed time between detection of the
HTTP Get request to detection of the HTTP Status packet. The status field "X-Mms-
Retrieve-Status", found in the "M-retrieve-conf" PDU residing in the HTTP status packet,
is used to classify the response as success or failure for QoE and KPI reporting.
l m-forward: Response time is calculated by matching the transaction-id found in the "M-
forward-req" with the corresponding "M-forward-conf" message PDU. The status field
"X-Mms-Response-Status", found in the "M-forward-conf" PDU, is used to classify the
response as a success or failure for QoE and KPI reporting.
If a failure occurs at the MMSC server (such as server unavailability), the response for the
MMS transaction does not contain the MMS response header. In that case, the transaction is
identified as a failure, with an error code set to an applicable HTTP Error (such as 4XX or 5XX
errors). Refer to "Overview of Key Performance Indicators" topic in the nGeniusONE Help for
more information on KPIs and KPI errors.
Complete these steps to configure Multimedia Messaging Service (MMS) over HTTP monitoring:
1. Enable InfiniStream appliances to also classify MMS over HTTP; refer to Change http_
mode in the Agent Configuration Utility Administrator Guide.
2. From the nGeniusONE console, click Global Settings Applications > View: Enterprise.
3. Navigate to TCP > Well Known Apps > HTTP.
4. Verify that HTTP is enabled for Response Time monitoring.
5. Add MMSC servers that will evaluated for URLs and MMS:
Note: MMS classification is only performed on flows for which the Server IP address
matches the MMSC subnet defined here. If no MMSC subnet is defined, flows are
considered for URL classification only.
a. With the HTTP application selected, click Add Application to add the server as a child
of HTTP.
b. Enter this information in the Add Application dialog box fields:
For Short Name, use a descriptive value that matches the message type, such as MMS
Send.
If you want to monitor an application with more than, or instead of, the default KPI error codes,
complete these steps to configure custom (user-defined) KPI error codes:
2. Click Add Error Codes to show the Select Error Codes dialog box. The Select Error
Codes dialog box contains a list of KPI codes supported for the selected application.
3. Click Add user defined error codes to show the Add User Defined Error codes
dialog box.
4. Use the Codes (Default) field to enter a custom KPI error code value for one or a range of
error codes.
You are not permitted to change the value of an existing error code nor a range of error
codes that overlap. If the error code format is anything other than ASCII, you must enter
characters appropriate for that format otherwise an inline help message prompts you to
rewrite the value. You can monitor a maximum of 40 Warning and 40 Critical
codes/ranges. You can monitor each code only once. For example, you cannot enable a
code and also include it in a range, and you cannot monitor one code for both Critical and
Warning severities.
5. Use the Description field to describe the custom KPI error code.
Note: For some applications the description associated with an error code can vary
depending on the application RFC version. Consequently the description shown in the
dialog box may differ from that which displays in other areas of nGeniusONE.
6. Click OK to add your custom KPI error codes to the Select Error Codes dialog box (you
might have to scroll to the bottom of the dialog box to view your new error codes).
7. Click OK.
8. Choose one of these options:
l If you chose to add KPI error codes with the KPI Alarm option in Step 1, go to Step 9.
l If you chose to add KPI error codes with the Error Classification option in Step1, go to
Step 10.
9. Use the the monitoring options icon Select monitoring options > Error Classification
option to show the Configure Error Classification dialog box.
10. Click Add Error Codes to show the Select Error Codes dialog box.
11. Scroll to and select your new KPI error code.
12. Click OK to add the error code to the Configure Error Classification dialog box.
13. (Optional) Use the Classification column to click the Failure classification and use the drop
down to choose Success or Information.
14. Repeat these steps as needed.
15. Click OK and Apply to save and apply your configuration.
Diameter diagnostic codes are operator-specific so you must add them manually to a
configuration file per monitoring appliance for reporting. Codes not added to this file are all
reported as 20799. These codes are then added — exactly as defined in the configuration file —
to the Error Classification dialog box on the nGeniusONE server, as described below.
Configuring SIP BYE and SIP CANCEL Reason and Status Error Messages
SIP BYE and SIP CANCEL Reason and Status error codes represent a class of messages that
NETSCOUT handles in a manner different from other error messages. While these messages are
fixed and pre-defined like others, they are qualified as "triplets" composed of a protocol, reason
code, and descriptive text string that make them unique and require different handling.
Configuration of these error messages is performed on the InfiniStream and the nGeniusONE
server, as follows:
l For SIP Reason and Status codes, create a .CSV file (sip_reason_codes.cfg) in the <
InfiniStream install>/rtm/config directory on the InfiniStream to map triplets to unique
NETSCOUT-provided error codes and execute the set sip_db 0 load_reason_code command.
Reason and Status codes can be added to the same configuration file. For more details
about Reason codes, refer to Configure SIP Reason Codes in the Agent Configuration Utility
Administrator Guide.. For more details about Status codes, refer to Configure SIP Status
Codes in the Agent Configuration Utility Administrator Guide.
l On the nGeniusONE server, add and/or re-classify one or more SIP error messages —
exactly as defined in the InfiniStream configuration file — to the Error Classification dialog
box on the nGeniusONE server, as described below.
Be aware that HTTPS error codes are simply SSL/TLS alerts and are now depicted as just
information messages, not failure messages.
You can also choose to forward alarms, send emails, and select a CallBack script from a list to be
notified about these alarms.
CDM KPI alarms are displayed in Service Delivery Manager (UMC) and the Performance Manager
Alarm Viewer.
1. Ensure you have configured response time buckets for your applications—refer to
Configuring Response Time Buckets for Applications.
2. Ensure that power alarms are enabled on the data source. Refer to Agent Configuration
Utility documentation for instructions.
3. Ensure that KPI application error code monitoring is enabled on the data source. You can
adjust the table size (default 1,000 entries) and enable or disable monitoring per interface
(including aggregated interfaces) in the Agent Configuration Utility command line. Refer to
Agent Configuration Utility documentation for instructions.
4. Use the nGeniusONE console and click Global Settings >Application Configuration >
View: <category> and navigate to the application for which you want to configure KPI
monitoring and alarming.
5. Choose one of these options:
l To configure KPI monitoring for Voice and Video Quality applications, go to Voice and
Video Quality Configuration in the Agent Configuration Utility Administrator Guide.
l To configure KPI monitoring for other applications, go to Step 4.
6. Click the monitoring options icon Select monitoring options > KPI Alarm.
7. Use the KPI Variables tab to configure thresholds, severities, and actions to take for the
events that trigger application KPI alarms (the KPI Variables tab allows you to enter
thresholds regardless of whether the application supports KPIs)—refer to "Configuring
Application KPI Variables" in the online help to configure the tab.
8. (Optional) Click the KPI Error Codes tab to configure application KPI error code alarms
(the tab is not active for unsupported applications)—refer to "Configuring Application KPI
Error Code Alarms" in the nGeniusONE Help to configure the tab.
9. Click OK and Apply to save and apply your configuration.
This illustration describes the relationship between what you configure in the Responsiveness
dialog box (Step 1) and the Global Settings > Application Configuration View: <category> > the
monitoring options icon Select monitoring options > KPI Alarm > Edit KPI dialog box
KPI Variables tab (Step 6 to 8):
Note: HTTP and HTTPS application configurations must be created in separate import files.
Field Description
ApplicationType 0 or 1. 0 = URL application; 1 = Server application
Note: You can combine both types in the same file. You can add up to 4 URLs.
ShortName The URL address for which you want to monitor and log response time data.
Enter up to 32 characters.
For example: NETSCOUT
LongName You can enter up to 256 characters (including forward slashes).
For example, the following entry uses 22 characters:
www.netscout.com/sales
ExactMatch Enter true to enable Exact Match; enter false to disable Exact Match. When
enabled, Exact Match monitors the exact URL address you enter; when
disabled, sub-URLs are monitored as well. If you leave this field blank, the
default is false.
AppGroup Enter a user-defined application group name or one of the following pre-
defined application groups such as: Card Processing, Market Data Feeds,
Trade Order, Microsoft Protocols, Email, Other, Database, Web Applications,
Client Server, Virtual Private Network, Multimedia, Network Management,
Network Control Protocols, Network Services, Printing, Routing Protocols,
Security/Authentication Protocols, Undefined Applications, and Service
Enablers.
If you leave this field blank, the default Application Group is Web.
ServerParameters IP address of the server.
AdditionalPort Any port number you want to add to the already supported default port
number for the application.
Note: Parameters are separated by a colon (:). IP addresses are separated by a comma (,).
Example
0:www.my_company.com:MY_COMPANY
:false:WEB:10.20.120.45,10.20.120.46:1-2
0:www.abc.com:ABC:true:Entertainment:10.20.166.89
0:www.xyz.com:XYZ: :WEB
0:www.ghi.com:Ghi: :
Note: The following apply to the sample file:
l For the third entry, Exact Match is disabled.
l For the fourth entry, Exact match is disabled and the Application Group is Web.
3. Save as a text file using a .CSV or .DAT extension.
4. Import your application configurations.
7.1.1.13 Configuring and Importing HTTP and HTTPS Applications for Monitoring
You can configure an HTTP and HTTPS application as:
l URL— You can monitor URLs the same way you monitor other applications; you can
receive real-time data, historical and performance reports for each URL defined. You can
also receive response time and availability Power Alarms.
l IP address (IPv4 or IPv6)—IPv6 addresses can be mixed with IPv4 addresses under the
same application. Only these netmasks are supported with IPv6: 7, 16, 32, 44, 48, 64, 80, 96,
and 112 - 128. Refer to IP Addresses in nGeniusONE Modules in the nGeniusONE online
help for more information on IP address support.
l Both URL and IP address—To monitor a specific URL running over a specific server.
You can identify MSRPC over HTTP by the /rpc relative link that appears after the hostname in
the URL. Example: Chicago office clients at Acme Corp. appear on the network connecting to
http://chicago.acme.com/rpc/traffic, where:
l The /rpc argument visible in the URL indicates an Outlook Anywhere connection.
l The application URL or Hostname entry should match the URL/Hostname a client connects
to for Outlook Anywhere.
A server IP address is not required when configuring HTTPS and configuring applications by URL,
IP address, or both.
Server Name Indication (SNI), an extension to the TLS protocol, indicates to which host name the
client is attempting to connect at the start of the handshaking process. SNI allows a server to
present multiple certificates on the same IP address and port number, allowing multiple secure
(HTTPS) websites (or any other service over TLS) to be served off the same IP address without
requiring all the sites to use the same certificate.
For clients and servers that support SNI, a single IP address can be used to serve a group of
domain names for which it is impractical to get a common certificate.
1. Use the nGeniusONE console and click Global Settings > Application Configuration >
View: Enterprise.
2. Navigate to IP > TCP > Well Known Apps > HTTP or HTTPS.
Select Procedure
6. Enable monitoring options. See "Configuring Monitoring Option Settings for Applications"
in the online help.
7. Click OK and Apply to save and apply your configuration.
1. Configure monitoring and, optionally, decryption for Gb links on a supported data source;
refer to Configure Gb Links in the Agent Configuration Utility Administrator Guide.
2. From the nGeniusONE Console, click Global Settings > Applications > View: Service
Provider.
3. Navigate to and expand the NSIP group.
4. Review the list of child applications and enable the Response Time and ASR check boxes
for NSIP applications in your environment. By default, when the Service Provider menu is
enabled, the NSIP parent and child applications are activated; however, Response Time
and ASRs may not be enabled for all child applications.
5. (Optional) Click the monitoring options icon Select monitoring options to customize
monitoring options such as Responsiveness and KPI Alarms.
6. (Optional) Configure port ranges; in some cases, your NSIP configuration may require a
broad range of ports be configured for NSIP monitoring:
l Recommended: Configure a application template and apply it only to the specific
appliances that are intended to monitor NSIP. This ensures that the custom port range
is only pushed to those appliances and not the others managed by the same Server.
Application templates can be created in the Device Application Settings feature in
Performance Manager (UMC).
l Not Recommended:Configure a range across all appliances monitored by this server
(not optimal as it limits ports available or required for other applications). Select the
NSIP parent application and click Modify. In the Additional Ports field, enter a port
range (for NSIP, typically the range is 30000 to 65000). You must enter at least one port
range in addition to the default port of 52400 and can configure up to a total of five
port ranges. If your port range overlaps with applications that utilize these ports, you
may have unexpected results when performing a decode. To work around that, use
the Decode As feature to force the decode on the expected application.
Complete these steps to create an import file of multiple Server- and/or Client-Server-based
application configurations:
ServerApp1:Myfirstserverapplication:100-
120,324:NONE:172.16.196.0/24
ServerApp2::::
ServerApp3::12-14,45-50::172.40.27.0/20,172.15.231.120/16:0
IP Level
ServerApp1:My first IP server application::EMAIL:10.155.166.70
ServerApp2:::GAMES:10.20.30.40/16
ServerApp3::::10.231.144.133
Separate the server IP addresses and client IP addresses using ,0.0.0.0/0, as a delimiter.
Example:
192.168.0.0/16,0.0.0.0/0,10.20.2.2,10.30.3.3
Server Address=192.168.0.0/16
Client addresses=10.20.2.2,10.30.3.3
To specify a subnet mask, enter the network class followed by the subnet mask. For
example, if you enter 192.168.0.0/16, all servers with an IP address that begins with
192.168 are monitored for the specified port range. Separate multiple address entries
using commas.
Type — Enter "1" to designate the application as Client-Server-based. (For Server-
based applications, enter "0" or leave this field blank.)
Examples
TCPSrvBApp11:TCPServerBasedApp11:10-
10000,0,200:Email:172.22.0.0/16,0.0.0.0/0,10.20.2.2:1
TCPSrvBApp12:TCPServerBasedApp12:10-
10000,0,201:Email:172.16.0.0/16,0.0.0.0/0,10.20.2.3:1
TCPSrvBApp13:TCPServerBasedApp13:10-
10000,0,202:Database:172.25.0.0/16,0.0.0.0/0,10.20.2.4:1
TCPSrvBApp14:TCPServerBasedApp14:10-
10000,0,203:Database:172.34.0.0/16,0.0.0.0/0,10.20.2.5:1
3. Save the file with a .DAT extension and close the file.
4. Use the import procedure to import your application configurations.
Important: nGeniusONE provides an alarm mechanism that notifies you when SSL
certificates in your network are due to expire.
Be aware that Certificate data are not session based, for example, if 1,000 sessions per second
are transacted on a server:
l Only the first Certificate is recorded for that server.
l All other session-relevant packets are ignored.
l In the first packet received, the InfiniStream filters for "Subject/Server Certificate"; when
identified, subsequent certificates form intermediate and root certificates, which the
InfiniStream does not process.
To configure the Days to Expiration attribute, enable the Certificate application, check My
Network addresses/subnets, and view certificate metrics in the Certificate Monitor:
1. Use the nGeniusONE Console to click Global Settings > Application Configuration >
View: Enterprise > IP > TCP > Well Know Apps > Certificate.
2. Right-click Certificate and click the Days to Expiration option from the drop-down menu.
3. Enter Warning and Critical values corresponding to those configured in Response Time
buckets 1 and 3, respectively, (or retain the default intervals shown).
4. Click OK.
5. Click Activate from the drop-down menu, and set any other configurable option.
6. Click OK and Apply to save and apply your configuration.
7. Ensure that the monitored SSL server IP address appears either in My Network (if My
Network is enabled.
When there are multiple certificate entries for a single IP host, the days to certificate expiration is
calculated on the lowest value. Server Name Indicators (SNIs), which represent to which host
name the client is trying to connect with, are evaluated and the SNI with the shortest time
remaining is the basis for the Days to Expiry calculation.
Trusted/Untrusted Certificates
To avoid a Web display problem after installing a certificate using the nscertutil.sh script, you
must include the RSA password phase in the SSL key file when the RSA password is required. An
SSL key without the RSA password phrase can disable the HTTP daemon.
Supported Attributes
Because Certificate is a special protocol that does not conform to typical application
configuration, consider the following attributes.
l Activate/Deactivate. Certificate is enabled by default
l
Modify
l Long name (SSL Certificate by default), Application Tag, and Associate Group
(Security/Authentication Applications by default)
l Messages can be Activated or Deactivated, the Short name modified, and the Reset
Default Short Name effected. All other Message options are disabled.
l Days to Expiration replaces the Responsiveness option in the drop-down menu. This
option uses Response Time buckets 1 and 3 only for uploading to the InfiniStream
appliance. The default Critical setting of 30 days and Warning setting of 60 days indicate
any interval between 60 and 31 days of expiration displays amber status in the console
view and any interval of less than 30 days to expiration reflects red status. Any interval
greater than 61 days displays green status.
nGeniusONE provides a tool, nscertutil, to manage certificates on the nGeniusONE server. Refer
to NETSCOUT Server Administrator Guide for more information.
Note: For non-default application groups, you must use theGlobal Settings >Application
Configuration > Groups page to create the group before you can associate an application
with the group.
Note: Do not include informational parent applications such as Well Known Apps under
TCP and UDP in a group selection. Informational parent applications cannot be added to a
group.
3. Use the the monitoring options icon Select monitoring options drop-down and select
Associate Group.
4. Select the group you want to associate with the selected application(s) and click OK and
Apply to save and apply your configuration.
You can now use the Group column Show the filter to specify which group of
applications you want to view in the page.
l ASRs are reported only when all SIP message bytes are received. The Start time on ASR is
the time of the first fragment
l Diameter and SIP traffic; refer to Command-Line Object: frag_reassembly in the Agent
Configuration Utility Administrator Guide for more information.
You can create a specialized, sibling application to SIP in Global Settings. You can specify a
country code in the Parameter field of the Add Application dialog box to reference emergency
calls and aggregate them accordingly.
1. From the nGeniusONE Console, click Global Settings > Application Configuration >
View: Multimedia.
Total traffic volume, total number of packets, and utilization percentage statistics are displayed
per interface in the Traffic Monitor as well as Traffic Distribution by Location and Application and
Link Usage Over Time graphical views.
Knowing the type of traffic your employees are generating can be useful proactively for capacity
planning or reactively for determining adherence to corporate IT policy. For instance, this
functionality can tell you if that new third-party health Website is gaining traction and requires
more bandwidth on your network or your employees are inappropriately visiting gambling
websites.
Collecting anything more than flow data from servers external to your network is beyond your
control so responsiveness metrics are not collected. Also, each group constitutes multiple
sessions – their corresponding data cannot be tracked per session and are not meaningful in
aggregate.
Refer to Command-Line Object: http in the Agent Configuration Utility Administrator Guide for
more information.
Ensure you are familiar with these guidelines before you configure Client Communities:
l Before you configure a Client Community, you must first add the subnet or IP address to
your My Network configuration; refer to My Network Overview.
l Exactly matching Server and Client community entries are not allowed so that a second,
matching IP address is not permitted.
l Define streams as specific communities otherwise data may be lumped into the Host
Group Other category and displays between the dashboard and monitors can be
mismatched.
1. User-defined entries.
2. Default Client Community Subnet entries.
Default Client Community Subnets are correlated with ASI tables and upon discovery are
removed from the Host Group Other category. The aggregated IP addresses encompassed
by the default group display as regular IP addresses with a subnet mask in the Client
Community column of various monitors.
3. Host Group Other entries.
The rules nGeniusONE follows for displaying Client Community IP addresses are:
1. A Client IP address is displayed without any masking or not included in Host Group Other
only if it was discovered as a server in some other flow or it was configured as a VIP List
entry in Global Settings. This is not dependent on the Default Client Community Subnet
enabled/disabled setting.
2. If the Client IP address is part of the Client Community configuration then the Community
ID name is displayed.
3. If the Default Client Community Subnet is disabled, the IP address is marked as Host
Group Other if conditions #1 and #2 are not satisfied.
4. If the Default Client Community Subnet is enabled, the netmask for the Client IP address is
displayed if conditions #1 and #2 are not satisfied.
Community Examples
A given IP address can logically belong to more than one subnet. When this occurs, the IP
address is matched to the most specific subnet definition.
The address 10.20.30.15 could be considered a match for all three subnets because it matches
the first eight bits of subnet 1, the first 16 bits of subnet 2 and the first 24 bits of subnet 3.
However, because subnet 3 has the most specific definition, 10.20.30.15 is considered a match
with subnet 3. Using the same logic, the address 10.20.40.40 falls into subnet 2 and 10.50.50.50
falls into subnet 1.
192.168.11.0/26
192.168.12.0/26
192.168.13.0/26
192.168.14.52/26
If these subnets do not include your interior networks, you can add them. Their address
ranges cover standardized subnets for private networks as defined in RFC 1918 for IPv4
networks, and RFC 4193 for IPv6 networks. These addresses are characterized as private
because they are not globally delegated, meaning they are not allocated to any specific
organization, and IP packets addressed by them cannot be transmitted onto the public
Internet.
l Allows you to configure up to 50 IP addresses per entry.
l Allows you to configure up to a total of 10,000 entries, combined with Client Community
and VIP List entries.
l Provides this default upgrade behavior:
o If My Network entries already exist upon an upgrade, My Network remains enabled.
o If no My Network entries exist upon an upgrade, the feature is disabled.
Administrator Guide.
l If you want to use the InfiniStream primarily to support NETSCOUT products such as
nGenius Subscriber Intelligence, but you want to use nGeniusONE management features,
My Network functionality operates only when the InfiniStream is enabled for ASI data. If
the ASI mode is turned off, CDM data and xDRs are collected, but any My Network entries
are not enabled.
My Network Examples
In addition to the interior networks he is responsible for, Acme Widgets Network Administrator
Henry Price wants to keep tabs on third-tier networks that are outside his explicit control but
vital to the enterprise. To do this, he creates My Network entries for servers supporting
RightNow and Okta to set up monitoring of problem ticketing and cloud services that are vital to
the enterprise.
Then, to more finely focus monitoring of these third-tier networks, Henry adds a Cloud client
community encompassing all users on the company headquarters network. Because the HQ
address range lies within the My Network default 192.168.0.0/16 private network range, he does
not need to create a new My Network entry.
In a second example, Henry wants to monitor traffic load flowing through his Marketing
department servers at the Ann Arbor office so he adds a Server Community on the
10.30.201.67/8 subnet. Because the IP address ranges those application servers reside on are
situated outside of the three IPv4 default private networks nGeniusONE provides, Henry adds a
new My Network entry with an address range of his choice.
Henry needs to pay more scrutiny to the company’s phones, which have been bearing a heavier
than usual load and providing spotty service lately. So, Henry adds a VIP List community for
192.168.47.39, the IP address of the switch on which phone service is supported. Again, no entry
in My Network is required because the phone switch’s interior address lies within the default
private network range.
Frequent interruption of email service has prompted a deeper examination of the firm’s Email
servers and who might be overloading the system with large email attachments. In response to
this situation, Henry adds a server community on the appropriate subnet and a wide-ranging
client community which includes multiple subnets throughout the company. Because the
subnets are all internal, no My Network entries need be added.
After configuring your My Network entries, you can use the Discover My Network module to:
l Access a comprehensive view of network activity based on individual MELs and
applications.
l Troubleshoot loads and failures using provided metrics for transactions, throughput,
application latency, TCP window size, and volume/packet/ageout counts, which are
provided along with charts for visual interpretation.
l Change the view to display media traffic with a high-level view for ad hoc network
impairments analysis.
Note: Discover My Network displays results only on servers that are defined in My Network
and that when comparing the same application traffic in Discover My Network to Traffic
Monitor, values are much greater in the Traffic Monitor. So, use the Traffic Monitor to view
application data for all devices and Discover My Network for network-defined elements.
Ensure you are familiar with these guidelines before you configure Server Communities:
l Before you configure a Server Community, you must first add the subnet or IP address to
your My Network configuration.
l When working with SCTP multi-homing environments, there can be difficulty searching for
metrics of a specific eNodeB (most commonly with S1MME and eNodeB elements). To
address this difficulty, you can use one of these methods:
o Configure server communities for each eNodeB containing both IP addresses. This
method aggregates transactions from both IPs on the eNodeB into a single row in the
service monitor making it much easier to find and troubleshoot issues. Because the total
number of eNodeBs in a network can be more than 10,000, the maximum number of
tracked servers nGeniusONE supports is 20,000, which is sufficient to handle this load.
o Access the <nGeniusONE install>/rtm/bin/serverprivate.properties file and modify the
globalsettings.hostgroups.maxServerCommunities property to lower the limit of
supported eNodeBs.
Notes: You should stop the nGeniusONE Server before you modify the property file.
To resolve IP addresses in cases where there are multiple IP addresses associated with
the same SCTP client/server combination, refer to Command-Line Object: sctp_mhome.
Refer to the Agent Configuration Utility Administrator Guide.
l Exactly matching Server and Client community entries are not allowed so that a second,
matching IP address is not permitted.
l nGeniusONE does not classify DHCP helper/relay agents as part of a Server Community.
These packets are classified in the Host Group Other category.
l Define streams as specific communities otherwise data may be lumped into the Host
Group Other category and displays between the dashboard and monitors can be
mismatched.
l Use the set community_type command with the GeoIP feature to internally defined
mapping—to translate IP addresses into geographical locations (state or country), which
does not require configuration on the nGeniusONE server. Refer to the Agent
Configuration Utility Administrator Guide.
Community Examples
A given IP address can logically belong to more than one subnet. When this occurs, the IP
address is matched to the most specific subnet definition.
The address 10.20.30.15 could be considered a match for all three subnets because it matches
the first eight bits of subnet 1, the first 16 bits of subnet 2 and the first 24 bits of subnet 3.
However, because subnet 3 has the most specific definition, 10.20.30.15 is considered a match
with subnet 3. Using the same logic, the address 10.20.40.40 falls into subnet 2 and 10.50.50.50
falls into subnet 1.
192.168.11.0/26
192.168.12.0/26
192.168.13.0/26
192.168.14.52/26
For VIP Lists composed of IP addresses, you can configure only single VIP List community IP
addresses, not subnets. After adding an entry, the configured IP address will display with a /32
subnet (255.255.255.255) appended for an IPv4 address and a /128 subnet for an IPv6 address
but these subnets signify a unique value matching only one IP address.
To render IP addresses or IDs more recognizable, you can customize them to display as Host,
GeoIP, or IMSI/IMEI values in the Community fields of nGeniusONE monitors and enablers. To do
so you may have to copy files to the nGeniusONE server or InfiniStream appliance. Be aware that
you may configure a GeoIP or User Community but not both. Refer to Customizing Community
Types in the Agent Configuration Utility Administrator Guide for more information.
l MSISDN entries are LTE-specific and usually number 12 digits. They typically consist of a 3-
digit Country Code, a 3-digit National Destination Code or Number Planning Area number,
and the Subscriber Number.
l IMSI entries are CDMA2K-specific and usually number 15 digits. They typically consist of a
3-digit Mobile Country Code, a 2- or 3-digit Mobile Network Code, and the Mobile
Subscription Identification Number.
l MSISDN entries can be monitored over:
o Mobile core links including: Gn, S2b, S5, and S11.
o Mobile access links including: Gb, IuPS, R-P, P-H, S1_MME, and S2a.
You can disable packet recording and XDR generation on InfiniStream appliances by configuring
a VIP List of MSISDN or IMSI phone numbers and associating those lists with mobile group IDs.
This feature is beneficial for mobile companies who choose not to store ASR data and record
packets for all mobile customers. Creating a VIP List to filter for only specified entries preserves
the confidentiality and security of other customer phone numbers. This support is also valuable
for focused tracking of field tests, VIP accounts (executive and B2B lists), and problematic
IMSI/MSISDN numbers.
Note: Client, Server, and VIP List communities are applied after checking for My Network
entries. Community IDs associated with IMSI/MSISDN phone numbers for both Client and
Server Communities are saved in the KSI (Key Session Indicators) table.
You can configure IMSI or MSISDN IDs to map to telephone numbers and more easily
recognizable names—such as WestfordMarketing—either by configuring a VIP List community or
by using the set community_type command. Community IDs associated with IMSI/MSISDN
phone numbers for both Client and Server Communities are saved in the KSI (Key Session
Indicators) table.
7.1.2.5 Turning Off Packet Recording and XDR Generation by VIP List
Disabling packet recording and XDR generation on InfiniStream appliances is provided through
configuration of a VIP List community for only those MSISDN or IMSI phone numbers you want
to monitor by their associated VIP List mobile group IDs. When enabled (the command is
disabled by default), this functionality filters out packet recording and ASR-generation for data
only, not control data.
This feature is useful for mobile companies who choose not to store ASR data and record
packets for all mobile customers. Creating a VIP List to filter for only specified entries preserves
the confidentiality and security of other customer phone numbers. An added benefit is the
lessened monitoring impact due to fewer ASR and packet recording loads collected.
Note: When you set the mobile_id community type on the InfiniStream appliance, the Global
Settings definition is not used (files on the InfiniStream appliance are used instead along with
a companion file (refer to Customizing Community Types in the Agent Configuration Utility
Administrator Guide) copied to the nGeniusONE server). But, VIP Lists are used when the Type
is set appropriately.
2. Select an InfiniStream from the device list and click Remote Login.
3. Use the Agent Configuration Utility to configure the mobile_id agent community type
setting (refer to Command-Line Object: community_type in the Agent Configuration Utility
Administrator Guide).
4. Use the nGeniusONE Console and go to Global Settings > Communities > VIP List.
5. Use the Type drop down list to select MSISDN or IMSI.
8. Go to Servers and Users > Business Types and check the Service Provider option
to ensure VIP List entries for mobile ids are configured correctly; otherwise the VIP List
type defaults to IP Address (rather than MSISDN or IMSI).
When a GPRS mobile phone sets up a PDP context, the access point is selected and an APN is
determined. APN examples
mycompany.abcd.gprs
internet
mymobile
zap.cingular.com
The access point is then used in a DNS query to a private DNS network. This process, called APN
resolution, provides the IP address of the Gateway GPRS Support Node (GGSN) which serves the
access point. A PDP context can then be activated.
You must configure your nGeniusONE device to monitor APNs. nGeniusONE devices allow you to
associate APNs with a specific interface. You must configure APN monitoring on supported
devices and associate APN definitions with Gn, S11, S5/S8-GTPv2, S2a, Ph, or Pi physical links in
Device Configuration > Devices > Device Details. You can view APN statistics in service
monitors and drill down from there to nGenius Subscriber Intelligence.
When a physical interface or flow interface detects traffic matching an APN virtual interface
definition, it automatically creates a virtual interface to track the application, host, and
conversation statistics. Be aware that the number of APNs detected, and therefore the number
of APN interfaces you see in MEL displays, may not equal the number of APN definitions.
APN virtual interfaces support drilldowns into individual Diameter Routing Agents (DRAs) and
endpoints for QoE data such as Link, Application, Host and Conversation information based on
dbONE flows.
Note: APN Monitoring does not support duplicate names. Drill downs to packet data is not
supported.
Additionally, you can configure location key orientation (refer to Service Members). The Service
Configuration monitor supports optional configuration of location key orientation—with
source/destination direction—for Diameter DRAs. To select orientation settings for DIA=name
host location keys (refer to Configuring APN Virtual Interfaces in the Agent Configuration Utility
Administrator Guide), a drop down menu contains these options:
l Both—Groups Diameter messages with either a matching Diameter Origin-Host or
Destination-Host key name.
l Client—Groups Diameter messages with a matching Diameter Origin-Host key name.
l Server—Groups Diameter messages with a matching Diameter Destination-Host key name.
1. Configure APN monitoring on the device; refer to Configuring APN Monitoring in the Agent
Configuration Utility Administrator Guide.
2. Add up to 32000 APN group definitions per server:
l Add APN virtual interface definitions individually; refer toConfiguring APN Virtual
Interfaces and Configuring APN and DRA Virtual Interfaces to Monitor GTP in the Agent
Configuration Utility Administrator Guide
l Create a file to import APN virtual interface definitions.
l Import multiple APN virtual interface definitions.
3. (Optional) Modify APN virtual interface definitions.
4. Associate the APN virtual interface definition with the device physical interface; refer to
Associating APN Definitions with a Physical Interface in the Agent Configuration Utility
Administrator Guide.
5. (Optional) Enable automatic discovery of APNs/DRAs (for those not defined in Global
Settings); refer to Command-Line Object: apn_disc_opts.
6. (Optional) Configure APN virtual interface definitions to track QoE and KPI Diameter
entries; refer to Configuring APN Virtual Interfaces in the Agent Configuration Utility
Administrator Guide.
Refer to:
l Configuring APN Monitoring in the .for information about configuring APN monitoring on
the InfiniStream, including configuring mobile parametersAgent Configuration Utility
Administrator Guide and enabling automatic DRA discovery.
l Configuring APN Virtual Interfaces in the Agent Configuration Utility Administrator Guide.for
information about configuring APN virtual interfaces in nGeniusONE.
information in this topic to configure your system to create site virtual interfaces immediately
after association with an nGeniusONE device, even if no matching traffic exists, which allows you
to:
l Include the sites in monitored element groups.
l Include the sites in reports.
l Launch views based on the sites in nGeniusONE monitors (if no traffic is present, the views
are empty).
Note: The created sites are counted as active against your license.
To configure your system to create site virtual interfaces immediately after association with an
nGeniusONE device add this property to the <nGeniusONE
install>/rtm/bin/serverprivate.properties file (refer to Modifying the serverprivate.properties
File):
createsiteafterassoc=true
Some applications are critically sensitive to network congestion but many are not, for example:
l Voice and video applications are sensitive to network delay. If voice packets take too long
to reach their destination, the resulting speech sounds choppy or distorted. QoS can be
used to provide assured services to these applications.
l File Transfer Protocol (FTP) has a tolerance for network delay or bandwidth limitation. To
the user, FTP simply takes longer to download a file to the target system. Although
annoying to the user, this slowness does not normally impede the operation of the
application.
Differentiated Service and the Differentiated Service Code Point are used to prioritize traffic
flows in QoS enabled networks. nGeniusONE uses probes to monitor flows based on the DSCP
value of the flow. These flows display in real-time views.
nGeniusONE manages QoS group configuration and downloads the configuration information to
the device(s).
l Each QoS group is associated with a speed, which can be applied to the probe for
utilization calculations. You can override QoS group speeds for specific probe interfaces at
Device Configuration > Devices > Modify Device > Locations.
l For QoS levels to work properly, you must know the type of traffic you are running (DSCP,
IPP, or MPLS). For example, if you set the QoS mode to DSCP using the command line (refer
to Enabling the Device to Monitor QoS in the Agent Configuration Utility Administrator Guide),
and your traffic is all IPP, your QoS levels are not correct.
l If the virtual interface mode (change vifn_mode) is set to VRF-SITE, when you enable the
QoS Groups option you must disable discovery.
l When you add QoS groups, the same settings are applied to all probes in the enterprise.
However, you can apply QoS speed overrides to individual probes and interfaces.
You can enable collection of QoS Class Identifiers on appropriate interfaces—to do so, you must
monitor data plane traffic on these interfaces with the values displaying as Location Keys in
Service Monitors.
You can monitor QoS at the interface level, a sub-level for VLAN, SITE, or at VRF-SITE virtual
interfaces.
The network tries to deliver a specific level of service based on the QoS specified by the
Differentiated Service Code Points (DSCP) in each packet. Network devices use DSCP to classify,
shape, and police traffic, and to perform intelligent queuing.
DSCP is:
Note: QoS values reported for UC-related views in all modules (Monitors, Dashboard,
Reports, Grid, and UC views) are always DSCP-based.
NETSCOUTsupports:
l 24-bit ANSI point codes.
l 14-bit ITU point codes.
l 16-bit JAPAN point codes.
nGeniusONE 's implementation adds a virtual (cache) channel for point codes and populates the
channel when the system starts. When you configure new point codes, nGeniusONE:
For example, a PLMN ID "311 270" represents USA and Verizon Wireless.
Monitoring of inbound and outbound roaming is supported by the choice of Home, Visited, or
dual PLMN modes. Monitoring roaming allows you to:
l Track a subscriber's home PLMN from a visited PLMN.
l Authenticate a subscriber from the visited PLMN.
l Measure shared revenue generated by roaming charges between the visited and home
PLMN.
Home PLMNs are composed of the combined MCC and MNC of the home network as extracted
from the International Mobile Subscriber Identity (IMSI) number.
Visited PLMNs are composed of the combined MCC and MNC of the visited network as extracted
from a message, such as LA-RA.
nGeniusONE handles PLMNs similar to how Site or Site-APN location keys are managed because
PLMN definitions are downloaded to the InfiniStream appliance as Sites. Optionally, PLMNs can
be identified by their IP address/subnet, and MCC/MNC values with the advantage of collecting
traffic under a single-instance location key. IPv4 and IPv6 addresses are supported.
This table describes PLMN modes that support home and visited PLMNs:
Use the Agent Configuration Utility to configure PLMN modes; refer to Change vifn_mode in the
Agent Configuration Utility Administrator Guide.
This allows you to order and monitor traffic in practical ways, by:
l Type of VLAN service.
l Department.
l Subnet.
l Physical location.
VLAN
Service Type Level 1 Level 2 Level 3 Level 4
Broadband DSL 1021 10-20 100 288
Broadband FTTH 100-200 30-40 1 188
Marketing 350 350 350 350
IPTV 444 444 444 444-555
65th Floor - Boston 27 57-89 68 32
192.168.55.91/64 36 5 49 45
Because the VLAN ranges required by different users on the network might overlap, assigning a
unique range of VLAN IDs to each user would restrict user configurations and could easily
exceed the VLAN limit of 4094. However, with stacked VLANs, a unique VLAN ID expands the
VLAN space for users who have multiple VLANs. From the perspective of a service provider, the
primary benefit of stacked VLANs is a reduced number of VLANs supported for the same number
of customers.
nGeniusONE supports:
l VLAN Services data for VLAN-configured virtual interfaces, which are displayed in all QoE
views of associated monitors.
l Drill downs to Packet Decode are available because VLAN tags are applied at the packet
level.
The numbers in the example table above represent VLAN tags. VLANs are grouped as VLAN tags,
organized under four VLAN Levels, which are applied during configuration in Device
Management. After configuration, the VLAN tags are displayed in the Definition column of the
VLAN Services screen as a set of VLANs separated by colons, as shown in this example, cited
from the example table above:
350:350:350:350
The VLAN Services dialog also includes VLAN tag names and their unique auto-generated Group
ID. How you group VLANs can indicate their function. For example, this VLAN tag indicates VLAN
Level 1, 2, and 3 service at the 65th Floor - Boston facility, cited from the example table above:
27:57-89:68
For example, a PLMN ID "311 270" represents USA and Verizon Wireless.
Monitoring of inbound and outbound roaming is supported by the choice of Home, Visited, or
dual PLMN modes. Monitoring roaming allows you to:
l Track a subscriber's home PLMN from a visited PLMN.
l Authenticate a subscriber from the visited PLMN.
l Measure shared revenue generated by roaming charges between the visited and home
PLMN.
Home PLMNs are composed of the combined MCC and MNC of the home network as extracted
from the International Mobile Subscriber Identity (IMSI) number.
Visited PLMNs are composed of the combined MCC and MNC of the visited network as extracted
from a message, such as LA-RA.
nGeniusONE handles PLMNs similar to how Site or Site-APN location keys are managed because
PLMN definitions are downloaded to the InfiniStream appliance as Sites. Optionally, PLMNs can
be identified by their IP address/subnet, and MCC/MNC values with the advantage of collecting
traffic under a single-instance location key. IPv4 and IPv6 addresses are supported.
l S2b
l S5/S8
This table describes PLMN modes that support home and visited PLMNs:
Use the Agent Configuration Utility to configure PLMN modes; refer to Change vifn_mode in the
Agent Configuration Utility Administrator Guide.
Note: Cell Sites are applicable when the InfiniStream appliance is configured to monitor LA-
RA, TAC, or BSID virtual interfaces (refer to Change vifn_mode in the Agent Configuration
Utility Administrator Guide for more information).
You can configure Controlled Cell-ID Discovery to create a static list file—static_cellidlist.txt. The
static_cellidlist.txt file cell IDs can be matched with those IDs derived during the last hour of KTI
data stored in dbONE.
Only matched cell IDs are "discovered" and displayed in Device Configuration > <device_name>
> Modify > Locations, if these conditions are met:
l Traffic is running.
l dbONE has logged sufficient data from the InfiniStream appliance.
The maximum number of cell IDs discovered by the nGeniusONE Server is 1000.
In a distributed server configuration, you must provide separate static_cellidlist.txt files on every
local nGeniusONE Server because each server links to different InfiniStreams, which in turn
monitor different cell IDs.
1. Use the nGeniusONE console and go to Global Settings > Locations > APN.
2. Click Add an APN group; you can add up to 32000 APN groups per server.
3. Enter a unique Name for the APN group. When an interface detects traffic matching the
APN definition, the name you enter displays in the list of Monitored Elements in the
service monitors. APN names can include a maximum of 32 alphanumeric characters
and/or spaces. Examples (including CMTS)
London
Boston
Internet
For CMTS virtuals, you must enter APN names in this format:
<vendor>;<Model #>
where:
l <vendor> is the first six characters of the MTA manufacturer's name.
l <Model #> is the complete MTA model number.
Important: All characters are case sensitive. The name must appear exactly as shown in
the DHCP DISCOVER packet.
For example:
Motoro;SBV1234
4. Enter the DTE and DCE Speed (Kbps).
If you are adding a DRA entry, use DIA=<name> as the address. You must enter the
DRA as it appears in the DRA for each Origin-Host, Destination-Host or corresponding
Realms you want to track. To ensure you identify any DRAs that you may have missed,
create an entry to track DRAs that you have not defined, using an using an APN name with
the address set to DIA=UNKNOWN_APN.
wap.o2.co.uk
internet.t-mobile.cz
internet
orangeinternet
For CMTS virtuals, you must enter APN addresses in this format:
<vendor>:<Model #>
where:
l <vendor> is the first six characters of the MTA manufacturer name.
l <Model #> is the complete MTA model number.
For example:
Motoro:SBV1234
7. Click OK.
The nGeniusONE Server automatically generates an APN ID for internal use when
downloading the APN definition to a probe. The new values are displayed.
8. (Optional) Repeat Step 2 to Step 7 for any additional APNs you want to configure.
9. Click Apply when you finish configuring APN definitions to save your changes.
10. After adding one or more APN definitions, associate them with an appropriately-
configured physical interface in Device Configuration. Linking APNs with a specific
interface allows you to configure each interface on a probe to monitor a different virtual
interface type.
11. To configure APN monitoring on the InfiniStream, click Remote Login and continue
your configuration using the Agent Configuration Utility; refer to Configure
APN Monitoring in the Agent Configuration Utility Administrator Guide.
12. To configure DRA monitoring on the InfiniStream (Diameter traffic in a Service Provider
environment), click Remote Login and continue your configuration using the Agent
Configuration Utility; refer to Configuring DRA Monitoring in the Agent Configuration Utility
Administrator Guide.
Note: NETSCOUT recommends enabling automatic discovery of APNs/DRAs for those not
configured with the procedure described above. The set apn_disc_opts <ifn> command
captures these APNs/DRAs and enables manual exporting of the collected records to Global
Settings; refer to Command-Line Object: apn_disc_opts for more information. Refer to the
Agent Configuration Utility Administrator Guide.
Complete these steps to configure APN interfaces to support tracking of QoE and KPI Diameter
entries using Client/Server Origin hosts:
b. Click Add an APN group for each DRA to track and enter the APN Name, DTE
Speed and DCE Speed field values.
c. Click Add an APN Address using DIA=<Origin-Host AVP> as the value. The
Origin-Host AVP (Attribute-Value Pairs) entry must be entered as it appears in the DRA.
d. Click OK.
e. Enter an APN name with the address set to DIA=UNKNOWN_APN to ensure you
identify any DRAs that you may have missed (not defined).
f. Click OK and Apply to save and apply your configuration.
3. Click Device Configuration> Devices.
4. Select the InfiniStream appliance on which you configured the APN and click Relearn.
These MMS message types are supported for monitoring and alarming on Responsiveness and
Application Level KPIs (including application error codes):
l m-send (MMS Send)
l m-retrieve (MMS Retrieve)
l m-forward (MMS Forward)
Note:
Because MMS has unique packet types for the request/response, ensure you are familiar with
the way NETSCOUT computes response time for these MMS messages:
l m-send: Response time is calculated by matching the transaction-id found in the "M-
send-req" with the corresponding "M-send-conf" message PDU. The status field "X-
Mms_Response-Status" is used to classify the response as a success for failure for QoE
and KPI reporting.
l m-retrieve: Response time is calculated as the elapsed time between detection of the
HTTP Get request to detection of the HTTP Status packet. The status field "X-Mms-
Retrieve-Status", found in the "M-retrieve-conf" PDU residing in the HTTP status packet,
is used to classify the response as success or failure for QoE and KPI reporting.
l m-forward: Response time is calculated by matching the transaction-id found in the "M-
forward-req" with the corresponding "M-forward-conf" message PDU. The status field
"X-Mms-Response-Status", found in the "M-forward-conf" PDU, is used to classify the
response as a success or failure for QoE and KPI reporting.
If a failure occurs at the MMSC server (such as server unavailability), the response for the
MMS transaction does not contain the MMS response header. In that case, the transaction is
identified as a failure, with an error code set to an applicable HTTP Error (such as 4XX or 5XX
errors). Refer to "Overview of Key Performance Indicators" topic in the nGeniusONE Help for
more information on KPIs and KPI errors.
Complete these steps to configure Multimedia Messaging Service (MMS) over HTTP monitoring:
1. Enable InfiniStream appliances to also classify MMS over HTTP; refer to Change http_
mode in the Agent Configuration Utility Administrator Guide.
2. From the nGeniusONE console, click Global Settings Applications > View: Enterprise.
3. Navigate to TCP > Well Known Apps > HTTP.
4. Verify that HTTP is enabled for Response Time monitoring.
5. Add MMSC servers that will evaluated for URLs and MMS:
Note: MMS classification is only performed on flows for which the Server IP address
matches the MMSC subnet defined here. If no MMSC subnet is defined, flows are
considered for URL classification only.
a. With the HTTP application selected, click Add Application to add the server as a child
of HTTP.
b. Enter this information in the Add Application dialog box fields:
For Short Name, use a descriptive value that matches the message type, such as MMS
Send.
You can set LTE handset start/end IMEI ranges if you add this property to the <nGeniusONE
install>/rtm/bin/serverprivate.properties file:
globalsettings.handset.lterangesupport=true
To allow nGeniusONELTE ranges to download to the InfiniStream, nGeniusONE must have the
capability bit 84 set to ON.
l For any LTE handset definition configured without a defined range, nGeniusONE reserves
the largest range. So if you define one without the range, you cannot define another one
with the same handset ID and a different range. Or, if you define one with a range, you
cannot define another one with same handset ID and without a range.
l If you want to use the CLA to set IMEI ranges, add the
globalsettings.handset.lterangesupport=true property to both the
serverprivate.properties and nGeniusCLA.properties files.
Note: You can execute this CLA command to create an output file:
You can use these configuration tasks to begin monitoring handset groups:
When a probe physical interface or flow interface detects traffic matching a site definition, the
monitoring device automatically creates a virtual interface on that interface to track these
statistics (based on the subnet or subnet list):
l Application
l Protocol
l Host
l Conversation
l Quality of Service (QoS)
1. Configuring Site Monitoring on the Data Source; refer to the Agent Configuration Utility
Administrator Guide.
2. Use one of these options to add site virtual interface definitions:
l Add site virtual interface definitions individually.
l Import multiple definitions.
3. (Optional) Modify the speed of a Site virtual interface, either globally or for individual
interfaces.
4. Associate the site virtual interface definitions with a device physical interface.
These child applications are typically used to isolate specific voice/video services from the traffic
stream, in these implementations:
l Fax machine
l Answering server
l External calls (for example, via a gateway)
l Conference rooms
l Video Streaming service
Configuration is performed in Global Settings for IPv4 or IPv6 Address-based monitoring. Each
child application will contain its own Response Time, Session (ASR), and packet slicing settings.
The selection of thresholds is as follows:
l Audio/Video or child of RTP —Audio or Video based on the codec.
l All other applications — Video thresholds are always used (for example, MPEG2-TS and
MSB).
Child applications can also be usable as Service Definitions; for example, to create different
dashboard tiles or reports for different child applications.
Refer to "Adding Extension Applications - Well Known Apps for" in the nGeniusONE Help for
configuration details.
To clarify how RTP, Audio, and Video applications relate to each other, the following changes are
effected:
l Response Time and Session (ASR) check boxes for Audio and Video are hidden since they
have no effect.
l Users can no longer configure Additional Ports for media applications (RTP, RTCP, Audio,
Video, Skype, MSB, MPEG2-TS) and their children.
l If Response Time is disabled for RTP but enabled for child applications, InfiniStreams will
process media packets for RTP child applications, but will report only ASI, not CDM, data.
l To avoid the case where a monitor displaying a media stream returns the "Not Defined"
error message, refer to NETSCOUT Server Administrator Guide.
The Global Settings > Application Configuration View: <category> > the monitoring options
icon Select monitoring options > Responsiveness option allows you to configure upper limits
(boundaries) for these response time buckets, per application:
l 1 - Fast
l 2 - Expected
l 3 - Degraded
l 4- Service Level—Values that exceed this boundary fall into bucket 5 (Availability-High
Jitter).
l 5 - Availability (High Jitter)—Values that exceed this boundary fall into bucket 6 (Time Out-
Max Jitter).
l 6 - Time Out (Max Jitter)—Response times greater than that configured for bucket 5 fall into
bucket 6; you do not need to configure a boundary for bucket 6.
Note: The boundaries you set for the Service Level and Availability buckets define the
thresholds for KPI Responsiveness metrics and KPI Responsiveness alarms.
For non-cyclical Baseline and Threshold alerts based on average response time, the Warning and
Critical severity levels are determined by the response time bucket boundaries for applications in
the service:
l Response times greater than the Fast bucket boundary generate alerts labeled Warning.
l Response times greater than the Degraded bucket boundary generate alerts labeled
Critical.
l Refer to "Configuring Alert Profiles for Application and Network Services" in the
nGeniusONE Help for more information.
For KPI error code alerts, Warning and Critical severity levels and minimum transaction
thresholds are determined by KPI error codes defined for applications in Global Settings.
Response Time bucket boundaries are applied to Service Alerts and Reports. You can view
response times for locations, clients, servers, applications (or combinations of these) using
various response time views in the service monitors.
The the monitoring options icon Select monitoring options > Responsiveness option dialog
box does not specifically configure ageout values.
Ageouts and Timeouts are reported and displayed separately in applicable Service Monitors to
better identify cases for which no response was received:
l Timeouts are reported when a response is received but is longer than the Bucket 5 interval.
l Ageout increments differently, depending on the socket age interval or, in the case of
transactional applications (occurring at the TCP Layer), when it reaches a threshold two
times as great as the Bucket 5 interval.
l Applications that have external tables (request/responses are not received on the same IP
address/port pairs) age out based on that particular application's responsiveness
implementation—refer to Customizing Ageout / Timeout Intervals in the Agent
Configuration Utility Administrator Guide for those applications which use ageout and timeout
interchangeably.
1. For the nGeniusONE server, use the Agent Configuration utility to ensure that the
Software Options > Response Time Monitor is set to on (enabled by default).
2. From the nGeniusONE console, select Global Settings > Application Configuration and
use the View drop down to choose an application category.
3. Navigate to and select one or more supported applications. (If the Responsiveness option
is inactive, one or more selected protocols are not supported.) Shift-click, Ctrl-right-click, or
click and drag to make multiple selections.
4. Click the monitoring options icon Select monitoring options > Responsiveness to
display the Responsiveness dialog box.
5. Use this table to enter response time boundary values:
Notes:
l Although boundaries are entered in milliseconds, they are converted to
microseconds in monitor views displaying ASI data.
l For appliances configured to support ASI analysis, the buckets mentioned above
are mapped accordingly:
Note:
l Names can include a maximum of 50 alphanumeric characters and/or spaces.
l Entries are validated and all special characters are supported., among others.
l If the import file contains a group name that currently exists in your system, the group
information is updated.
l The system automatically generates a Handset Group ID for internal use.
To avoid a problem where nGeniusONE truncates handset names because they exceed the
internal schema limit of 30 characters for handset name and 20 characters for handset model,
you can re-balance the default setting by revising the serverprivate.properties file and performing
the following procedure:
1. Using a text editor, open the serverprivate.properties file in the /rtm/bin folder on the
nGeniusONE Server (DGM or Global Server in a distributed environment).
2. Revise the lengths of these settings to reflect your needs. For example, you can increase
the model length and reduce the name length, as follows:
l globalsettings.handsetgroups.maximumModelIdLength=30
l globalsettings.handsetgroups.maximumNameLength=20
3. Save and close the file.
4. In Global Settings > Locations > Handset, delete the affected handset group.
5. Stop and restart the nGeniusONE Global Server (or Standalone Server). This step is
unnecessary on a Local Server.
6. Re-import the handset list to the Server.
7. If there are any Service/Dashboard entries created for the deleted handset group,
remove/de-select all location keys and re-associate them by modifying that Service.
8. Reset the InfiniStream which is monitoring these Handset location keys.
1. From the nGeniusONE console, click Global Settings > Locations > Handset.
In addition to RAT type support for Diameter (control plane) traffic, tracking RAT types for data
plane protocols over GTPv1, GTPv2 and PMIPv6 on Gn, S11, S5/S8, and S2a interfaces is also
provided. Site_APN virtuals are supported for RAT type data.
The SIP RAT type is enhanced in the UC-KPI table and ASRs when the mobile control plane is not
present or does not contain the RAT type value. The Media Monitor provides drilldown support
for RAT type metrics.
NETSCOUT-supported RAT types which may appear as location keys in the Service Monitors are
listed here.
l RAT-UNDEFINED (0)
l RAT_WLAN (1)—Wireless LAN
l RAT_UTRAN (2)—Universal Terrestrial Radio Access Network, the radio technology used
between mobile terminals and the base stations of 3GPPTM systems
l RAT_GERAN (3)—GSM EDGE Radio Access Network, joins the base stations (the Ater and
Abis interfaces) and the base station controllers (A interfaces, etc.) The network represents
the core of a GSM network, through which phone calls and packet data are routed from
and to the PSTN and Internet to and from subscriber handsets. A mobile phone operator's
network comprises one or more GERANs, coupled with UTRANs in the case of a UMTS/GSM
network.
l RAT_GAN (4)—Generic Access Network, most commonly used to hand over connections
between wireless LANs and WANs using a GSM/Wi-Fi dual mode mobile phone
l RAT_HSPA_EV (5)—High Speed Packet Access
l RAT_EUTRAN (6)—The air interface of 3GPP's Long Term Evolution (LTE) upgrade path for
mobile networks
l RAT_CDMA2K_1X (7)—Code Division Multiple Access 2000 - a 3G, spread-spectrum
technology
l RAT_HRPD (8)—High Rate Packet Data, a high-speed CDMA-based wireless data technology
l RAT_UMB (9)—Ultra-Mobile Broadband, the brand name for 3GPP2 technology in North
America
l RAT_EHRPD (10)—A bridge between CDMA and LTE that allows CDMA towers to pass over
packets to the LTE network
l RAT_VIRTUAL (1)—Unknown
l RAT_PPP
l RAT_8023
l RAT_80211
l RAT_80216
l RAT_RTT
Note: RAT types 0 and 1 are generic RAT types that can apply to different IP-CAN types and is
not IP-CAN specific, RAT types 2 to 6 are 3GPP-specific RAT types, and RAT types 7 to 10 are
3GPP2-specific RAT types.
Supported Devices
Voice and Video Quality monitoring and alarming for RTP-Voice and Video Quality MOS or Jitter is
supported for nGeniusONE and the InfiniStream appliance as described in this table:
Device RTP (Jitter, MOS, RTCP Reports (Jitter, IPSLA test reports*
Packet Loss) Packet Loss)
InfiniStream yes yes no
*Voice and Video Quality setting is ignored; it uses IPSLA command line setting only.
RTCP-Jitter and Packet Loss are supported for all NETSCOUT devices.
Configuration Details
For complete configuration instructions, including appropriate options in the monitoring device
and Performance Manager configuration, refer to Voice and Video Quality Configuration in the
Agent Configuration Utility Administrator Guide.
The IANA (Internet Assigned Numbers Authority) considers an endpoint profile to be composed
of:
l The parameters that compose a media stream, including its codec.
l Specific criteria unique to each payload type.
Each payload type has a unique identifier, which can be used to retrieve an associated profile
and determine the codec. NETSCOUT extends the concept of a profile to better detect the codec
type used for streams with dynamic payload types.
To analyze a voice or video media stream, you must determine which codec is used to encode
the content of that stream. This is done by analyzing the media packets for the payload type
field. The payload type field value, which is either in a fixed (static) number range or a dynamic
range, is used to identify the codec associated with that media stream.
The codec and payload type varies depending on the type of traffic being transported. For
example:
l An enterprise with VoIP services, or a fixed-line VoIP service provider is likely to have traffic
with static payload types.
l A mobile network provider is likely to have traffic with static payload types and
dynamically-assigned payload types associated with adaptive multi-rate codecs, and
possibly video codecs.
Review the following for Voice/Video payload and codec support considerations:
l Supported codecs, and relevant limitations, for UC views are described in "UC: Supported
Protocols & Codecs" in the nGeniusONE Help.
l Calls must be bi-directional to assess the payload.
l A codec must be payload-supported in both directions.
l Calls must be of a reasonable duration.
l Calls must contain a good quantity of active speech.
l Detection of SILK and Opus Audio codecs is supported over RTP only. Note that you must
configure Opus manually; otherwise, the default profile, which does not contain Opus, is
used.
This table describes the Global Settings > Voice/Video > Endpoint Profiles > Definitions page
options:
Option Description
Add a (profile) definition (10000 maximum allowed).
De-Multiplex SSRC Click the check box to enable this feature. SSRC (Synchronization Source
Identifier) is a value provided in UDP/RTP packets for the context of RTP Time
Stamping to identify the synchronization source. There are two types of SSRC
mappings: static and dynamic. When configured to use dynamic mapping, the IDs
are chosen randomly with the intent that no two synchronization sources within
the same RTP session will have the same SSRC ID. SSRC's are mapped between
each media capture.
Codec Available in Audio or Video. Select a Codec type from the drop-down menu.
Priority Available in Audio or Video. Select a value from the drop-down menu to set a
priority for processing the codec, ranging from 0- Default, 1-High, to 10-Low, TBC-
Suppressed, and TBC-Forced. A Time Base Corrector improves the signal and/or
image quality. TBC is included in SIP metrics collected through ASRs.
PT Start Available in Audio or Video. PT Start and End steppers range from 96 to 127 and
increment by 1. The PT Start stepper must be LTE to the PT End and the PT End
stepper must be GTE to the PT Start.
PT End Available in Audio or Video. PT Start and End steppers range from 96 to 127 and
increment by 1. The PT Start stepper must be LTE to the PT End and the PT End
stepper must be GTE to the PT Start.
TimeStamp Clock Available in Audio or Video. The Timestamp stepper ranges from 0 to 1,000,000
and increments by 1000.
Resolution Available in Video only. Select a value from the drop-down menu. Default:
Min.(imum) Bitrate Available in Video only. Minimum Bit Rates range from 0-65536 and increment by
10. The Minimum Bit Rate must be the LTE Maximum Bit Rate unless the
maximum rate is 0 and the Maximum Bit Rate must be the GTE Minimum Bit Rate
unless the rate is 0.
Max.(imum) Bitrate Available in Video only. Maximum Bit Rates range from 0-65536 and increment by
10. The Minimum Bit Rate must be the LTE Maximum Bit Rate unless the
maximum rate is 0 and the Maximum Bit Rate must be the GTE Minimum Bit Rate
unless the rate is 0.
l Priority: 0
l PT Start: 96
l PT End: 127
l TimeStamp Clock: 0
Microsoft Skype for Business profiles share similar entries with the Generic profile excepting a
few specific forced/suppressed entries.
l Calbration File: Microsoft Skype for Business
l Report RTCP Metrics: Checked
l De-multiplex Telepresence: Unchecked
l De-multiplex SSRC: Checked
Typical values for most Microsoft Skype for Business audio codecs are:
l Priority: 0-Default
l PT Start: 96
l PT End: 127
l TS Clock Frequency: 0
Typical values for Microsoft Skype for Business video mappings are:
l PT Start: 96
l PT End: 127
l Resolution: CIF (352x288)
l TimeStamp Clock: 0
l Min bit-rate: 0
l Max bit-rate: 0
This table describes the Global Settings > Voice/Video > Endpoint Profiles > Assignments
page options:
Option Description
Add an assignment (10000 maximum allowed).
7.2 Decryption
For SSL/TLS traffic, InfiniStreamNG-based decryption only supports passive decryption through
static key-exchange (RSA). Active decryption requires the nGenius Decryption Appliance (nDA) to
decrypt dynamic key exchange based SSL/TLS traffic.
All other ciphers (such as TLS_DH*, and TLS_ECDH*) are not static key exchange and cannot be
decrypted by InfiniStreamNG.
SSL/TLS:
l Are protocols that encrypt specific application data for the transport layer using
asymmetric cryptography to exchange keys, symmetric encryption to maintain privacy, and
message authentication codes to retain message integrity.
l Payloads can be decrypted and data displayed for Monitor, Session Analysis and Packet
Analysis views.
nGeniusONE supports:
l Decryption of SSL/TLS packets only when a Web server uses a static-RSA key exchange and
certificate type—and these RSA encryption keys must be provided to nGeniusONE software
for decryption.
l Static-RSA keys are indicated by the TLS_RSA prefix, which can be found in the Cipher Suite
portion of the Hello part of the Handshake message. If the cipher suite does not begin with
TLS_RSA, nGeniusONE cannot decrypt it. Also see Locating and Extracting Private Key Keys.
l Reading static-RSA keys from HSM devices for FIPS-140 Level 2/3-compliant environments.
l A maximum of 50 Keys for TLS/SSL decryption.
l SSL/TLS decryption when the requirements in this table are met:
Requirement Description
SSL/TLS handshake SSL/TLS handshake packets that are established for each network
conversation are captured and processed in full by the InfiniStream.
l SSL/TLS handshake packets should include following messages:
o ClientHello
o ServerHello
o ClientKeyExchange
o ChangeCipherSpec
RSA key input Static-RSA encryption keys can be provided as input by using following
methods:
l Local Key Files
NETSCOUT supports two methods of Public/Private key usage for real-
time SSL/TLS packet decryption and decoding. The Local option enables
storage of Public and Private Keys for this purpose. SSL Private keys in
the un-encrypted .pem format are supported by nGeniusONE software.
They are persisted and stored locally on system disks in an encrypted
format.
l Hardware Security Module (HSM)
l Private Key are stored on FIPS-140 compliant HSM Servers. Regarding
HSM devices:
l The HSM option provides the means for using a Private Key, which is
stored on FIPS-140 compliant HSM Servers. Regarding HSM devices:
o nGeniusONE supports any PKCS#11-based HSM device and has
1. (Optional) Locate and extract a private key (in the form of a certificate) from your Tomcat,
or Apache or Windows llS Web server and import it to your server (Local option only) in
the ssl.cfg file in the <nGeniusONEinstall>/rtm/pa/decodepack/ssl folder on either the
nGeniusONE server or InfiniStream. nGeniusONE securely stores private keys in an
encrypted format similar to RC4 and they cannot be exported nor purged from the
platform after a certificate expires.
Note: Although a successful key download to the InfiniStream is not recorded in any
nGeniusONE log file, you can confirm this action by noting the date and time stamp of the
ssl.cfg file.
Important: When converting a standalone or local server to a Global Manager, support
for Name-IP Address translations requires you to include the Common Name (CN)—the
Fully Qualified Domain Name —of the server in the private key.
l (Optional) For Thales/SafeNet HSM users only, configure software on the InfiniStream
appliance (refer to Using the HSM to Configure SSL/TLS Decryption in the Agent
Configuration Utility Administrator Guide).
The Local option pushes down to and stores the private key (.PEM file) in the nGeniusONE
Server, then InfiniStream, then the Local decryption device.
In the case of a Global Manager, the .PEM file is pushed down to and stored in the client device,
then Global Manager, then all associated Local Servers, then all InfiniStreams . The HSM
(Hardware Security Module) option does not distribute PEM files but does distribute the private
key in a similar fashion using the PKCS11 protocol.
See the online help for these procedures to configure decryption keys:
l Configuring SSL Local Decryption Keys
l Configuring SSL HSM Decryption Keys
Important: nGeniusONE supports creating either an HTTPS or HTTP child but not both.
Perform the following steps to configure an HTTP, SIP, FTP, or LDAP child.
1. From the nGeniusONE Console, click Global Settings > Application Configuration >
View: Enterprise > IP > TCP > Well Known Apps.
2. Select the non-secure counterpart of these applications such as HTTP, SIP, FTP, or LDAP
5. Select Server Application, click Add Application, and enter the server IP Address.
6. Click OK and Apply to save your configuration.
(Optional) Configuration for the Certificate Monitor and for Monitoring SSL in the
Universal Monitor
Important: Configuring this feature will conflict with prior configuration if you have already
configured an HTTP child application.
To configure a child that travels over SSL (for example, SIPS, FTPS, or LDAPS) for viewing in the
monitors, perform theses steps:
To ensure that key requirements for the local .PEM file are met, be aware that the file mustnot be
password protected nor encrypted.
You can decrypt an encrypted key file by using the openSSL utility, which is available from
www.openssl.org. For example, this command creates a decrypted copy of server.key
name decrypted_server.key:
openssl rsa -in server.key -out decrypted_server.key
Enter pass phrase for server.key: [passphrase]
l Tomcat Web Server
The private key for a Tomcat Web Server is stored in a keystore file typically named service-
keystore.ks. To get the private key, you must export it from the keystore. Use the following
procedure:
1. Download and install the free Portecle utility from the following location:
http://portecle.sourceforge.net/
2. Open the service-keystore.ks file in Portecle.
3. Locate the server’s key in the keystore, right-click it and choose Export from the context
menu that appears.
4. Set Key pair export types to Private Key and Certificates and select PEM as the
Export Format.
5. Enter the password for the private key when prompted.
6. Select the destination and filename for the private key when prompted.
l Windows IIS Web Server
To obtain the private key for a Windows IIS web server, you must export it from the server's
certificate as a .pfx file (PKCS#12) and then convert it to .pem format. Use the following
procedure:
1. Start by exporting the private key from the server's certificate as a .pfx file. Refer to
instructions in the How to back up a server certificate in Internet Information Services 5.0
Knowledge Base article on the Microsoft website at:
http://support.microsoft.com/kb/232136
2. Use the OpenSSL utility to convert the PKCS #12 file to PEM format. For example, the
following command converts IIS_Key.pfx to a file named server.key in PEM format:
openssl pkcs12 -nodes -in IIS_Key -out server.key
Module (HSM) option, on the other hand, provides the means for using a Private Key, which is
stored in an HSM device, for this purpose. NETSCOUT provides multiple slots with login
credentials for each.
HSM Overview
HSM devices support the PKCS#11 interface to interact with its server. NETSCOUT supports HSM
vendors SafeNet and Thales who have their own pkcs11 module which is provided with the client
to access its HSM server. The NETSCOUT decryption module communicates with the HSM server
using the pkcs11 library provided by the client. This security-enhanced method supports the
Federal Information Processing Standards (FIPS) required by U.S. government agencies and
contractors for decoding data.
As illustrated below, the HSM option employs a public-key cryptography (PKCS) driver installed
on the InfiniStream to apply the key toward decryption of the SSL payload without the key ever
leaving the HSM device where it is stored.
Refer to Using the Packet Analysis > Data Mining Module in the nGeniusONE online help for
more information about performing decodes.
Multiple key import is available from the Decryption Keys tab in Global Settings but only when
the privileges Decryption — Admin and Decryption — User are enabled for the particular user role.
Be aware that exporting decryption keys is not supported at this time. Additional security is
provided by encryption for HTTPS client-to-server communications and password encryption in
the database. Keys are imported over HTTPS by default if you have an SSL certificate.
Import file
A particular import file need not be a certain type; it is only required that it be comma-delimited.
Any import file not passing validation generates an error message back to the user.
TLS Local
Example
TLS119,2405:0200:0631:1581:0000:0000:0000:001b,5061,5060,-----BEGIN RSA
PRIVATE KEY-----
\nMIIJKAIBAAKCAgEA+U3LFJ7FXFe1lVPs2XJd91UQbYd0xYvvsXZvBnQ2FU1PRjnn\nUfpq
FlOmPg1cylp+mPtUBhHrD52/0y3hNoD8OKYhd2XG25Ruf73G8KVr3ktCqag5\nM8lOqngBZq
QJj/cccIVvW5xzNUXiqMYOZsjJC4F
...
\n9zAhYxGE0KSLJFvDV7e3PtWgJFaKpKuaWg3DmpU6g4hLTmd4b7fl2sFCngM=\n-----END
RSA PRIVATE KEY-----
SSl HSM
Example
HSM_test1,10.64.80.184,8443,8080,Stuff,id,123,Stuff
HSM_test2,10.64.80.184,8443,8080,Stuff,id,123,Stuff
SSL IPSec
SSL IPSec requires that a "NULL" value be provided for Encryption and Authentication when
either one or both will not to be used. The corresponding key value will be ignored when NULL is
provided.
Example
IPV4,10.64.80.184,10.64.80.185,1234,NULL,,NULL,
IPV4,10.64.80.184,10.64.80.185,0x1234,NULL,,NULL,
IPV6,2001:0db8:85a3:0000:0000:8a2e:0370:7334,2002:0db8:85a3:0000:0000:8a
2e:0370:7334,*,NULL,,NULL,
IPV4,10.64.80.184,10.64.80.185,*,3DES-CBC,1234567890123456,NULL,
IPV4,10.64.80.184,10.64.80.185,12345,NULL,,ANY 192 bit
authentication,1234567898975075708
Configuration
1. From the nGeniusONE Console, click Servers and Users > User Management > Roles.
2. Select a role from the list for the user to be assigned this task and in the Privileges pane,
scroll down to and check the Configure Decryption Keys - Admin check box.
3. Click OK. Ensure that the user directed to handle key decryption is assigned this role.
4. After configuring these settings, log out and log back into the nGeniusONE Server to effect
the change.
5. From the nGeniusONE Console, click Global Settings > Decryption Keys, and the SSL
Local, SSL HSM, or IPsec tabs.
6. Click Import. A pop-up screen appears from which you can browse to select the
import file. Follow the prompts to complete the import.
Important: for SSL Local imports, the Key field in the dialog that would usually display the
file name that the key was stored in for imported keys will show FromImport. This field is
not translated — it is expressed in English. If you edit one of these keys and do not change
the key to a file name then when it is saved, the key will remain what it was before the
edit. But, If you change the field from FromImport to a file name then the key will be read
from that file upon saving it. You can not type in the field , therefore there is no chance
you can change a non-imported key to FromImport. You must select a file from a popup
menu.
Note: For SSL HSM imports, the password need only be entered once unlike from the GUI
which requires two entries to ensure that no typos occur.
<extendFileName enable="0">
<showMeInfo>1</showMeInfo>
<showStartDate>1</showStartDate>
<showStartTime>1</showStartTime>
<showEndDate>0</showEndDate>
<showEndTime>0</showEndTime>
<showTimeZone>1</showTimeZone>
<showFilter>0</showFilter>
</extendFileName>
nGenius Session Analyzer provides analytics of session data but does not directly manage data
sources. Instead, it must be integrated with another server that provides this data. The parent
server can be either an nGeniusONE or nGenius Configuration Manager server, or an
OAM server. When integrated, the applicable data sources on those servers are visible to the
nGenius Session Analyzer server and also provide authentication and configuration parameters.
Since integrating this server type also requires authentication, the integration is done in the
Servers and Users > Authentication Source module on the nGenius Session Analyzer server,
rather than being adding as a child server in the nGenius Configuration Manager or nGeniusONE
Server Management module. You can add a second nGenius Session Analyzer server to create a
distributed cluster.
nGenius Session Analyzer is built on the nGeniusONE framework and therefore follows the same
installation process. nGenius Session Analyzer deployment and licensing exceptions are covered
in this chapter along with nSA-specific configuration. Only Linux is supported for nGenius
Session Analyzer servers. See these sections for basic server requirements and installation
instructions:
l Preparation
l Installation and Upgrade
There is no Type 1 dynamic count for all other G10, GeoBlade, 14U, 12U, 3U, and 2U legacy
probes. All static Type 1 counts, active or not, are counted as shown in the following table.
OAM authentication does not employ the Type 1 dynamic count. All probes are statically counted
as shown in the following table. There is no dynamic count, even for InfiniStreamNG(Geo).
See License Enforcement for SpIprobe 14U, 3U, and 2U for information about SpIprobe
licensing.
Licenses are applied on nGenius Session Analyzer servers and not on authenticating nGenius
Configuration Manager or nGeniusONE servers for these reasons:
l Support of OAM-based deployments
l Support legacy instrumentation (G10/GeoBlade/14U/3U/2U) and their licensing
Each server can do 50 simultaneous user sessions (queries) and needs at least one Type 1
license pack (10/25/50 pack). All Type 1 licenses are pooled and applied at the Primary, even
though they are distributed across servers.
In the following example, the nGenius Configuration Manager server with nSA RAN licenses has
failed and the Standby nGenius Configuration Manager with Standby nSA RAN licenses has
assumed control.
This static enforcement of Type 1 licenses for 14U, 3U, and 2U applies to both nGenius CM and
OAM mode. Only probes that pass the license requirement and enforcement appear in the
nGenius Session Analyzer Input Filter Home (Page 0).
The Interface count increments with each probe by probe ID. System administrators cannot
choose the interfaces assigned for each license. Licenses are assigned in order by probe ID. All
probes are sorted regardless of probe type by probe ID. Users cannot see the number of probes
beyond the number of licensed interfaces.
Run UpdateProbeType when installing SpIprobe license enforcement for the first time,
upgrading to 6.3.2, and when adding new probes. After the probe type is in the DbGeoNodeExt
database on the SpIserver, SpIAdapter sends it to nGenius CM and OAM. All setup probes are
sent to SpIAdapter, whether enabled or disabled. See the SpIserver SpIstation Installation and
Upgrade Guide for more information about running scripts on SpIservers.
You can install the needed Linux image in your VM environment and then install the released
Linux images of nSA or SCS on those VMs as any other Linux machine. For example, you can
create an AWS instance-type that matches nSA or SCS requirements, install a Linux image onto
that (for instance, AWS EC2 VM), and then install the nSA/SCS code onto that VM the same as any
other Linux machine. The following table displays nSA VM server requirements.
See the nGeniusONE or nGenius Configuration Manager Help for more info about the Device
Configuration, Locations, User Management, and Application Configuration modules.
The default maximum number of nodes that can be configured is 45000. You can change this
default by adding the globalsettings.networknodes.maximumNumberOfNetworkNodes property
with a new value to the <NETSCOUT Install>/rtm/bin/serverprivate.properties file; for example:
globalsettings.networknodes.maximumNumberOfNetworkNodes=70000
The absolute maximum that can be defined is 380000, and you can set the default to a number
lower than 45000.
8.3.1.3.1 Overview
Users attach to 5G with the Next Generation Radio Access Network (NG-RAN), which relies on the
NG Application Protocol (NGAP) for signaling between NG-RAN nodes and Access and Mobility
Management Functions (AMFs). NGAP carries Non Access Stratum (NAS) messages across N1/N2
interfaces to request new sessions.
Use nGenius Session Analyzer to monitor and troubleshoot NGAP 5G access issues using
nGenius CM authentication with InfiniStreamNG(Geo) in dual mode. See "Installing GeoProbe
Software" in the InfiniStreamNG (Geo Mode) Deployment Guide for more information.
8.3.1.3.2 Problem
8.3.1.3.3 Solution
Configure NGAP data sources, and then use nGenius Session Analyzer to monitor and
troubleshoot NGAP issues to determine their root causes.
8.3.1.3.4 Workflow
This procedure shows how to set up and monitor NGAP traffic while using nGenius Session
Analyzer with nGenius CM authentication and InfiniStreamNG(Geo) in dual mode.
See the nGeniusONE or nGenius Configuration Manager Help for more info about the Device
Configuration, Locations, User Management, and Application Configuration modules.
This procedure shows how to monitor and troubleshoot NGAP traffic with nGenius Session
Analyzer scenarios. See the nGenius Session Analyzer Help for more information about creating
and using scenarios.
1. Log in to nGenius Session Analyzer and click Authentication Source, select nGenius CM,
provide the information for the authenticating nGeniusONE or nGenius
Configuration Manager authenticating server, click OK.
2. Return the Console and click the Scenario Builder module.
3. Select Session Analysis from the Add Scenario menu.
4. Create an NGAP monitoring scenario:
a. Name the scenario.
b. Select probe(s) with the N1 interface mobile parameter enabled.
c. Search and select NGAP from the Application menu.
5. To narrow your search, click the Advanced tab and expand the menus to select specific
status events, session types, response codes, or transaction types of concern.
6. Click Save.
7. On the Console, click the Session Analyzer module.
8. Select the NGAP scenario, duration for your capture, and then click Launch Session.
9. When the Session Details page opens, search failed sessions and use the "Response
Codes" column to determine whether failure causes are due to the user equipment or
your network:
l User Equipment (UE) failure code examples - Illegal UE, UE Security Capabilities
Mismatch, UE ID Cannot Be Derived by Network
l Network failure or incompatibility code examples - PLMN Not Allowed, No Suitable
Cells In Tracking Area, MAC Failure
10. Select the sessions you want and drill to Packet Analysis for further inspection.
11. Inspect packets in the Packet Decode page.
12. If the issue is user-oriented, guide the user to the solution. If network-oriented, contact
the appropriate network personnel to isolate and fix the issue(s).
1. Remove the InfiniStreamNG(Geo) associations from OAM. See the OAM Help for more
information.
2. Add the InfiniStreamNG(Geo) appliances to the nGenius CM server. See Configuring nSA
Nodes and Devices and the nGeniusONE or nGenius Configuration Manager Help.
3. On the nSA server, change from OAM authentication to nGenius CM authentication. See
Authentication: nGenius CM.
4. Update configurations in nGenius Configuration Manager. See a general OAM-to-nGenius
Configuration Manager mapping in the following table. Not all mappings are one-to-one.
Some OAM plist configuration is enabled by default and some is done with the RESTful
API for nGeniusONE. See "Updating GEO Properties for nCM Deployments" in the
InfiniStreamNG(Geo Mode) Guide and the Guide to the RESTful API for nGeniusONE
Configuration for more information.
Table 8.1 - OAM-to-nGenius Configuration Manager Mapping
5. Restart the nSA server to apply the new configurations. See Stopping and Restarting the
System.
<prop key="file.replication.periodicity">
If you change the file(s) configured in replication-config.xml, the changed files are automatically
replicated from primary nSA server to all Secondary nSA servers. When the nSA Primary server is
restarted, all secondary nSA instances receive file replicas.
If the Secondary nSA server is added after files are changed on the Primary nSA server, those
changes are not automatically replicated to the newly added Secondary nSA server.
The files on the Primary nSA server must be updated with a new timestamp to trigger the
replication task to the Secondary servers. The task is executed at the next scheduled time, which
is every 5 minutes by default and is defined in file.replication.periodicity. Use the touch
command to update the timestamps of the files to be replicated. For example, to replicate files in
the <NETSCOUT Install>/rtm/nsaapp/config/localConf directory:
cd /opt/NetScout/rtm/nsaapp/config/localConf
find . -type f -exec touch {} +
You can also manually copy the files that need replication from the Primary to the Secondary
server.
MPC ruleset files are located on the nSA Server in the following directory:
<NETSCOUT Install>/rtm/nsaapp/config/geoMpc
If you require new MPC ruleset files, NETSCOUT recommends adding those additional MPC
rulesets within separate files titled with meaningful names so they can easily be identified and
selected in nGenius Session Analyzer.
<NETSCOUT Install>/rtm/nsaapp/config/geoMpc
In this example, a new MPC ruleset file named “New_MPC_Ruleset_Test” has been added:
The next step is to change the owner and permissions of your new MPC ruleset file to match the
default MPC ruleset files:
chown ngenius:ngenius <filename>
chmod 750 <filename>
After running these chown commands, the new MPC ruleset file includes execute permissions.
l Use the nsaConfigReload utility. This method allows to reload immediately all the MPC
Ruleset files that are located in the directory (NETSCOUT
Install>/rtm/nsaapp/config/geoMpc) to make them available for selection in the nSA
l Wait for the next restart of the nSA Server. When the nSA Server is restarted, it loads
all the MPC Ruleset files in <NETSCOUT Install>/rtm/nsaapp/config/geoMpc to make them
available for selection in the MPC Ruleset list on the nSA user interface.
To launch the nsaConfigReload utility, use a web browser and the following URL:
https://<nsa server-IP:8443>/nsaapp/nsaConfigReload.jsp
1. Select GEO_MPC_RULES
2. Click Reload/Refresh.
Multiple values for conditions are supported for p-ani and network-ip . Use this format to
configure multiple values:
<array type="string"> <string>a</string><string>b</string></array>
An OR relationship applies to those string values inside an <array> block, which means as long as
one of the values is present in the session record for the corresponding field, that record is
considered to be matched.
If you do not add a service description to the services.xml file, the service name is used as the
description.
</prop>
<prop key="condition3">
<properties>
<prop key="type">
<string>StatusEvents</string>
</prop>
<prop key="value">
<string>Gm VoLTE</string>
</prop>
<!-- "isPresent" in GenericDataAttribute -->
<prop key="isPresent">
<boolean>false</boolean>
</prop>
</properties>
</prop>
<prop key="condition4">
<properties>
<prop key="type">
<string>PaniAccessType</string>
</prop>
<prop key="values">
<array type="string">
<string>IEEE-802.11</string>
<string>IEEE-802.11a</string>
<string>IEEE-802.11b></string>
<string>IEEE-802.11g</string>
<string>IEEE-802.11n</string>
</array>
</prop>
<!-- "isPresent" in GenericDataAttribute -->
<prop key="isPresent">
<boolean>true</boolean>
</prop>
</properties>
</prop>
</array>
</prop>
</properties>
</prop>
<prop key="Service2">
<properties>
<!-- "serviceName" in MultiComputationDefinition -->
<prop key="serviceName">
<string>NGHP</string>
</prop>
<prop key="serviceDescription">
<string>Next Generation Home Phone</string>
</prop>
<!-- "multiConditionAttributes" in MultiComputationDefinition -->
<prop key="conditions">
<array type="prop">
<!-- A single GenericDataAttribute -->
<prop key="condition1">
<properties>
<!-- "type" in GenericDataAttribute -->
<prop key="type">
<string>ApplicationId</string>
</prop>
<!-- "value" in GenericDataAttribute -->
<prop key="value">
<string>SIP</string>
</prop>
</properties>
</prop>
<prop key="condition2">
<properties>
<prop key="type">
<string>Transactions</string>
</prop>
<prop key="value">
<string>Invite</string>
</prop>
</properties>
</prop>
<prop key="condition3">
<properties>
<prop key="type">
<string>StatusEvents</string>
</prop>
<prop key="value">
<string>Gm VoLTE</string>
</prop>
<!-- "isPresent" in GenericDataAttribute -->
<prop key="isPresent">
<boolean>false</boolean>
</prop>
</properties>
</prop>
<prop key="condition4">
<properties>
<prop key="type">
<string>IPADDR</string>
</prop>
<prop key="values">
<array type="string">
<string>10.70.100.52</string>
<string>10.70.101.52</string>
<string>10.70.102.52</string>
<string>10.70.103.52</string>
</array>
</prop>
<!-- "isPresent" in GenericDataAttribute -->
<prop key="isPresent">
<boolean>true</boolean>
</prop>
</properties>
</prop>
</array>
</prop>
</properties>
Follow these steps to enable the option on the nGenius Session Analyzer server:
Set FailedMessageSupport to “true" on the OAM server. See the OAM TekAdmin Guide for more
information.
Caution: Increasing the number of sessions impacts client machine performance and
may produce a lag in nGenius Session Analyzer response time.
If you provide a value higher than 8, the maximum value is set to 8. The MaxCaptureAllowed
property applies to sessions launched from the Session Analyzer Home input filter (page 0) and
the Saved Sessions module.
When the user launches all sessions from the Saved Sessions module, the maximum limit error
appears on the Session Summary (page 1). When the user launches all sessions from the Session
Analyzer Home input filter (page 0), the error appears on page 0.
Sessions from page 0 and the Saved Sessions module may be open simultaneously. When that is
the case, the error appears on:
In this example, a warning appears and the user is logged out after 30 minutes.
For multi-instance deployments, you must define the property on every nGenius Session
Analyzer server instance to change the one-hour default setting.
If nsa_searchBy is not configured, the drill defaults to Active Time by Activity Time.
To enable G10 and GeoBlade visibility in nGenius CM authentication mode when using nGenius
Subscriber Cache (SCS):
l On the OAM interface, activate SCS for OAM-managed probes with the
com.tektronix.iris.isa-sr2d.plist/SubscriberCacheEnabled plist property. See the OAM
TekAdmin Guide for more information.
l On InfiniStreamNG(Geo) appliances managed by nGenius Configuration Manager or
nGeniusONE, enable SCS with the XML file in the /iris_kpi_db/configManager/changes
directory. See Configuring nGenius Subscriber Cache Digit Types for more information.
l Ensure nGenius Subscriber Cache (SCS) servers have enough SCS probe licenses enabled to
display all probes (see Monitored Elements Supported per License).
l If the default ScsPort (11117) is not used on the SCS primary server, configure
fileCollector.oam.probe.port in <SCS Install>/rtm/scs/config/localConf/scsLocalConf.xml.
l Align all digit types with one another in OAM, SCS, and nSA:
<properties>
<prop key="all"> <!-- For ALL probeTypes -->
<properties>
<prop key="-1"> <!-- -1 means for ALL applications -->
<properties>
<prop key="failed"> <!-- Indicate as Failed status in nSA
for the statuses listed in the next line -->
<string>failed</string> <!-- the status sent from probe to
server -->
</prop>
<prop key="timedout"> <!-- Indicate as Timeout status in nSA
server for the statuses listed in the next line -->
<!-- This section means for appid 230 which is RTP+RTCP, if the status of the record/PDU
is failed or timedout, per following end-user configuration, the session record/PDU will
be considered to be normal for all probe types. -->
<prop key="230"> <!-- application id which can be found in plist
com.tektronix.iris.appid for corresponding application name -->
<properties>
<prop key="normal">
<string>failed,timedout</string>
</prop>
</properties>
</prop>
</properties>
</prop>
<!-- This section means for appid 243 which is RTCP-Only application, if the
status of the record/PDU is failed or timedout, per following end-user configuration,
the session record/PDU will be considered to be normal for SpIprobes. -->
<prop key="spi">
<properties>
<prop key="243">
<properties>
<prop key="normal">
<string>failed,timedout</string>
</prop>
</properties>
</prop>
</properties>
</prop>
</properties>
</prop>
To enable SpIprobe access for nSA in nGenius CM mode, create a section with the properties
described in the table below in <Install directory>/rtm/bin/serverprivate.properties on the
authenticating nGeniusONE or nGenius Configuration Manager server.
These properties do not exist in the file until manually added. By default, ports, version, and
interval are set in the code, so setting host only in the properties file is enough.
spiAdapterHost=<SpIserver IP address>
8.3.11.1 nsaLocalGEOConf.xml
Configure maximum export capture size, maximum file size, maximum size of the sum of all files,
and the maximum number of all PDUs simultaneously per server instance from the UI, API, and
Session Scheduler.
<prop key="geo.server.maxExportCapSize">
<string>20</string>
</prop>
<!-- the max size per file in GB -->
<prop key="geo.server.maxFileSize">
<string>2</string>
<!-- the max number of exporting all user plane PDUs simultaneously per nSA server
instance, including all requests from nSA GUI, nSA API and nFC -->
<prop key="geo.server.maxExportPcapngPerServer">
<string>50</string>
</prop>
8.3.11.2 nsaLocalCommonConf.xml
Designate the location and storage threshold of the directory to export scheduled capture
PCAPng files.
<!-- nFC pcapng file location, system admin needs to set up the mounted point, then
update this property -->
<!-- After configuring this property, the location has to exist and be accessible
from ngenius user -->
<prop key="geo.server.nFC.PcapngFileLocation">
<string></string>
</prop>
<!-- nFC pcapng file location used space percentage threshold, profiles with PCAPNG
format will not execute if the location exceeds this threshold -->
<prop key="nfcPcapngFileLocationUsedSpacePercentageThreshold">
<integer>90</integer>
</prop>
The digit types available for nGenius Subscriber Cache are configurable. The table below shows
the digit IDs used to define the supported digit types.
Beginning with the 6.3.2 release, nGenius Subscriber Cache digit types are configured by
executing API commands from the authenticating nGeniusONE or nGenius
Configuration Manager server. Refer to the following guides:
l InfiniStreamNG(Geo Mode) Guide - "Updating GEO Properties for nCM Deployments" for
JSON and XML API input examples.
l Guide to the RESTful API for nGeniusONE Configuration for more information about using the
API.
During installation, the following applies to the "Display Flow User Plane Metadata" privilege for
existing users:
l Users with privilege: "View Inner IP" and "View Outer IP" are set to true.
l Users without privilege: "View Inner IP" is set to false and "View Outer IP" is set true.
l To switch an IP address type between inner and outer, add or remove the type to or from
InnerIpAddressSubTypeNames for session record masking, and add or remove the type to
or from InnerIpAddressNodeTypeNames for message details masking.
l To exclude an inner IP address from masking, include the subtype name in
<excludedIpAddressSubTypeNames> under <InnerIpAddressDigitMasking>, and put the
node type name in <excludedIpAddressNodeTypeNames> under
<InnerIpAddressDigitMasking>.
l To exclude an outer IP address from masking, include the subtype name in
<excludedIpAddressSubTypeNames> under <OuterIpAddressDigitMasking>, and put the
node type name in <excludedIpAddressNodeTypeNames> under
<OuterIpAddressDigitMasking>.
Example: If the customer does not want to mask DOWNLINK_IP, add DOWNLINK_IP into
<excludedIpAddressSubTypeNames>.
<InnerIpAddressDigitMasking>
<excludedIpAddressSubTypeNames>
<value>DOWNLINK_IP</value> <!-- will be excluded from masking -->
</excludedIpAddressSubTypeNames>
</InnerIpAddressDigitMasking>
<excludedIpAddressNodeTypeNames>
<value>Gm UE IP Pool</value> <!-- will be excluded from masking -->
</excludedIpAddressNodeTypeNames>
</InnerIpAddressDigitMasking>
Example: If the customer does not want to mask HSS IP Address, that is not defined in
InnerIpAddressSubTypeNames, add HSS into
<OuterIpAddressDigitMasking>/<excludedIpAddressSubTypeNames>.
<OuterIpAddressDigitMasking>
<excludedIpAddressSubTypeNames>
<value>HSS</value> <!-- will be excluded from masking -->
</excludedIpAddressSubTypeNames>
</OuterIpAddressDigitMasking>
Example: If the customer does not want to mask SGW node type, that is not defined in
InnerIpAddressNodeTypeNames, add SGW into the section
<OuterIpAddressDigitMasking>/<excludedIpAddressNodeTypeNames>.
<OuterIpAddressDigitMasking>
<excludedIpAddressNodeTypeNames>
</OuterIpAddressDigitMasking>
<Configuration xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="DigitMasking_Default.xsd" >
<DigitMasking>
<DigitNames>
<digitNameToMask value="Enum"/>
<digitNameToMask value="DHCP Client ID"/>
<digitNameToMask value="IMSI"/>
<digitNameToMask value="MSISDN"/>
<digitNameToMask value="IMEI"/>
<digitNameToMask value="IMEISV"/>
<digitNameToMask value="MEID"/>
<digitNameToMask value="GUTI"/>
<digitNameToMask value="STMSI"/>
<digitNameToMask value="CallingParty"/>
<digitNameToMask value="CalledParty"/>
<digitNameToMask value="RedirectingNumber"/>
...
</DigitNames>
<attributesToMask>
</attributesToMask>
</DigitMasking>
<ContentNames>
<FullContentMaskNames>
<nameToMask value="UserName"/>
</FullContentMaskNames>
<NormalContentMaskNames>
<nameToMask value="SubscriptionId"/>
<nameToMask value="To"/>
<nameToMask value="IMPI"/>
</NormalContentMaskNames>
<FlowApplicationMasking>true</FlowApplicationMasking>
<FlowURLsMasking>true</FlowURLsMasking>
<FlowUserAgentsMasking>true</FlowUserAgentsMasking>
</ContentNames>
<InnerIpAddressSubTypeNames>
<value>SUBSCRIBER_IP</value>
<value>CLIENT</value>
<value>SERVER</value>
<value>MEDIA_IP</value>
<value>UPLINK_IP</value>
<value>DOWNLINK_IP</value>
</InnerIpAddressSubTypeNames>
<!-- any node types other than what is defined in InnerIpAddressNodeTypeNames, will
be considered as Outer node type, ex: SGW, MME -->
<InnerIpAddressNodeTypeNames>
<value>SUBSCRIBER IP Node</value>
<value>Gm UE IP Pool</value>
<value>CLIENT</value>
<value>SERVER</value>
</InnerIpAddressNodeTypeNames>
<InnerIpAddressDigitMasking>
<IpAddressNames>
</IpAddressNames>
<attributesToMask>
</attributesToMask>
<excludedIpAddressSubTypeNames>
</excludedIpAddressSubTypeNames>
<excludedIpAddressNodeTypeNames>
</excludedIpAddressNodeTypeNames>
</InnerIpAddressDigitMasking>
<OuterIpAddressDigitMasking>
<IpAddressNames>
</IpAddressNames>
</attributesToMask>
<excludedIpAddressSubTypeNames>
</excludedIpAddressSubTypeNames>
<excludedIpAddressNodeTypeNames>
</excludedIpAddressNodeTypeNames>
</OuterIpAddressDigitMasking>
</Configuration>
<!-- In one prop entry, prop key is the global title digit value, and the string value is the
point code value. The string representation of the point code should have numbers separated
by dashes (e.g.: in ANSI: 8-8-8, ITU: 3-8-3)..
Multiple global title entries could have same value of point code.
If the global title key is same in multiple entries, but value of point code is
different, the last point code value will be set for the global title
-->
<prop key="globalTitleToPointcode">
<properties>
</properties>
</prop>
</properties>
l nGenius CM - Go to Global Settings > Locations > Point Code and add and configure a
node. See the nGenius Configuration Manager Help for more information.
l OAM - Go to System Config > Topology > Managed Objects > Nodes and configure a
node in the Node Details pane. See the OAM Help for more information.
From the InfiniStreamNG(Geo) perspective, the base probe configuration is overridden just for
User Data Capture subscribers/sessions and any related user plane data or user content. For all
other nSA sessions, the InfiniStream(Geo) configuration controls the capture.
For example, if the InfiniStreamNG(Geo) is set to capture RTP headers only with the "geo_probe
rtp_header_only_capture = on" setting:
l If User Data Capture is not running for any nSA session, then only RTP headers are
captured for all sessions.
l If User Data Capture is initiated for some nSA sessions but not others, then all RTP packets
are captured for the UDC-initiated sessions and only RTP headers are captured for the
other sessions.
For a full description of nGenius Session Analyzer user plane privileges configurable in nGenius
CM User Management, see "User Data Capture" in the nGenius Session Analyzer Product Overview
document. The nSA Help contains brief descriptions of each privilege.
nGenius Subscriber Cache is used to provide optimized retrieval of subscriber data when
integrated with an nGenius Session Analyzer or ISA server. From Server Management, on this
server, you can add either a Secondary nGenius Subscriber Cache server or an nGenius Session
Analyzer. The latter procedure creates a trusted relationship for providing data to that caching
server. For the Primary/Secondary relationship, both nGenius Session Analyzer servers must
point to the same nGenius Subscriber Cache server.
nGenius Subscriber Cache (SCS) is built on the nGeniusONE framework and therefore follows the
same installation process. nGenius Subscriber Cache deployment and licensing exceptions are
covered in this chapter along with SCS-specific configuration. Only Linux is supported for
nGenius Subscriber Cache servers. See these sections for basic server requirements and
installation instructions:
l Preparation
l Installation and Upgrade
SCS server sizing is based on the number of digits types to be cached and the number of entries
per digit type. Currently the SCS supports 8 digit types. In the worst case, one subscriber has all
the 8 digits types, which means 1 million subscribers will have 8 million digits entries. Generally,
a 2-socket server with 384 GB of RAM can support 800 million digit entries, which translates to
100 million subscribers.
Consult the Sizing team at MBServiceProviderIns@netscout.com for more SCS sizing and
appliance information.
9.4.1 Trusted Key for nGenius Session Analyzer and ISA Servers
By default, when you add an nGenius Session Analyzer or ISA child server to an nGenius
Subscriber Cache server, a shared encrypted key is used to secure communications between
nGenius Subscriber Cache and the child servers. You must copy this key to any nGenius Session
Analyzer or ISA child servers you add, and these points apply:
l To generate and copy a new trusted key, use the Shared Secret Key field and Generate
button on the General Information tab for an nGenius Session Analyzer or ISA child server
in nGenius Subscriber Cache Server Management.
l Any regeneration of the key needs another manual update to the configuration parameter
on the nGenius Session Analyzer or ISA child servers.
l The trusted key is retained across upgrades.
l If there are multiple nGenius Session Analyzer servers in a cluster, each one needs to be
added to nGenius Subscriber Cache individually and its corresponding shared secret key
copied over to that nGenius Session Analyzer server.
l The trusted key is unique per nGenius Session Analyzer server and is not part of the
configuration files replicated from Primary nGenius Session Analyzer to Secondary nSA
Servers.
l Validation at nGenius Subscriber Cache is based on a combination of the nGenius Session
Analyzer or ISA IP address and the trusted key.
l nGenius Session Analyzer and ISA send the trusted key in RESTful API requests to nGenius
Subscriber Cache.
<prop key="trustedKeyForSCSCommunication">
<!-- User has to copy the Trusted Key for this nSA Server from the SCS Server Management UI
and paste here -->
<string>efoTiHHzZFTns0QwNnNN4iAw120z6F8dGoC3A/DHFeM=</string>
</prop>
</properties>
The digit types available for nGenius Subscriber Cache are configurable. The table below shows
the digit IDs used to define the supported digit types.
Beginning with the 6.3.2 release, nGenius Subscriber Cache digit types are configured by
executing API commands from the authenticating nGeniusONE or nGenius
Configuration Manager server. Refer to the following guides:
l InfiniStreamNG(Geo Mode) Guide - "Updating GEO Properties for nCM Deployments" for
JSON and XML API input examples.
l Guide to the RESTful API for nGeniusONE Configuration for more information about using the
API.
l Digit Cache
l Event
l Load balancer
l Memory
l nGenius content
l nSA content
l NS logs
l PA logs
l Postgres
l Query
l Remote admin
l Statistics
l Xerror
l XML
The following server types can be added as child nodes to a Global Manager cluster, from Server
Management, with data rolling back up to the parent server.
l From the Global row:
You can add a child server to be a cluster member. Select type Local then add a
Standalone to convert it to a remote "local" server.
l From the Local server row associated with the Global:
You can add a Standalone server as the type Standby, to function as a failover for the
Global Manager itself.
l From the Local server row for any remote cluster node (not applicable for related servers
with unique architecture):
You can add a Standalone server as the type Standby, to function as a failover for that
node of the cluster.
Since the primary difference between a GM and DGM is device management, you can use the
same guidance for Global Managers when building a cluster with a DGM.
Every nGeniusONE server has a server process running locally, to manage core server functions
on that system. In some cases, such as Standalone, the process is not separately identified in
Server Management.
Local Servers associated with Global Manager Servers are always present for servers installed
and configured as Global Managers (not Dedicated Global Managers). They are not explicitly
installed but are automatically installed with Global Manager installations. This Local Server type
provides device management functions for the Global Manager server itself. It does not manage
other servers, so the list of server types that can be added to it is limited to a Standby Server.
Use the following as a guide for understanding the requirements to set up your Standby server
and work with it in your deployment.
l Integrating a Standby Server
l Testing the Standby Server Conversion
l Converting a Standby to a Primary Server
l Troubleshooting Standby Servers
Note: A Standby server is not supported for use as an Authentication Source, although its
address must be listed as accessible for any user or group (in User Management), should the
server need to be converted to a primary. If you have converted a Standby server to assume
the role of the Primary server it was backing up, you may need to re-configure any servers
that were relying on the primary as an Authentication Source. This is particularly the case if
the configuration of the Primary as an authentication source was done with an IP address
rather than a host name.
l Setting up a Standby Server
l Adding a Standby Node
l Replicating Data & Configurations
l Accessing the Standby Server
Use the installer for the product it will be backing up (such as nGeniusONE or nGenius
Configuration Manager or Omnis Cyber Investigator) to install and configure a like-type server.
After the server is installed, configured, and on the network, you can add it to your deployment.
Review the following before you begin:
l Obtain a unique hostname and IP Address (NETSCOUT recommends static, rather than
DHCP, addressing) before you begin the installation.
l The server must be installed and configured with the same software version as the one it is
backing up. The software versions must match.
l If your installer offers a Global option, do not select that - otherwise you will need to first
convert it to a Standalone before adding it as a Standby. nGenius Configuration Manager,
for example, has only one type, so no selection is needed.
l Obtain licenses that match in scope to the server to be backed up, but for Standby
functionality
Licenses specifically for a Standby Server, but that complement the configuration of the
server it is backing up. For example, if you have an nGeniusONE 225 license, which includes
the nGeniusONE Server and UC and 50 Type 1 interfaces, then the corresponding Standby
Server could be licensed with a 226 license which includes the same but for Standby.
l Users for the primary server must be given access to the Standby host in User
Management
l if access lists are configured on any data sources, those must be configured to allow the
Standby host address
l Web access ports must be configured the same as that of the server being backed up
1. Prepare installation and configuration worksheets with the following considerations:
2. Install an nGeniusONE server with the same version of software as the server it will be
backing up.
3. Obtain and install Standby Server licenses.
4. Configure the server as a Standalone server type, if applicable for your type of server.
5. Add the server to your cluster (refer to the next section).
6. Access the User Management module and ensure that the Standby Server is displayed in
the Server Access list. This ensures that if conversion of the Standby is performed later,
those users already have permission to access the web GUI.
After you have set up a Standby Server (see the previous section), you can use Server
Management to add it as a Standby node to your deployment.
l From the Standalone server row of an single node server, select type Standby and add the
Standalone server you configured above. (Standalone servers do not have a Local instance,
so you add directly to the top node.)
l From any Local server row in a Global Manager or Dedicated Global Manager deployment,
you can add a Standalone server as the type Standby. You use this method to add a
Standby for backing up the LocalServer of the Global or Dedicated Global Manager, or
backing up the remote Local server of a cluster node.
l From the ConfigManager row of an nGenius Configuration Manager server, select
type NCM Standby and add the server you configured using the nGenius
Configuration Manager installer.
l Note that the above are the only types supported for addition of a Standby type. Other
servers that may be displayed Server Management list, like nGenius Business Analytics are
not applicable for a Standby server.
Procedure:
1. Access the Server Management module. (For distributed deployments, access from the
parent server in the cluster. This avoids having to replicate the server map to the parent
server.)
2. Select the row for the server that you want to back up with your new Standby Server.
l To back up a Global Manager or Dedicated Global Manager, you select the
LocalServer row, not the parent "Global" row.
l To back up a remote child server node, select the Local Server row
3. Click the Add Server icon to display the corresponding dialog box.
4. Use the following as a guide to populate the dialog box:
Server Type: Select Standby Server (If you do not see this option, it is not supported
for server you selected above)
Server Name: This is an alias / friendly name you can provide to identify the server. It
can contain spaces, but not special characters.
IP Address/Host: Provide an IPv4, IPv6 address or a fully qualified domain name.
Web Port: This port number must be the same web port specified for the server being
backed up.
User Login Information: This is the web user account you provided during
installation, that is used to administer the system.
Alarm Suppression Time: This is the amount of time before Standby Alarms are re-
issued
Backup Check Timeout: Timeout for backup to hear from Primary
5. When ready, click OK to save the settings. You can monitor progress of the server being
added by selecting the Server Management Operations Progress tab at the bottom of
the Server Management GUI.
6. After the Standby Server has been added, allow time for replication to occur before
performing any conversion tests or replicating additional data.
7. Access the User Management module and ensure that the Standby Server is displayed in
the Server Access list. This ensures that if conversion of the Standby is performed later,
those users already have permission to access the web GUI.
When you first add the Standby Server, property files, configurations, and so on, are replicated.
Data from that moment forward are replicated on a scheduled basis.
l Ad hoc: The following are replicated whenever you make a change and reset the primary
and/or standby server:
o Server Map table: Identity of all server nodes in the cluster
l Every 15 minutes:
o Database content, including application configurations, devices, service definitions, and
so on.
o User records
l Nightly: The following files contain a list of configuration files, property files, and assorted
scripts that are replicated nightly:
o <nGeniusONE install>/rtm/bin/reppropertyfilesbackup.dat
o <nGeniusONE install>/rtm/bin/propertyfilesbackup.dat
Older Data
Data prior to the point in time when you add the Standby Server are not copied to the
Standby Server. You can manually move older, existing data and reports to the Standby
Server by executing scripts on the primary server. If needed, you can copy data with the
following procedure.
Important: Depending on your environment, copying existing data to the Standby Server can
take time. For very large environments this process can take several hours. Therefore you
may want to perform this task during periods of low traffic.
1. After you have added a Standby Server to the primary server, restart both servers.
Restarting the servers replicates the data to the Standby Server.
2. Wait for the above replication to complete.
3. On the primary server navigate to the <nGeniusONE install>/rtm/bin directory.
4. Run the following scripts, as needed:
For dbONE flow data
# fdsdatareplicator.sh
To include reports run the following after the above has completed.
# reportsnewsreplicator.sh
Note: Log files containing relevant information are written to the <nGeniusONE
install>/rtm/log folder and with names matching the script.
After the server has been installed and configured, users can log into the web interface as if it
were a standard nGeniusONE server. This capability allows administrators to validate that
backups are occurring correctly. Most functionality is disabled or limited to read-only access.
These restrictions are in place to prevent database modifications and to ensure true redundancy
between the primary and Standby Servers.
For example:
l Most configuration modules are not available since configurations are intentionally copied
from the parent server. Configuration modules that are displayed are read only.
l Most analysis modules are available. However, the Standby Server is not intended to
function as a cluster member for distributed analysis. It is intended for backup.
l The Trace Archive and Data Mining modules are not displayed as those are intended for
use with packet data, often directly from the data sources. Standby Servers do not have
direct access to data sources until they have been converted.
l The System Information column on the nGeniusONE console is not populated since usage
metrics are not applicable for a standby server.
If the primary server has failed, the Standby Server will immediately send an email
notification and place messages in the Message Log, Loggerdebug, and Flowloggerdebug
log files stating that the primary server is down and no data are being received. The server
continues to send emails every hour until the problem is corrected. You can resume
operations by converting the Standby Server to be a primary server.
If the primary server problem is caused by hardware failure, contact your hardware
supplier. If the problem is caused by nGeniusONE software failure, contact Customer
Support.
Note:
l Although a GUI-based method is available for certain configurations, the manual
method is supported for all standby configurations so is most suitable for testing
standby conversion.
l This procedure is intended for testing and presumes both the Primary and Standby
servers are online and running normally.
l This procedure is applicable for these server types:
o Local Server (remote as well as the LocalServer located on a Global Manager or
Dedicated Global Manager)
o Standalone nGeniusONE Server
o nGenius Configuration Manager
Syntax
where
<ip address> is the address of the standby server that you want to become the primary
server
Procedure
1. Open a PuTTY window to the Primary Server and its associated Standby Server that you
plan to test. Place them side by side on your monitor.
2. In both windows, log into the operating system command line as the root user.
3. In both windows, navigate to the bin folder.
# cd /opt/NetScout/rtm/bin
4. In both windows, stop the nGeniusONE server processes:
# ./stop
5. In both windows, verify all processes are stopped:
# ./PS
The output of this should only be the Xvfb process. If any other nGeniusONE processes
display, run the stop command again, or kill the processes.
6. In both windows, switch to the ngenius user and instantiate the environment:
# su - ngenius
bash-4.1$
Use the - option with this command. You will now be in the install folder for your server
software (/opt/NetScout, by default) and a new shell command prompt displays.
7. In both windows, ensure you are in the bin folder.
bash-4.1$ cd /opt/NetScout/rtm/bin
8. In both windows, run the script and specify the IP Address of the server you want to
become the primary:
bash-4.1$ ./convertstandbytoprimary.sh <Standby Server IP address>
true
The conversion procedure runs and completes, after which the command prompt
displays.
9. Exit the ngenius user shell and return to the root user shell:
bash-4.1$ exit
logout
#
Restart the nGeniusONE server processes on both servers as the root user:
# ./start
10. To verify the changes, do one of the following:
l Verify in Server Management:
Access Server Management from the nGeniusONE Console on the Standby server. The
Servers tab shows a row for each of the Primary and Standby servers, with the original
hostnames, but the IP addresses are swapped.
Example:
If you had started with the following configuration:
Server Type
⯈ GlobalManager1 Global
10.20.100.161
o LocaltoMyGlobal1 Local
10.20.100.161
⯈BostonPrimary Local
10.20.48.230
o BostonStandby Standby
10.20.50.216
⯈PlanoPrimary Local
10.20.160.14
o PlanoStandby Standby
10.20.160.44
Server Type
⯈ GlobalManager1 Global
10.20.100.161
o LocaltoMyGlobal1 Local
10.20.100.161
⯈BostonPrimary Local
10.20.50.216
o BostonStandby Standby
10.20.48.230
⯈PlanoPrimary Local
10.20.160.14
o PlanoStandby Standby
10.20.160.44
l Verify manually:
On each server, open the file below:
<nGeniusONE install>/rtm/database/configxml/xml/server_map.xml
Locate the name of the primary server you are testing. The <server_config> block
below that will have an <address> block with the IP address of the Standby Server you
tested. Given the example above, you would see:
<server_info>
<id>1</id>
<name>BostonPrimary</name>
<type>Local</type>
<status>UP</status>
<master>0</master>
<Time_Zone>US/Eastern</Time_Zone>
<registryBindnigName>ServiceManager</registryBindnigName>
</server_info>
<server_config>
<address>10.20.50.216</address>
<port>8080</port>
<protocol>HTTP</protocol>
</server_config>
This test ran the script on the Primary server, which is not typical for a real scenario in
which the primary server has failed. This allows you to see both servers and leave them
running and part of the cluster rather than having them competing to both be the Primary
server. Because the settings were changed on both servers, you should now also see the
Standby Server's name with the IP Address of the original Primary server.
11. To revert the sequence and restore the servers to their original Primary and Standby roles:
a. In windows to both servers, still logged in as the user root, stop the nGeniusONE
server processes and verify they are stopped:
# ./stop
# ./PS
b. In both windows, switch to the ngenius user and instantiate the environment, then
navigate to the bin directory:
# su - ngenius
bash-4.1$
bash-4.1$ cd /opt/NetScout/rtm/bin
c. Now, in both windows, run the script and specify the IP Address of the server you want
to become the primary. In this case, use the address of the current standby server,
which you had just changed from primary to standby and now want to revert it to
primary again:
# ./convertstandbytoprimary.sh <Current Standby Server IP
address> true
The conversion procedure runs and completes, after which the command prompt
displays.
d. Exit the ngenius user shell and restart the nGeniusONE server processes on both
servers:
bash-4.1$ exit
logout
#
#./start
If you miss one of the steps on the steps in the conversion process, contact Customer Support
for assistance to correctly configure names and IP addresses.
l If you enabled access list security on an InfiniStream appliance, child server, or other
network device, be sure to add the Standby Server IP address to the list. If it is not
included, the device will not respond to the Standby Server when it is functioning as a
primary server. For more information about access lists, refer to the Agent
Configuration Utility Administrator Guide.
l After you convert a Standby Server to a primary server, the original primary server
(which should be offline or disabled if you are performing this task) should no longer
display in the Server Management interface. The original alias name of the primary
server is displayed, but with the IP address of the Standby Server.
l If the original primary server comes back on line, do not re-add it to the distributed
cluster. Stop the nGeniusONE server processes and contact Customer Support for
assistance.
l If you miss one of the steps on the steps in the conversion process, contact Customer
Support for assistance to correctly configure names and IP addresses.
This method is enabled only when you are logged in to a Global Manager or Dedicated Global
Manager and have selected a Standby server attached to a remote Local Server. Use of the GUI
is not applicable when you are converting a Standby that supports the head of a cluster. Use the
Manual method (above) for those cases.
Note: If you are converting the Standby Server to test your recovery procedure, instead, refer
to: Testing the Standby Server.
3. If you have selected a supported server type, the Server Operations drop-down menu
option for Convert to Primary is enabled. Select that option.
4. Verify the IP Address presented in this dialog box before proceeding to the next step. Do
not click the Failback option, this is used only for testing purposes and is not applicable
when you need the Standby to truly assume the role of its primary server.
If the correct IP Address is listed, click Yes.
5. When the conversion completes, a message box displays instructing you to restart the
converted server. Click OK to acknowledge the message.
6. Restart the server(s).
This method is the only one that can be used to convert Standby Servers for Standalone Servers,
for Global Managers, and Dedicated Global Managers. It can also be used to convert Standby
Servers for remote Local Servers.
Note: If you are converting the Standby Server to test your recovery procedure, instead, refer
to: Testing the Standby Server.
1. Open a PuTTY window to the Standby Server and log in as the root user.
2. Navigate to the bin folder.
# cd /<nGeniusONE install>/rtm/bin
3. Stop the nGeniusONE server processes.
4. Verify all processes are stopped:
# ./PS
The output of this should only be the Xvfb process. If any other nGeniusONE processes
display, run the ./stop command again, or kill the processes.
5. Change to user ngenius with: su - ngenius. This is required to run the next script.
6. Re-navigate to the executable directory:
-bash-4.1 $ cd /<nGeniusONE install>/rtm/bin
7. Run the script below and specify the IP Address of the server you want to become the
primary:
# ./convertstandbytoprimary.sh <Standby Server IP address> true
The conversion procedure runs and completes, after which the command prompt
displays.
8. Exit the shell for the ngenius user so that you are now the root user.
9. Start the nGeniusONE server processes.
You can now log into it as the primary server. The data that is reported as being under the name
of the primary continues to be reported with that server's alias, even though the IP address is
now that of the original standby server.
l Virtual nGeniusONE – These installers include all features associated with nGeniusONE
Console. They do not include features found in the Performance Manager1 or Unified
Management Consoles. This installer has a cloud-friendly resource footprint; requiring a
minimum of only 4 vCPUs and 16 GB of RAM to manage up to 10 Type 1 interfaces.
Table A.1 - nGeniusONE Virtual Installers: Cloud-friendly Footprint
1If running nGeniusONE without Performance Manager on a 16 GB 4 CPU system, you must use license option 222 or
308. nGeniusONE OVA (VMware) images use the 16GB 4 CPU option by default. Fresh installs of nGeniusONE may also
run on a 16 GB 4 CPU system.
The process of installing and configuring an nGenius Configuration Manager server is the same
as a standard nGeniusONE server, with a couple of differences. This product has a different
installer and does not require licensing, since it is not providing analytic functions. Following are
key notes about an nGenius Configuration Manager
l Memory and CPU requirements are less for this server type than an nGeniusONE server, as
this server does not perform analytics. A minimum of 16GB of memory and 8 CPUs is
recommended.
l The installer is available only from the product pages for the server types it supports. You
can, for example, download the install are from the nGenius Business Analytics (nBA)
product page.
l A license is not required to for an nGenius Configuration Manager. However, licenses are
required for the child server functionality that this server manages.
o For nBA, the licenses installed on that server must be replicated to the nGenius
Configuration Manager. Instructions for licensing are provided in the nBA | nAS
Installation and Upgrade Guide.
o For nSA and nGenius Subscriber Cache, the license is installed on that server. The
nGenius Configuration Manager does not require that license to be copied locally.
Data-feed child servers: The following server types can be added from the Server
Management GUI.
l Standby
l nBA
l nSI
l Pulse
NetFlow and sFlow are technologies used to monitor IP traffic flows in routed and switched
environments.
When configured to generate NetFlow datagrams, routers and switches can be directed to send
the data to the nGenius Collectors, dedicated high-density NetFlow and IP SLA collection devices,
gather NetFlow datagrams and IP SLA test data from Cisco routers and/or switches for display in
nGeniusONE, nGenius Performance Manager, and nGenius Performance Manager for Flows.
By default, the SAA devices are searched every hour for new tests. This discovery interval may be
modified to be any number of seconds from one minute to one hour. Discovery may also be
done upon demand. Refer to the agent administrator guide for details.
The number of SAA devices and IP SLA tests supported depends on whether or not the device is
collecting NetFlow or sFlow data. The following table shows the number of tests and devices
supported:
The firmware supports the ability to discover and poll IP SLA tests configured on a Cisco SAA-
enabled device running IOS version 12.4 or higher. The following table shows the test types that
are supported and the metrics that are measured:
Response time metrics are measured and reported for a variety of IP SLA Test Types.
There are several steps you must take to get started monitoring IP SLA. For more information on
configuring your environment to support IP SLA testing, see the nGenius Collector Administrator
Guide.
Note: You must also meet configuration requirements to obtain and view IP SLA test data.
5. To activate a test type, from the Select monitoring options drop-down menu, click
Activate.
6. Click Apply.
NetFlow and sFlow are enabled directly on the routers and switches themselves, but require an
nGenius Collector to receive flow data. nGenius Collectors can be configured to act as collection
devices for flow data.
nGenius Collectors (3300 Series) support collection of NetFlow and IP SLA data. By default, when
you add an nGenius Collector to nGenius for Flows, its associated routers are added
automatically, provided the Read/Write communities are Public. If the communities are other
than Public, you can manually add the router to the nGenius Collector from Device
Configuration.
The flow information collected on each device is sent to the management interface of a nGenius
Collector, and each flow source (interface on a switch/router) is mapped to an independent
virtual interface in the Collector. The Collector dynamically creates the flow virtual interfaces as it
receives flow export for those interfaces.
A.6.2 nSI
A.6.2.1 About nGenius Subscriber Voice / nGenius Subscriber Intelligence+
For nSV licensed nGeniusONE servers, retrieve data from nSV servers to populate the Voice
Monitors. Use the following procedure.
1. Log in to the nGeniusONE Server as root.
2. Using crontab -e, add the following string to the nGeniusONE list of scheduled jobs. In the
string, <nSV_ip_addr> represents the address of your nGenius Subscriber Voice Server.
*/5****/opt/NetScout/asi_pull/pull_config_ng.sh --remotehost=<nSV_
ip_addr>
3. Save the change.
To permit nGeniusONE to provide ASI data to nGenius Subscriber Intelligence, add the nSI server
address in the nGeniusONE Server Management.
A.6.3 Pulse
A.6.3.1 Integrating nGeniusPULSE
nGeniusPULSE is an infrastructure testing solution that monitors the availability and health of
servers and network devices. It extends the service-centric approach of nGeniusONE by enabling
identification of causes for network and application and performance issues observed in
nGeniusONE. Integration of the two servers enables single sign-on from nGeniusONE for direct,
contextual launch to nGeniusPULSE.
This chapter describes the tasks required for integrating the two servers that you have already
installed, configured, and placed on your network.
l Configuring nGeniusONE for Integration
l Configuring nGeniusPULSE for Integration
l Using nGeniusONE with nGeniusPULSE
Ensure that you have added subnet IP addresses for your enterprise as follows:
1. Launch Global Settings > Application Configuration from the nGeniusONE console.
2. Click the Pulse tab.
Note: The Pulse tab displays in Global Settings only after a trusted nGeniusPULSE Server
has been added in Server Management.
3. Select the applications that you want to monitor for infrastructure-related problems.
Refer to the nGeniusONE online help for additional information about all of the preceding tasks.
The nGeniusPULSE Server imports a list of application servers from the nGeniusONE Server
(maximum of 25,000). These servers are defined according to the applications you specify in
nGeniusONE . For additional information, refer to Configuring nGeniusONE for Integration
Modify the nGeniusPULSE property file to enable communication with nGeniusONE , importing
of the application server list, and drilldowns.
Use nGeniusPULSE Infrastructure Discovery to define the IP Scope of network devices that you
want nGeniusPULSE to monitor.
After configuring nGeniusPULSE, it polls the nGeniusONE server at regular intervals for any new
application servers.
Refer to the nGeniusPULSE online help for additional information about the preceding tasks.
Note
If you are assigned two nGeniusONE user roles, upon drilling down to nGeniusPULSE, you
are assigned the higher nGeniusPULSE user role. For example, if you are assigned both the
SYSADMIN and NTWKADMIN user roles in nGeniusONE , and drill down to nGeniusPULSE,
you are assigned the System Admin user role for nGeniusPULSE.
The assigned role cannot be changed. nGeniusPULSE inherits the nGeniusONE password in
a secure manner to enable single sign-on.
All users on nGeniusPULSE must have unique usernames and email addresses in order to
be created. New users from nGeniusONE that have a duplicate email address will fail to be
added to nGeniusPULSE.
The nGeniusONE Console displays an icon and launch point for nGeniusPULSE, shown below.
Drilldown from the Console opens the nGeniusPULSE dashboard with a Sites Overview, from
which you can begin investigating troublespots, as necessary.
Service Monitors help operators determine where and when an issue occurred, which
application and server were involved, and which users were affected. Various service monitors
are available for applications and metrics associated with a specific business or use-case.
Service Monitors that support drilldown to nGeniusPULSE pass context for a selected server to
related infrastructure metrics in nGeniusPULSE . (Drilldown is not available for Host Analysis,
Discover My Network, RTP Monitor, Media Monitor, and MDF Monitor.)
An example use case starts when users report that their Citrix access is timing out. To
troubleshoot, you can view Citrix services in the Service Dashboard and observe the high
percentage of timeouts for a particular service:
After drilling down to the Universal Monitor, you see that the Singapore Users community is
experiencing the highest timeouts. To learn whether these timeouts are infrastructure-based,
select a server and launch nGeniusPULSE.
The nGeniusPULSE view reveals high memory utilization for this server, causing the timeouts for
users. With this evidence, you can begin correcting the server memory problem.
Service Dependency provides a visual map to show the interdependencies between servers that
deliver a service, as well as how those servers are performing. If an nGeniusPULSE server is
integrated with nGeniusONE , you can select a server node in Service Dependency and click the
nGeniusPULSE icon to drill down to view additional infrastructure metrics for that server in
nGeniusPULSE.
An example use case starts when Oracle E-Business Suite users in Washington report slow
response times. To troubleshoot, you can view Oracle services in the Service Dashboard and
observe the slow response time for the Washington service.
After drilling down to Service Dependency to investigate the servers involved with the degraded
response time, you can see elevated latency on the server node. To find out if the response time
problem is due to infrastructure issues, select the node and click the nGeniusPULSE icon.
The nGeniusPULSE view reveals excessive CPU utilization for this server, which is leading to
degraded response time for users. You can now begin addressing the server CPU resources.
TrueCall leverages network signaling events or individual call detail records to create powerful
maps and reports of device and network performance, including detailed drill-down visibility into
each individual call in the network.
For details working with this server type, refer to documentation for the TrueCall product suite.
Note:
l This client is installed automatically with Windows-based nGeniusONE
installers. However, NETSCOUT strongly recommends you install the client software on
a separate system for users performing analytic rather than administrative tasks.
l Before you run the installer, review the client browser and JVM requirements.
l The server must be installed and licensed before you can download and use this
application.
1. From the client system, open a web browser and navigate to http://<nGeniusONE
server>:<port number>/splash
2. From the left hand navigation pane, locate Downloads and select Client Install.
3. Select the download file appropriate for your platform (Windows, Linux or generic UNIX).
The Windows and Linux installers include a JVM, which is required for this application.
4. Launch the installer:
l For Windows: Run the setup.exe program and respond to prompts for the
installation path and defaults.
l For Linux: Run the setup using: sh setup.bin -i console. Respond to installation
prompts, including whether use select a JVM already installed on the system.
l For Unix: Ensure the client system has a JVM installed. Then run the installer with: sh
./setup.bin, responding to prompts.
5. Respond to installer prompts for the following:
l Language Selection
l Introduction
l Choose Install Folder
l Choose Link Folder
l Choose JVM (Linux/UNIX only (Refer to the requirements for java version)
l Choose Browser (Refer to the requirements for supported browsers)
l Pre-installation Summary
6. After the installer completes, click Done to exit.
1. After the installation is completed, you can launch it from the Start menu location you
selected during the installation. By default, this is C:\NetScout\nGenius Client\nGenius
Client:
2. A login window displays, allowing you to specify the server address and port.
b. If you do not select Direct Login, then click Connect, the splash page for the server
displays. This allows you to log in from a web browser and perform some basic
activities from the web, or launch a java-based nGenius Client module (such as Console
More details on all of these tools are provided on the Dell website.
The version of iDRAC varies based on the server model, as listed below, although this document
provides an overview of the general functionality available from the iDRAC service.
l Access the iDRAC Web Interface
l Using the Virtual Console
o Using the Virtual Console
o Use the Virtual Console for Software Updates
o Use Virtual Media to Reimage a System
l Use BIOS to Change iDRAC Settings
l Access Other iDRAC Features
For complete details, refer to the Dell Remote Access Controller Documentation on the Dell website.
l Dell R740 (iDRAC9)
https://www.dell.com/support/article/us/en/19/sln311300/idrac9-home
l Dell R730 (iDRAC8)
https://www.dell.com/support/article/us/en/19/sln310710/idrac8-home
l Dell R720 (iDRAC7)
https://www.dell.com/support/article/us/en/19/sln311149/idrac7-home
Note:
l NETSCOUT recommends that you set your monitor resolution to 1280x1024 pixels or
higher.
l Browsers must be configured to allow pop-ups in order to launch the Virtual Console.
l The iDRAC connection does not use a certificate so you will be prompted each time to
approve the connection.
l Additional Notes for Internet Explorer:
o Browsers must have SSL 3.0 enabled.
o Ensure that the browser is enabled to download encrypted content.
o If you prefer not to use the Java plugin with Internet Explorer and instead use the
(Native) ActiveX plug-in, ensure that you have added the iDRAC IP or hostname to the
Trusted Sites list.
Use the information in this section to understand the environmental conditions required to use
the iDRAC interface.
Physical Connections
When making physical connections for the dedicated iDRAC port, keep in mind the following:
l The iDRAC port speed is 10/100/1000 Mbps.
l The iDRAC port has a default IP address of 192.168.0.120.
l You can directly connect the iDRAC port to the Ethernet port of a PC using an Ethernet
crossover cable.
l DHCP is supported, but not recommended.
l If you directly connect the iDRAC port to a Cisco switch, be sure to enable Spanning Tree
PortFast and disable the negotiation of the Dynamic Trunking Protocol on the Cisco switch
port to which you connect the iDRAC port.
The iDRAC interface uses specific network ports that you may need to open in your firewall for
successful communications.
Note: Ports marked with an asterisk (*) are configurable on the iDRAC.
iDRAC Server Connection Ports
iDRAC Client Ports
For the activities described in this document, you will need login credentials for an iDRAC
account with Administrator or Operator group privileges. The root user has Administrator
privileges by default. The default iDRAC user group privileges are:
l Administrator —Login, Configure, Configure Users, Logs, System Control, Access Virtual
Console, Access Virtual Media, System Operations, and Debug
l Operator —Login, Configure, System Control, Access Virtual Console, Access Virtual Media,
System Operations, and Debug
l Read Only —Login
l None —No assigned permissions
If the firmware has been reset, you may try a password of calvin
For more information refer to the iDRAC pages on Dell’s website (noted at the beginning of this
chapter).
Note: NETSCOUT recommends that you not use the web-based iDRAC interface to
reconfigure the iDRAC IP settings. Doing so runs the risk of losing connectivity during the IP
reconfiguration, resulting in an unreachable system. Instead, use system BIOS.
You can use the Virtual Console to access BIOS when you are monitoring a system. However,
there are cases where you may lose connectivity if you are connected remotely. Use these
instructions to log in directly to the appliance.
1. Establish a direct physical connection to the server hardware, either using a keyboard and
monitor or a laptop connected to the serial port.
2. Turn on or restart the server hardware.
3. Press F2 during the boot sequence to enter the system BIOS. If the operating system
begins to load before you press F2, wait for the system to boot completely before
restarting the system and trying again. When BIOS has booted, the System Setup Main
Menu displays with options for System BIOS, iDRAC Settings, and Device Settings.
4. Within this utility, use the following for navigation and selection:
l Arrow keys—move up and down within a menu or list; left or right to toggle an
alternative selection
l Enter key—apply a typed or selected value; display options in a selector list (use arrow
keys to navigate to a desired selection; Enter again to pick the entry)
l Tab key—navigate between the upper banner of the screen (Help/About/Exit), the
editable area of the screen, and the lower banner (Exit/Back/Finish); navigate between
If firmware factory reset occurs, the default iDRAC password could have been reset to the Dell
default, calvin. If you cannot connect with your original password or with “calvin,” you may need
to Restore iDRAC Defaults and then reconfigure iDRAC Settings. Otherwise, if you know your
password and want to change it:
3. Use the down arrow key to select the Change password field.
4. Type the new password and press Enter.
5. When prompted to re-enter the password, type it again and press Enter, or tab to the OK
button and press Enter.
6. Press Esc to exit the User Configuration screen. Your changes are not applied until you
completely exit BIOS. The iDRAC Setting screen is displayed.
7. If you have no other changes, press ESC again to exit iDRAC Settings. A dialog box prompts
you to confirm that you want to save your changes. Tab to and select Yes.
8. If you press Esc on this dialog box, the effect is the same as a No response—the previous
settings are restored.) A dialogue displays a confirmation that your settings are saved if
you selected Yes or restored if you pressed Esc or selected No.
9. From the System Setup Menu you are now ready to exit the utility and apply your saved
values to the system. Press Esc or tab to and select Finish. A dialogue displays asking you
to confirm that you want to exit BIOS.
10. Select Yes.
Use the procedure in this section to configure the iDRAC’s ethernet port.
If you forget your iDRAC password, or some other condition necessitates a BIOS reset, you can
revert the iDRAC firmware to factory default settings.
You can use the iDRAC web-based interface to open a virtual console to the server hardware.
This allows you to interact with the server hardware as if you had a directly connected keyboard
and monitor.
Note:NETSCOUT recommends that you do not use the web-based iDRAC user interface to
reconfigure the iDRAC IP settings. Doing so runs the risk of losing connectivity during the IP
reconfiguration, resulting in an unreachable system. Instead, use the system BIOS to change
IP settings.
To open a Virtual Console to the server hardware, perform the following steps:
Note: When you are accessing the iDRAC interface from a Linux operating system, an X11
console may not be viewable on the local monitor. Press Ctrl-Alt-F1 at the iDRAC Virtual
Console to switch Linux to a text console. You may need to disable your browser pop-up
blocker for the iDRAC IP address.
You can use the iDRAC Virtual Console’s Virtual Media option to reimage the nGeniusONE
hardware. This section describes how to make media available from your local client system to
the server hardware.
Before you begin, obtain the software for upgrade or reimaging and ensure it is present on your
local client machine:
l ISO Image– Download these files from your NETSCOUT MasterCare account and mount to
your local client machine; interact with them as you would a DVD.
l Restore DVD – Insert the Restore DVD in the local client machine.
l Application CD, Bin Files or RPM files- For these file types, you do not need to use the
Virtual Media method. Instead, Use the Virtual Console for Software Updates.
4. Select the Virtual Media > Map CD/DVD option. This command lets you map either a
CD/DVD drive or a local image file (.iso or .img). A mapping dialog appears where you can
browse to the drive or image file to be mapped.
l If you are using an ISO image, click the Browse button (iDRAC8) or Add Image
(iDRAC7) and use the navigation dialog to locate and Open the ISO located on your
client system.
l If you are using a CD or DVD and have not already inserted it to your system, do so
now and then navigate as above.
5. Complete the mapping association:
l For iDRAC7:
From the list of drives in the Client View window, enable the Mapped check box
associated with the CD/DVD or ISO that you want to use. The selection is automatically
connected to the server hardware for use.
Note: Leave this Virtual Media Dialog open until the software is no longer required by
the server hardware.
l For iDRAC8:
a. After you have navigated to the drive or image file to be mapped, click the Map
Device button.
After the selected drive/image is mapped to the server hardware, you prepare it for use as a
boot drive as thoug it were located in the server hardware itself.
1. From the Next Boot > menu, select Virtual CD/DVD/ISO. This ensures that the system
will boot from the image file or drive you just mapped in the previous steps, allowing you
to reimage the target server from the drive or image file located on your local machine.
8. When prompted, select either a static or DHCP addressing model to be used. After a brief
delay, the default of static will be set and the reimage will continue automatically.
Note: At the end of the reimage, a Complete screen opens and displays a Reboot button.
Do not click the Reboot button yet because your installation will begin again.
9. Return to the Virtual Console and enable Next Boot > Normal Boot. This ensures that
the system will use its normal boot sequence for future boots.
10. Use the Virtual Media > Disconnect Virtual Media option to disconnect your local
image/drive.
11. Return the Virtual Console screen and press Enter on the Complete screen. The system
reboots.
12. At this stage, your system is ready to use the nGeniusONE installer to complete the
restore process.
For most maintenance cases, you can use the iDRAC Virtual Console like a local shell window. It is
not necessary to use a DVD drive or ISO unless you need to reimage the system. For example, a
standard software update can be run from the system command line (bin files, rpm files), so you
can use the Virtual Console's itself without the Virtual Media option.
1. Obtain Software.
2. If you are using a DVD, insert it into the DVD drive local to the server, or copy the file to
your local client system and then use WinSCP or another method to copy the file to the
/opt directory of the remote server hardware.
3. Access the iDRAC Web Interface.
4. Click the Server link in the left navigation pane of the web interface.
5. Click the Console tab in the main body of the interface.
6. Click the link to Launch Virtual Console.
7. Log into the server hardware with appropriate credentials.
8. Follow guidance in the chapter on Installation and Upgrade.
Use the Alerts tab to configure traps and/or Email notifications based on a wide variety of
system conditions and platform events.
You can use the web-based interface’s Logs tab to view a System Event Log for the server
hardware. This log can be saved to a file for submission to Technical Support personnel, if
requested. You can also use this tab to replay the last three boot cycles.
Use the Power tab to view the server hardware’s current power status or to power cycle, power
up, or shut down the server hardware. Power cycling operations are available in the Server >
Power/Thermal > Power Configuration > Power Control sub-tab.
The Server > Properties tab includes a Summary sub-tab with Server Health status indicators
for all sensors with a link to drill down to more detail on each. You can also access the system
event logs and perform a collection of common operational tasks, including launching the Virtual
Console.
Note:
l OMSA starts automatically when you start the system.
l The default username and password are the credentials for the root user (as for SSH
logins).
l The tool is installed in:
./dell/advdiags/dset/bin/omsa/sbin/srvadmin-services.sh
l For details working with OMSA, refer to resources on the Dell website:
o https://www.dell.com/support/home/us/en/04/product-support/product/dell-
openmanage-server-administrator-9.0.1/docs
o https://topics-cdn.dell.com/pdf/dell-openmanage-server-administrator-9.0.1_users-
guide3_en-us.pdf
srvadmin-services.sh stop
l To connect to OMSA, launch a web browser and enter:
https://<hostname>:1311
l To disable the OMSA WebUI that runs port 1311.
a. SSH into nGeniusONE server and run the following command. This disables the OMSA
processes from the chkconfig.
# srvadmin-services.sh disable
b. Edit /etc/init.d/stealth and comment out service dsm_om_connsvc restart by
putting a # sign in front of the line.
c. Save and exit the file.
d. Reboot the server.
DSET generates the report in ZIP archived/compressed format and saves the file in the root
home directory. The name of the zip file includes “DSET,” “Report,” and the name of the server, as
illustrated in the output example below.
Note:
l DSET is installed in /opt/dell/advdiags/dset.
l Use of this tool requires root privileges.
l To view the report, unzip the file using dell as the password, then open the output
dsetreport.htm file in a web browser.
unzip <reportname> -d <anydirectory>
l For details working with DSET, refer to resources on the Dell website:
o https://www.dell.com/support/manuals/us/en/04/dell-systm-esuprt-tool-
v3.7/dset37ug-v1/dell-system-e-support-tool-dset-version-370-users-guide
o https://topics-cdn.dell.com/pdf/dell-systm-esuprt-tool-v3.7_users-guide_en-us.pdf
v3.7
Example:
./dellsysteminfo
However, in the event more than one drive in the array fails (as may occur if you are running the
system while waiting for a replacement disk), you may need to rebuild the volume. Your
appliance includes a BIOS level utility to support this. Use the procedure below to rebuild the
virtual disk, after which you can proceed with reinstalling the OS and application software.
Important: This procedure initializes the volume, any data on the target volume is
destroyed.
l https://topics-cdn.dell.com/pdf/poweredge-rc-h330_users-guide_en-us.pdf
l https://topics-cdn.dell.com/pdf/dell-sas-hba-12gbps_reference-guide_en-us.pdf
1. Access the appliance using a direct physical console or the iDRAC Virtual Console.
2. Reboot the appliance. (From the iDRAC Virtual Console, use the Power menu option to
Reset System or Power Cycle System, as needed).
3. During the boot sequence, watch carefully for the BIOS prompts and press Ctrl-R to enter
the PERC Mini BIOS Configuration Utility. The first tab (VD Mgmt) should be active. If it is
not, use Ctrl-P to navigate to it.
4. The row with Virtual Disk 0 should be highlighted. Use arrow keys to navigate up and
select the parent row. (This is the Controller for this Virtual disk set; see example in screen
shot below).
5. Press the F2 key to display a contextual menu of available operations (the options
available vary depending on the current screen and selected value).
6. Use the arrow keys to select Clear Config, then press the Enter key.
7. A dialog warns you that selecting this option will delete all the virtual disks. Tab to the Yes
button, then press the Enter key. The unconfigured Virtual Disks are listed as shown
below, with the first disk highlighted:
8. Ensure the correct number of disks is displayed. If you do not find the correct number,
contact Customer Support before proceeding. Otherwise, use arrow keys to navigate up
and select the PERC Mini controller again.
Note: The number of drives listed depends on the configuration of your system; for
example, a 3TB configuration has six 500GB disks, a 5TB configuration has six 931GB
disks, and a 10TB configuration has five 2TB disks.
9. Press the F2 key to display the operations menu.
10. Select the menu option to Create new VD (Virtual Disk), then press the Enter key. A new
screen displays with configuration options.
11. If it is not already highlighted, use the Tab key to navigate to the RAID Level field, which
should be set to RAID-0. Press the Enter key to display a pick list of RAID options. Use
arrow keys to scroll down and highlight RAID-5. Press the Enter key.
12. Press Tab to navigate to the Physical Disks configuration block.
13. When the first disk is highlighted, press the Space Bar to place an “X” in the box
immediately to the left of the Drive ID and to advance to the next drive. Do this for each
disk to include in the RAID array. You can also use arrow keys to navigate the list.
14. Press Tab to navigate to the VD Name field, then type Virtual Disk 0. (Note: The “VD Size”
field is automatically filled in).
15. Press Tab to navigate to the OK button, then press Enter.
16. A reminder message displays, recommending that the volumes be initialized. (This is not
done automatically). Tab to the OK button and press Enter to acknowledge the message
and continue.
17. From the main VD Mgmt tab, use arrow keys to navigate to the row with the new Virtual
Disk 0, if it is not already selected.
Note: The Virtual Disk must be COMPLETELY initialized BEFORE proceeding with further
operations.
22. After initialization is complete, a dialog displays to confirm Initialization completed with
OK highlighted. Press Enter to confirm.
23. Verify that your configuration matches the expected number of disks and capacity. The
figure below shows the configuration for a 5TB system – six Physical Disks and a total
capacity of 4655.00 GB. Similarly, for other server models:
3TB systems – six Physical Disks and a total capacity of 2326.65 GB.
10TB systems – five Physical disks and a total capacity of 7450.00 GB.
24. Press the Esc key, tab to OK, and press Enter to confirm that you want to exit the RAID
utility.
25. If you are accessing the BIOS from a local, physical console, use Ctrl-Alt-Del to reboot the
server. If you are accessing from an iDRAC Virtual Console, use the Power menu and select
the Reset System option.
26. Monitor the reboot and verify that the server finds one Virtual Drive as depicted below.
B.2.1 exportcli
B.2.1.1 Using the exportcliv2 Utility
nGeniusONE provides the exportcliv2 utility to export packets stored on monitoring data
sources. The exportcliv2 utility:
l Allows you to export packets that are stored on InfiniStream appliances using the Manage
port (eth0).
l Executable is available at: <InfiniStream or nGeniusONE install>/rtm/pa/bin.
l Can be downloaded to, and used on, your Desktop, or any third-party server, by
downloading packages from: <InfiniStream or nGeniusONE install>/rtm/pa/util.
Note: NETSCOUT recommends that you read this entire topic before you attempt to export
packets.
Usage Guidelines
Usage Example 1a - Using a filter file, with short form syntax options and explicit interface
parameters:
# ./exportcliv2 -u administrator -h -F filter_file -d /root/datafile -
n 192.168.1.1 -i 3 -B 11:00 -E 12:00
Usage Example 1b - Using regular expression (regex) format, with short form syntax options and
implicit interface parameters:
# ./exportcliv2 -u administrator -h -f "ip==1.2.3.4 and port==80"
/root/datafile 192.168.1.1 3 13:05:30 13:10:30
Usage Example 1c – Using trace conversion and size based file split, with long form syntax
options and implicit interface parameters:
# ./exportcliv2 --username=administrator --tracetype=pcap-ng --
filelimit=100 /home/datafile 192.168.1.1 3 13:05:30 13:10:30
Usage Example 2a – Using continuous export for 10 days in future, disk tolerance and time
based file split, with short form syntax options and implicit interface parameters:
# ./exportcliv2 --u administrator -C -D 100 -t 300 /home/datafile
192.168.1.1 3 2020-01-01/06:00 2020-01-11/06:00
Usage Example 2b – Using continuous export for infinite future time, disk tolerance and time
based file split, with short form syntax options and explicit interface parameters:
# ./exportcliv2 --u administrator -C -D 100 -t 300 -d /home/datafile -
n 192.168.1.1 -i 3 -B 11:00 -E -1
Usage Example 3a - Using a configuration file (see Creating a Configuration File for the -c Syntax
Option), with short form syntax option:
# ./exportcliv2 -c zeewires.txt 192.168.1.1 3 10:00 11:00
Usage Example 3b - Using a configuration file (see Creating a Configuration File for the -c Syntax
Option), with long form syntax option:
# ./exportcliv2 --configfile=fullquery.cfg
To stop a currently executing export operation, press the Ctrl c keyboard combination.
The following table describes the exportcliv2 command syntax options, some of which have a
short form and a long form. When you use long form options:
l In a command line—each has a two dash prefix (--).
l Inside a configuration file—each omits the prefix and has an equal sign suffix (=). See
Creating a Configuration File for the -c Syntax Option.
Option Description
Option Description
Option Description
Because continuous export creates a large output trace file, it is a best practice to split the
output trace file by size or time using options (-L or -t).
In addition, you can use the –D option to set the disk tolerance level to limit the packet export.
Usage Example 2a above shows that continuous export is turned on by specifying option -C, it
splits the output tracefile at the interval of 300 seconds (specified by -t 300) and stops the export
if available disk space is less than 100 GB (specified by -D 100).
Note:The end time has a finite difference of 10 days from start time. The start time itself can
be past, current, or future.
Usage Example 2b above shows that continuous export is turned on by specifying option -C, it
splits the output tracefile at the interval of 300 seconds (specified by -t 300) and stops the export
if available disk space is less than 100 GB (specified by -D 100).
Note: The end time is specified by -1 which indicates that export should run forever. The start
time itself can be past, current, or future.
In Example 1, the username and password are specified, SSL is on, overwrite it on, the filter file is
specified, and the packets are exported as micro PCAP type.
In Example 2, the username and password are specified, SSL is off, overwrite it on, a different
filter file is specified than seen in Example 1, the packets are exported as nano PCAP type
(default value), Block specifier {process} is added for packet modification operations, VLAN
stripping is on, and 4 bytes are chopped from each packet.
begintime=01:00
endtime=-1
timesplit=300
disktol=100
In Example 3, the username and password are specified, overwrite is on, continuous export is
enabled, the file name on the InfiniStream that will contain the exported packets is specified, the
address of the InfiniStream that the exported packets will be exported from is specified, the
interface number of the InfiniStream is specified, the start time is specified, the end time
indicates infinite future time, the exported packets will be split every 300 seconds, and the disk
tolerance is set at 100 GB.
Instead of multiple export jobs, you can apply multiple filters (up to four) with a single exportcliv2
execution so that one PCAP file is created for each filter. Packets are processed only once, which
provides better performance when applying multiple filters. To enable this tool enhancement,
new tags are used:
l PCAP file name tag: pcap=<"pcap_filename">
l Filter ID tag: filterid=<"id">
This sample filter configuration, with the new tags that support multiple filters in the same
export query, shows two filters:
The sample filter configuration would produce two exportcliv2 command output files:
l <export_filename>-test1.pcap
l <export_filename>-test2.pcap
In addition to the above multiple filter support, you can export data for the same time duration
for different interfaces, along with different filters on each interface, with this filter configuration:
Support Guidelines
l The exportcliv2 utility is supported on:
o Windows 7 or Windows Server 2008, or higher, based server.
Authentication Guidelines
If your nGeniusONE server is configured in secure HTTPS/SSL mode, you must be aware of these
authentication guidelines before you perform export actions:
l The exportcliv2 utility uses nGeniusONE authentication. It discovers the nGeniusONE IP
address for authentication based on the InfiniStream appliance IP address provided in the
command line that you specify, and then applies user role settings (for example, slice-size
settings, etc.) specific to the username.
l If nGeniusONE is configured to run on HTTPS/SSL and on a specific custom port, you must
configure the information in the <InfiniStream install>/config/pmauth.config file on the
InfiniStream appliance.
l To use InfiniStream appliance-based authentication when the nGeniusONE server is
unavailable, change ALLOWLOCALFAILOVER to TRUE in the <InfiniStream
install>/config/pmauth.config file on the InfiniStream appliance. Ensure that the user
name is configured in InfiniStream.
Default:
<PMAUTH>
<USEPMAUTH>FALSE</USEPMAUTH>
<PMIP></PMIP>
<PMPORT>8080</PMPORT>
<SNMPPORT>162</SNMPPORT>
<PMPORTSECURE>8443</PMPORTSECURE>
<ALLOWLOCALFALLBACK>TRUE</ALLOWLOCALFALLBACK>
<ALLOWLOCALFAILOVER>FALSE</ALLOWLOCALFAILOVER>
</PMAUTH>
Optionally, you can use the nGeniusONE console Packet Analysis > Data Mining module to
enter filter strings which allows you to verify that your filter syntax is correct (the filter field
background appears green), and then you can copy those filter strings and paste them in your
exportcliv2 command executions.
3. (Optional) Click joe_ipv4, then click to download the file as an .eflt file, then save the
file to your desktop.
4. Execute your exportcliv2 command in one of these ways:
l Using the filter string enclosed in quotation marks:
# ./exportcliv2 -u administrator -f "ip==10.1.1.1 AND port==1047
OR ip==10.1.1.2 AND port==1047" -h 192.168.1.1 3 2016-3-
1/18:00:00.000 2016-3-1/18:00:00.100
l Using the filter string enclosed in quotation marks and using symbols for the Boolean
operators:
# ./exportcliv2 -u administrator -f "ip==10.1.1.1 && port==1047
|| ip==10.1.1.2 && port==1047" -h 192.168.1.1 3 2016-3-
1/18:00:00.000 2016-3-1/18:00:00.100
l Using the file saved to your desktop (-F option is used):
# ./exportcliv2 -u administrator -F joe_ipv4.eflt -h 192.168.1.1
3 2016-3-1/18:00:00.000 2016-3-1/18:00:00.100
3. (Optional) Click joe_ipv6, then click to download the file as an .eflt file, then save the
file to your desktop.
4. Execute your exportcliv2 command in one of these ways:
l Using the filter string enclosed in quotation marks:
# ./exportcliv2 -u administrator -f "ip==ff02::1:2 OR
ip==ff02:0:0:0:0:0:1:2" -h 192.168.1.1 3 2016-3-1/18:00:00.000
2016-3-1/18:00:00.100
l Using the filter string enclosed in quotation marks and using symbols for the Boolean
operators:
# ./exportcliv2 -u administrator -f "ip==ff02::1:2 ||
ip==ff02:0:0:0:0:0:1:2" -h 192.168.1.1 3 2016-3-1/18:00:00.000
2016-3-1/18:00:00.100
l Using the file saved to your desktop (-F option is used):
# ./exportcliv2 -u administrator -F joe_ipv6 -h 192.168.1.1 3
2016-3-1/18:00:00.000 2016-3-1/18:00:00.100
B.2.2 nGeniusSQL
B.2.2.1 nGeniusSQL Command-line Scripts
NETSCOUT provides a means to use scripted SQL queries to obtain information about devices,
interfaces, servers, associated with your nGeniusONE server.
1. From the nGeniusONE server system, open a shell window or terminal console.
For Windows:
Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
For Linux:
Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Navigate to the <nGeniusONE Install>/rtm/bin directory.
3. Enter the following command:
For Windows:
# nGeniusSQL.bat sqlscripts\postgressql\<reportname>.sql result.txt
For Linux:
# ./nGeniusSQL.sh sqlscripts/postgressql/<reportname>.sql
result.txt
Where <reportname> is the script for the report you want to generate. You must provide
an output file name.
4. The results are written to the specified file in CSV format.
Available Scripts
Report Description
AllTableSize List size of tables in the data warehouse
DatabaseVersion Lists database version
DeviceCapabilities Lists devices and what they can monitor, for example, QoS,
RMON, etc.
DeviceDetails Lists all devices in the nGeniusONE Server including device names
and IP addresses.
DeviceDetailsSecure Lists all devices in the nGeniusONE Server including device name,
IP address, and community strings.
DeviceInventory Lists all device types.
ExternalAuthServers
GlobalSettings Lists details for all applications monitored by the nGeniusONE
Server.
Report Description
InterfaceDetails Lists all interfaces by device with descriptions.
InterfaceInventory Lists all interface types with descriptions.
MonitoredElements Lists all types of monitored elements and server processes.
Nfcprofiles
nGOneReport Lists report names, owners, and other report parameters.
NsaMetaInfo
pgStatActivity
ProbeInterfaceDetails Lists interface IP addresses and type details.
Scenes Lists names and details for UMC-based reports and templates.
ServerMap Lists server details such as port numbers and build numbers.
showLocks
showPID_Query Lists IDs for various server process queries, such as selecting
location keys or user names.
SwitchInterfaceDetails Lists interface name, IP addresses and other parameters.
Users Lists current user names and corresponding details.
B.2.3 ngconfigsync
B.2.3.1 Using the nGConfigSync Script
After you modify a property in the common.properties file, run the nGConfigSync utility to
propagate the change to all affected properties files. Changes are propagated to the following
files as required:
l <nGeniusONE install>/rtm/html/client.properties
l <nGeniusONE install>/rtm/bin/globalmanager.properties
l <nGeniusONE install>/rtm/bin/serverprivate.properties
l <nGeniusONE install>/rtm/bin/admin/serverpublic.properties
l <nGeniusONE install>/tomcat/bin/tomcat.properties
B.2.4 nscertutil
B.2.4.1 Using nscertutil
The nscertutil tool manages certificates on thenGeniusONE server. Located in the <nGeniusONE
install>/rtm/tools directory, nscertutil allows users to:
l Create and import a self-signed certificate
l Import a certificate from a custom CA (Certificate Authority)
l Import a certificate from a known CA
l Validates if the key and certificate match.
l Prevents importing duplicate aliases into the truststore.
l Supports the PKCS#1 key.
For Linux servers, use the nscertutil.sh script. For Windows users, use nscertutil.bat.
l Option 1 prompts you to enter the following information for the CA: Country, State Code,
City Name, Organization Name, Organization Unit, Host Name, Email Address and number
of days until expiration. For the certificate, you will be prompted to enter the following
information: Country, State Code, City Name, Organization Name, Organization Unit, Host
Name, Email Address and Alias. The tool supports the option of importing output files into
the appropriate directories/files in nGeniusONE .
l Option 2 lets you import a custom CA.crt, certificate and key into nGeniusONE .
l Option 3 lets you import a signed certificate and key into nGeniusONE.
l Options 5-8 let you add or import crt. or der. and clarify the format for each (ASCII Base64
and binary for cer. or .der).
l Option lets you 11 delete a certificate from the truststore.
l Option lets you 12 display any of the certificates in the truststore in human-readable
format.
l All servers in the deployment must use the same port number.
l If you are changing the server to a secured port, you must install a certificate. Use the
nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the managing
/ primary server, and then copying that truststore to the other nodes in the deployment.
B.2.5 nstool
B.2.5.1 Working with the Server Map Table
The server map table contains the structure of your cluster in XML format, with key details for
each node. Most of these details are onfigured in Server Management, which is the
recommended place to make changes to the cluster / server identity. If you need to change the
type of server, say from Standalone to Global, you can use the procedure below to modify the
structure. You can also view the structure for informational purposes. The XML tags are self
explanatory and can be helpful for the following:
l Identify the parent node of a child server. When a Standalone has been made a child node
or a Standby node, that child is displayed in the parent's Server Management GUI. So, from
the parent, the entire cluster is visible. The child node's Server Management GUI is
restricted to its own local environment, however, so the parent node for it is not displayed.
Since many configurations on a child node are read-only, such as Global Settings, you must
make those changes on the parent. If needed, you can view this file to locate the child's
parent server - search for the IP address of your child, then looking for the <parent_id> tag
in this file.
l Identify which server in a cluster has reported a logged alarm. The alarm ID includes a
server ID as part of the value (such as 1-1085554032642)
Since this critical file is in XML format, modifications to it must be validated. The utility below is
allows you to export, edit, and reimport with validation. If you only need to view the file, you can
skip using the utility and VIEW it (do not modify it) here: <nGeniusONE
install>rtm/database/configxml/xml/server_map.xml.
Important:
l Do NOT manually modify the production copy of the XML. If you believe the production
copy of the file is incorrect, you can delete it and restart the server processes. This
regenerates the file.
l Changes made with this procedure on the managing server are replicated to the child
servers.
l For a deployment with more than one server, start with the parent server first.
Otherwise you need to copy the modified map file to every child server and clear the old
map and import the modified map on every server in the cluster.
l Do NOT use this method to modify the port or any other entries in the file other than
the name and address. To modify a port number, instead refer to: websecure
1. Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Update /etc/hosts file with your changes to the nGeniusONE Server identity.
3. Save and exit the file.
4. Navigate to the <nGeniusONE install>/rtm/bin directory.
5. Stop the server.
6. Start the Server Map utility to export the current configuration:
# ./nstool.sh com.netscout.database.util.ServerTool
The following menu options display:
1. Change Server Type
2. Display the Server Map Table
3. Export Server Map Table
4. Import Server Map Table
5. Erase Server Map Table
7. Enter option 3 (Export Server Map Table).
The exported file is saved to <nGeniusONE install>/rtm/bin/Server_Map.xml.
8. (Optional) Copy this file to a backup location.
9. Open Server_Map.xml using a text editor, and locate the <server config> blocks with the
name and/or address that you want to change. Note that if you are modifying the values
for a Global Manager or Primary Server, you may need to locate the <server_config>
block for its companion LocalServer (with the same IP address), and repeat the edits.
Following is an example file, with some relevant blocks highlighted for readability.
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<ServerMap xsi:schemaLocation="http://www.netscout.com/server_map.xsd"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<server>
<server_info>
<id>1</id>
<name>GlobalManager</name>
<type>Global</type>
<status>UP</status>
<master>1</master>
<Time_Zone>US/Eastern</Time_Zone>
<registryBindnigName>MasterServiceManager</registryBindnigName>
</server_info>
<server_config>
<address>10.20.160.14</address>
<port>8080</port>
<protocol>HTTP</protocol>
</server_config>
<parents_details>
<parent_id>-1</parent_id>
<secondary_global_ids/>
</parents_details>
<Description>Global Manager</Description>
<Additional_Params>AlaramSupTime=3600,BackupCheckTimeout=3600</Additional_
Params>
<version_details>
<server_version>
<server_major_version>6.2.1.0</server_major_version>
<server_minor_version> Build 494 </server_minor_version>
</server_version>
<decode_version>
<decode_major_version>19.2</decode_major_version>
<decode_minor_version> Build 189 </decode_minor_version>
</decode_version>
</version_details>
<Licenses>
<License name="SDM" Eval="10-31-19"></License>
<License name="nEI" Eval="10-31-19"></License>
<License name="analytics" Eval="10-31-19"></License>
<License name="n1PM" Eval=""></License>
<License name="ng1UC" Eval=""></License>
</Licenses>
</server>
<server>
<server_info>
<id>2</id>
<name>LocalServer</name>
<type>Local</type>
<status>UP</status>
<master>0</master>
<Time_Zone>US/Eastern</Time_Zone>
<registryBindnigName>ServiceManager</registryBindnigName>
</server_info>
<server_config>
<address>10.20.160.14</address>
<port>8080</port>
<protocol>HTTP</protocol>
</server_config>
<parents_details>
<parent_id>1</parent_id>
<secondary_global_ids/>
</parents_details>
<Description>Local Server</Description>
<Additional_Params>AlaramSupTime=3600,BackupCheckTimeout=3600</Additional_
Params>
<version_details>
<server_version>
<server_major_version>6.2.1.0</server_major_version>
<server_minor_version>Build 494</server_minor_version>
</server_version>
<decode_version>
<decode_major_version>19.2</decode_major_version>
<decode_minor_version>Build 189</decode_minor_version>
</decode_version>
</version_details>
<Licenses>
<License name="SDM" Eval="10-31-19"></License>
<License name="nEI" Eval="10-31-19"></License>
<License name="analytics" Eval="10-31-19"></License>
<License name="n1PM" Eval=""></License>
<License name="ng1UC" Eval=""></License>
</Licenses>
</server>
<server>
<server_info>
<id>3</id>
<name>MySuperStandby</name>
<type>Standby</type>
<status>UP</status>
<master>0</master>
<Time_Zone>US/Eastern</Time_Zone>
<registryBindnigName>ServiceManager</registryBindnigName>
</server_info>
<server_config>
<address>10.20.160.13</address>
<port>8080</port>
<protocol>HTTP</protocol>
</server_config>
<parents_details>
<parent_id>2</parent_id>
<secondary_global_ids/>
</parents_details>
<Description>server_note</Description>
<Additional_Params>AlaramSupTime=3600,BackupCheckTimeout=3600</Additional_
Params>
<version_details>
<server_version>
<server_major_version>6.2.1.0</server_major_version>
<server_minor_version>Build 494</server_minor_version>
</server_version>
<decode_version>
<decode_major_version>19.2</decode_major_version>
<decode_minor_version>Build 189</decode_minor_version>
</decode_version>
</version_details>
<Licenses>
<License name="analytics" Eval="10-31-19"></License>
<License name="n1PM" Eval=""></License>
<License name="nEI" Eval="10-31-19"></License>
<License name="ng1UC" Eval=""></License>
<License name="SDM" Eval="10-31-19"></License>
</Licenses>
</server>
</ServerMap>
B.2.6 snmpv3script
B.2.6.1 Using the SNMPV3UserConfig Script
This script allows you to configure forwarding of alarms as SNMPv3 traps. Also see Configuring
SNMP Traps.
B.2.7 techsupp
B.2.7.1 Using the techsupp Tool
The nGeniusONE Server software uses log files to record transactions and events that occur
within the system. NETSCOUT provides a tool to generate a file that includes all log files and
system specifications, which Customer Support can use to help resolve issues.
Note: If the log files are very large, it's normal for the script to generate warning messages
and take several minutes to process.
1. For Windows:
Log in to the Windows server with an account that has administrator privileges. (Do not
use a cloned version of the Administrator account.)
For Linux:
Access the system command-line as the root user. If you have logged in as a different user
and assumed privileges with su, be sure to use su -l <root account> so that the full
environment is instantiated before you proceed.
2. Navigate to the <nGeniusONE install>/rtm/bin directory.
3. Execute the tool:
Windows — techsupp.bat [norm | html]
Linux — ./techsupp.sh [norm | html]
Where
l The norm option copies compressed logs into the <nGeniusONE install>/rtm/bin
directory
l The html option copies compressed logs into the <nGeniusONE install>/rtm/html
directory, then accessed by navigating to https://<nGeniusONE
install>/:8443/logfiles.html.
The filename reflects the date and time it was created. In the following example using
norm on a Linux server, the file was created on 05/20/2016 (20160520) at 1:21 p.m. (1321).
Gathering logs completed
Location: <nGeniusONE install>/rtm/bin
Filename: 20160520-1321-SERVER13-PMlogs.tar.gz
4. Contact Customer Support and attach the compressed output file to the ticket.
B.2.8 websecure
B.2.8.1 Changing the Web Access Port with websecure
Use the websecure script to change the port number for use with web communications between
user systems and the server. This script updates all related nGeniusONE configuration files and
is applicable for changing the server's web access port to 80, 8080, 443, 8443, or any non-well-
defined port greater than 1023. If you set a non-well-known port greater than 1023, firewall
changes are required. If your environment requires changing the web server to use any other
port, contact Customer Support.
Note:
l All servers in the deployment must use the same port number.
l The script used in this procedure modifies nGeniusONE files, not system files such as
/etc/sysconfig/iptables. If you modified iptables, which may be required for some
environments, you must update it separately.
l If you are changing the server to a secured port, you must also install a certificate. Use
the nscertutil tool to create and/or install a certificate.
l If you do use ncertutil, and your server is a child to another server (such as a Standby or
Secondary server), NETSCOUT recommends managing your certificates from the
managing / primary server, and then copying that truststore to the other nodes in the
deployment.
l Supports well-known, nonstandard HTTP (80, 8080) and HTTPS (443, 8443) ports.
Websecure accepts a port number in the command line. Ports 80 and 8080 can be
configured only for HTTP, ports 443 and 8443 only for HTTPS.
Procedure
1. For Windows: Log in to the Windows server with an account that has administrator
privileges. (Do not use a cloned version of the Administrator account.)
For Linux: Access the system command-line as the root user. If you have logged in as a
different user and assumed privileges with su, be sure to use su -l <root account> so that
the full environment is instantiated before you proceed.
2. Navigate to the <NETSCOUT install>/rtm/bin folder.
3. Run the following script:
Windows: # websecure.bat -protocol <HTTP|HTTPS> -port <port>
Linux: # ./websecure.sh -protocol <HTTP|HTTPS> -port <port>
Provide the protocol and port number you want the web service to use. The script
automatically restarts the server.
4. To verify your change, access the server with the new port number and/or by accessing
Server Management and viewing the port number in the General Information tab.
5. By default, NETSCOUT's servers ship with iptables configured to allow ports 80, 8080, 443,
and 8443. If you had customized your iptables to restrict any of these, modify it again to
accept the new port.
6. Repeat this procedure for all servers in the deployment, using the same port number.
Follow these steps to change the ports in a Global Manager (GM) or Dedicated Global Manager
(DGM) environment:
Validation:
You can use curl to validate the change without using a web browser, substituting http and https
as appropriate, and using the IP address:port number for the server you want to test.
# curl -I <http|s>://<server_ip_address:port>/ -k
If the port change was successful, you will see a response such as:
HTTP/1.1 200 OK
For example:
# curl -I https://10.20.160.14:8443/ -k
HTTP/1.1 200 OK
B.3 Ansible
NETSCOUT provides a base set of Ansible playbooks that lets you use Ansible to automate
deployment of nGeniusONE software to multiple hosts with a single command. You can use the
nGeniusONE Ansible Playbook to deploy nGeniusONE software to virtual or physical hosts
running any supported Linux versions.
B.3.1 Constraints
Consider these constraints for using Ansible with nGeniusONE:
l 6.3.2 is the baseline release. The Ansible package can be used for a fresh install of 6.3.2 or
an upgrade from 6.3.1 to 6.3.2.
l Only nGeniusONE, nGenius Performance Manager, and nGenius Configuration Manager
standalone are supported.
l Only Linux OS is supported. Windows OS is not supported.
l Ansible knowledge. NETSCOUT recommends that users acquire some basic Ansible
knowledge to optimize Ansible usage with nGeniusONE. See https://docs.ansible.com/.
B.3.2 Terminology
Term Definition
Ansible Simplest way to automate apps and IT infrastructure. Application Deployment +
Configuration Management + Continuous Delivery.
Inventory A collection of hosts that user wanted to manage via Ansible
Playbook A set of one or more tasks that Ansible executes on inventory
Controller The host from which the user runs Ansible playbooks
./ansible Path to which user extracted Ansible.
See these sections about using Ansible to automatically install nGeniusONE to multiple hosts :
nGeniusONE deployment with Ansible follows the standard NETSCOUT recommendation that
the Global Manager is used as the controller in an nGeniusONE deployment, but Ansible can be
installed on any server and used as a controller. Acquire the Ansible nG1_Ansible_<product
version>_<build#>.tar.gz file and transfer it to your controller host. The package can be
deployed, unzipped/ untarred to any path except the <nGeniusONE Install> directory or the
products install path.
python --version
#If your Python version is less then the required versions of 2.6
or 3.5 then update ...
# Start by making sure your system is up-to-date:
# This step is recommended by the Ansible documentation
yum update
Ansible #Check if you already have ansible installed and if not install
it.
ansible --version
#To get Ansible for CentOS 7, first ensure that the fedora 7 EPEL
repository is installed
yum install https://dl.fedoraproject.org/pub/epel/epel-release-
latest-7.noarch.rpm
#To get Ansible for Oracle Linux 8 or Red Hat 8, first ensure
that the fedora 8 EPEL repository is installed
yum install https://dl.fedoraproject.org/pub/epel/epel-release-
latest-8.noarch.rpm
# Install ansible
yum install ansible
Example: ./ansible/inventory.txt
# inventory file
#[controller]
#control ansible_connection=local
[globalmanager]
ng_gm_1 ansible_host=1.2.3.4 ansible_connection=local
[localserver]
ng_local_1 ansible_host=1.2.3.5
ng_local_2 ansible_host=1.2.3.6
[standby]
ng_standby_1 ansible_host=1.2.3.7
ng_standby_2 ansible_host=1.2.3.8
[standalone]
ng_standalone_1 ansible_host=1.2.3.9
ng_standalone_2 ansible_host=1.2.3.10
[standalonetype:children]
localserver
standby
standalone
[globalmanagertype:children]
globalmanager
[standalonetype:vars]
servertype=Standalone Server
[globalmanagertype:vars]
servertype=Global Manager
The first step is to generate an ssh key on the controller. This key is stored to the ~/.ssh folder
ssh-keygen -t rsa
The next step is to copy the public key to each remote host.
# Run below from controller on each NG1 server
ssh-copy-id <remote host IP>
Next, verify that your ssh setup is set. Below assumes you are in the ./ansible folder and your
inventory file is valid.
$ansible -m ping all
B.3.5.3 ansible.cfg
The ./ansible/ansible.cfg file defines properties used by Ansible and helps to reduce the number
of command line arguments.
[defaults]
# Setting inventory path here allows user to not have to define -i <path
to inventory file> on the command line
inventory = ./inventory.txt
#By default ansible will ssh to remote system as root, in the case that
is not allowed then comment out remote_user and uncomment become_user
# which means playbook will ssh as the current user and then su to root
once connected
remote_user=root
The Ansible commands can either be executed on the controller either as root or as an alternate
user. If the commands are not run as root, the same alternate username must be present on all
the servers in the inventory, and SSH keys must be set for that user. The sudoers files on all
servers, including the controller, must also be configured to allow the alternate user to execute
any command as root. The controller will SSH into the remote servers as the user executing the
command, but the command is executed using sudo on the remote server. This allows all
required nGeniusONE operations to be executed as root.
The mechanism for running commands as an alternate user is configured in the ansible.cfg file:
[privilege_escalation]
become=True
#become_method=sudo
#become_user=root
#become_ask_pass=False.
Running as a non-root user has the advantage that an audit log is kept for commands executed
via sudo.
B.3.5.4 Variables
Ansible variables are defined in ./ansible/vars/variables.yml as in the following examples.
# By default the package will be copied from the controller to the
remote host into the /opt folder. User can change this default behavior
by updating below variable
package_location: /opt
# Installation directory
netscout_home: /opt/NetScout
When executing these playbooks, the user will be prompted to enter an Ansible Vault password
to be used when storing the encrypted value. After the encrypted value is stored to the variables
file, the Ansible Vault password will be needed when executing playbooks that make REST API
calls. The "--ask-vault-pass" option can be specified when running the ansible-playbook
command to cause the user to be prompted for the Ansible Vault password that was used when
storing the encrypted values. Please see the Ansible documentation for other options for
supplying the Ansible Vault password.
B.3.5.5 Package
The Ansible package folder is in ./ansible/packages. Place your pm or nG1 bin file in this folder.
If you have not upgraded in some time, you may need to do one or more upgrade hops to get to
the final version and then place all necessary packages in this folder as all its contents are copied
to the remote hosts.
There may be a use case to apply a playbook to one or a set of servers defined in the inventory
file.
The following example limits the playbook to remote hosts to all servers under the localserver
group tag in the inventory file.
$ansible-playbook --limit localserver <playbook name>
For a full list of inventory wildcard options see the ansible documentation.
B.3.6.1 start.yml
The start.yml playbook starts the server given that it is already installed on the provided hosts.
This playbook does nothing if the server is already started.
This playbook passes only when all processes are successfully started or the server is already
started.
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
#This will start all hosts in the inventory file defined under
globalmanager, localserver, standby
#This will start all hosts in the inventory file defined under
globalmanager, localserver, standby
$ansible-playbook ./playbooks/start.yml
B.3.6.2 stop.yml
The stop.yml playbook stops all the servers defined in the inventory file. This playbook does
nothing if the server is already stopped. This playbook fails if there are ngenius processes
running on the host even after running the stop script.
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/stop.yml
B.3.6.3 uninstall.yml
The uninstall.yml playbook uninstalls the nGeniusONE server if all the processes are stopped on
that server. This playbook fails if ngenius processes are still running on that server.
Caution: This playbook removes the <install path>/NetScout folder once the uninstall is
complete. Ensure you back up prior if you need to maintain any data from this path
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/uninstall.yml
B.3.6.4 install.yml
The install.yml playbook installs nGeniusONE on all the servers defined in the inventory file. It
determines if nGeniusONE is already installed by checking if the
/var/adm/NetScout/nGeniusReg.properties file exists.
If the file exists, this playbook fails with the message, "nGeniusONE is installed already, please
un-install prior to installing a new build," for the host.
It also looks for the following files under /tmp directory and marks the task as a failure.
/tmp/missingfileexist.txt
/tmp/no_spaceinvar.txt
/tmp/no_enough_mem.txt
/tmp/no_enough_proc.txt
/tmp/abort_install.log
/tmp/ports_in_use.log
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/install.yml
B.3.6.5 deploy.yml
The deploy.yml playbook transfers one or more package files from the ./ansible/packages/*
folder to each targeted host.
The default remote host 'copy to' location is /opt, but this is configurable via the package_
location variable defined in ./ansible/vars/variables.yml
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
#This first example will deploy the package to all hosts defined in the
inventory file
$ansible-playbook ./playbooks/deploy.yml
By default the controller uploads the package file to only one host at a time to avoid overloading
the network. Set the maximum number of hosts the package is uploaded to simultaneously with
the throttle_package_upload value defined in ./ansible/vars/variables.yml
# throttle_package_upload - Limit the number of servers the package file
will be uploaded to simultaneously.
throttle_package_upload: 1
B.3.6.6 upgrade.yml
The upgrade.yml playbook upgrades an existing nGeniusONE on all the servers defined in the
inventory file. This playbook fails if ngenius processes are still running on that server.
The playbook verifies if the netscout_home defined in variables.yml matches with the PERFMGR_
PATH in /var/adm/NetScout/nGeniusReg.properties file. If they are different the task fails on the
remote host.
This playbook fails if the installed nGeniusONE version, build, and the current package being
installed are the same. If it is required to install the same build again, the property force_install:
true has to be set in variables.yml.
It also looks for the following files under /tmp directory and mark the task as failure.
/tmp/missingfileexist.txt
/tmp/no_spaceinvar.txt
/tmp/no_enough_mem.txt
/tmp/no_enough_proc.txt
/tmp/abort_install.log
/tmp/ports_in_use.log
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/upgrade.yml
B.3.6.7 full_install.yml
Prior sections documented how a user can perform an install step by step. The full_install.yml
combines all the building blocks into one playbook that executes the following steps that were
covered in more detail in the previous sections:
l stop.yml - Stops the application assuming it is installed and running otherwise it does
nothing and moves to the next step
l uninstall.yml - Uninstalls the appliction assuming it is installed otherwise it does nothing
and moves to the next step
l deploy.yml - Copies the product packaging to the remote host
l install.yml - Installs the product
l Note: This playbook does not call start.yml to start the server. Its expected the user will
need to apply licenses or properties manually first; therefore, start.yml must be called
manually after full_install.yml
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/full_install.yml
#Apply licenses or properties manually before start
$ansible-playbook ./playbooks/start.yml
B.3.6.8 full_upgrade.yml
Prior sections documented how a user can perform an upgrade step by step. The full_
upgrade.yml combines all the building blocks into one playbook that executes the following
steps that were covered in more detail in the previous sections:
l stop.yml - Stops the application assuming it is installed and running otherwise it does
nothing and moves to the next step
l deploy.yml - Copies the product packaging to the remote host
l upgrade.yml - Upgrades the product
l start.yml - Starts the server.
o Its possible that customer may have a new license or a property to configure during the
upgrade. If so user can call stop.yml, perform maintenance, and start.yml after the
install is completed.
#Usage below assumes inventory is defined and ssh access to all hosts is
working.
$ansible-playbook ./playbooks/full_upgrade.yml
#To apply licenses or properties manually
$ansible-playbook ./playbooks/stop.yml
#Apply licenses or properties manually and start
$ansible-playbook ./playbooks/start.yml
B.3.6.9.1 get-user-rest-key.yml
The get-user-rest-key.yml playbook configures REST API calls to be authenticated with a user key.
The user key to be used is retrieved using a REST API call using the nGeniusONE username and
password you supply.
The following variables must be defined on the command line when using this playbook:
l hostname - The IP address or hostname of the server from which the user key should be
retrieved.
l host_port - The HTTPS port to use for the REST call to retrieve the user key.
You are prompted for the nGeniusONE username and password to be used when retrieving the
user key, and the username of the user whose key needs to be retrieved.
You are also prompted to enter an Ansible Vault password to be used to encrypt the user key.
The Ansible Vault password is needed later when executing playbooks that make REST API calls.
The username and the encrypted user is stored in the vars/rest-auth.yml file.
B.3.6.9.2 set-rest-basic-auth.yml
You will also be prompted to enter an Ansible Vault password to be used to encrypt the
password. The Ansible Vault password will be needed later when executing playbooks that make
REST API calls.
The username and the encrypted password are stored in the vars/rest-auth.yml file.
Example: set-rest-basic-auth.yml:
$ ansible-playbook playbooks/set-rest-basic-auth.yml
Enter username to be used for REST API calls: administrator
Enter the password to be used for REST API calls:
...
TASK [encrypt password]
************************************************************************
************************************************************************
B.3.6.9.3 add-user.yml
The add-user.yml playbook makes a REST API call to add a user(s) to the nGeniusONE.
Fill out user information in JSON format in the file located at ./json/add_user.json. This file is used
as the request body for RESTful POST API call. See the nGeniusONE RESTful API guide for the
proper JSON format for adding a user(s).
The following variables must be defined on the command line when using this playbook:
l hostname - The IP address or hostname of the server we are adding users too. This is
generally the nG1 Global Manager or Standalone server.
l host_port - The HTTPS port to use for the REST call to retrieve the user key.
The vault password must be supplied when using encrypted credentials stored in vars/rest-
auth.yml as set by set-rest-basic-auth.yml or get-user-rest-key.yml. The vault password must
match the new vault password created when set-rest-basic-auth.yml or get-user-rest-key.yml
was executed.
# Note the --ask-vault-pass parameter below is required if you have chosen to encrypt the REST
Authentication info via set-rest-basic-auth.yml or get-user-rest-key.yml
Vault password:
...
B.3.6.9.4 add-device.yml
The add-device.yml playbook makes a REST API call to add a user to nGeniusONE.
Information for the user to be added must be filled out JSON format in the file located at
./json/add_user.json which will be used as the request body for RESTful POST API call. See nG1
RESTful API guide for proper format of json for adding a device(s).
The following variables must be defined on the command line when using this playbook:
l hostname - The IP address or hostname of the server. This is generally the nG1 Global
Manager or Standalone server. This is not the local server which would be defined in add_
user.json
l host_port - The HTTPS port to use for the REST call to retrieve the user key.
# Note the --ask-vault-pass parameter below is required if you have chosen to encrypt the REST
Authentication info via set-rest-basic-auth.yml or get-user-rest-key.yml
Vault password:
...
B.3.6.9.5 add-server.yml
The add-server.yml playbook will make a REST API call to add a server to the nG1.
Information for the server to be added must be filled out JSON format in the file located at
./json/add_server.json which will be used as the request body for RESTful POST API call. See nG1
RESTful API guide for proper format of json for adding a server(s).
The following variables must be defined on the command line when using this playbook:
l hostname - The IP address or hostname of the server from which the user key should be
retrieved. In general this is the NG1 Global Manager your adding a server too.
l host_port - The HTTPS port to use for the REST call to retrieve the user key.
# Note the --ask-vault-pass parameter below is required if you have chosen to encrypt the REST
Authentication info via set-rest-basic-auth.yml or get-user-rest-key.yml
Vault password:
...
This section describes how to install, configure, and upgrade the Splunk nGeniusONE
application. The Splunk nGeniusONE App supports Splunk v7.2.3 and v8.0.2. Contact your
NETSCOUT Sales Representative for information on obtaining Splunk application files.
tpAlarm.syslog.forward.host=<ip_address> or <FQDN>
In Global and Local distributed nGeniusONE deployments, syslog forwarding must be configured
on each Global and Local Server.
Notification Center events use UDP port 514 by default. To change it, use <ip_address>:<port_
number>, where <port_number> is the port to which you want Notification Center events sent.
B.4.2 Installing the Splunk nGeniusONE App on the Splunk Search Head
Complete these steps to install the Splunk nGeniusONE App on the Splunk Search Head:
1. In the Splunk application, click nGeniusONE in the left pane Apps list.
2. Click nGeniusONE in the tool bar. The Default page appears with a text area below the
"Enter and edit navigation menu XML configuration" title.
3. Inside the text area, find this line:
<a href="/manager/nGeniusONE
/data/ui/nav/default?uri=%2FservicesNS%2Fnobody%2FnGeniusONE%2Fdata
%2Fui%2Fnav%2Fdefault&action=edit&ns=nGeniusONE">Launch
nGeniusONE</a>
4. Replace the found line with this line:
<a href="https://<nG1_server_ip_address>:8443/">nGeniusONE</a>
where <nG1_server_ip_address> is the IP address of your nGeniusONE server.
5. Click Save.
4. Ensure your edited files are saved. Your configurations on the syslog server are complete.
5. Execute this command to restart the forwarder: <Splunkforwarder_install_
root>/bin/splunk restart
l The syslog server is listening on UDP port 514 (so it can process nGeniusONE events).
l The firewall on the syslog server allows UDP port 514 (so it can receive nGeniusONE
events).
B.4.5 Configuring Collection on the Splunk Search Head - Receiving Violation Events
from Notification Center over Port 514
Complete these steps to configure the receiving of Notification Center violations over port 514.
If you specifically configured a port other than 514 for violation events (see B.4.1 Configuring
nGeniusONE Notification Center Violations), ensure you use this procedure to configure that
port instead of port 514.
1. Open the Splunk App and use the tool bar options to navigate to Settings > DATA > Data
Inputs. The Data inputs page appears.
2. Click UDP in the Local inputs list. The UDP page appears.
Note: If UDP port 1514 exists in the UDP port list, use the associated Status column and click
Disable for port 1514.
Note: If UDP port 514 exists and has netscout:ngeniusone as the Source type, this
configuration procedure is not needed; do not continue this procedure.
Procedures for modifying the HTTP/S ports are provided separately in:
l For Client<->Server and Server<->Server: websecure
l For Server <->Data Source: Modifying Server to Data Source Communication Port
Important: Some ports are pre-configured in the server's iptables file. Other are used
dynamically and are not explicitly called configured in iptables. HTTP/S is used for most
communications in the deployment and that port can be customized (see below links).
NETSCOUT recommends you not modify or disable any other ports unless guided by
Customer Support.
l For Client<->Server and Server <-> Servers: websecure
l For Server <->Data Source: Modifying Server to Data Source Communication Port
Note: Older software versions used any one of 80, 443, 8080, or 8443 for HTTP/S
communications. However, recent server releases are configured to use either 8080 or 8443.
C.1.3.2 IPMI
Port Traffic/Purpose
22 SMASH via SSH
80 / 443 HTTP/S
623 (UDP) IPMI/ Virtual Media
901 (UDP) Video
5120 Virtual ISO or CD-ROM redirection
5123 Virtual floppy redirection
5900 Remote Console
8889 WS-Management
Server
Port Purpose
111 rpc Required for handling remote procedure calls
1099 rmi Used for internal lookups
5432 postgres Required database processes
6005 Xvfb Required for graphical operations
14300 paservice Required for certificate handling and packet analysis activities
1901-2074 assorted Required for internal process communication only
6005
8000-9100
Data Source
Port Purpose
111 Supports remote procedure calls
1024 Supports communication between localconsole utility and nsprobe agent process on data
1501 source
Use the sections and legend below to identify the processes for the servers in your deployment.
l Server Process Descriptions
l Server Processes by Server Type
Abbreviations:
1. Go to Control Panel > All Control Panel Items > Administrative Tools > Services
2. Confirm that all nGeniusONE Windows services are registered correctly.
Table D.1 - nGeniusONE Windows Services
Abbreviations:
PROCESS NAME STA CLO SBY NGF GM DGM NCM SCI NSA SCS
Core Processes
NGeniusNativeService.exe
• • • • •
(Windows only)
NGeniusService.exe
• • • • •
(Windows only)
NSnGeniusNative • • • • • • • • •
PROCESS NAME STA CLO SBY NGF GM DGM NCM SCI NSA SCS
NSRemoteAdmin • • • • • • • • • •
NSRmiregistry • • • • • • • • • •
httpd (Apache.exe
• • • • • • • • • •
on Windows)
postgres • • • • • • • • • •
Xvfb • • • • • • • • • •
nspmhwmon • • • • • • • • •
dengine • • • • • • • •
paservice • • • • • • • • • •
Analytic / Logging Processes
NSNG1Content • • • • • • • • •
NSWebxContent • • • • • • • • • •
NSASI2xCatchupL • • • • •
NSASI2XLogger • • • • •
NSHealthLogger • • • • • •
NSLogger • • • •
NSASI2XSWarehouse • • • • • • • •
NSWebxServiceWa • • • • •
NSAnalytics • • • • •
NSASIIndexing • • • • • • •
NEITomcat • • • • • • •
NSSituation • • • • •
NSUCContent • • • • • •
NSWebxReportGen • • • • •
Distributed Server Processes
Present only when the server is licensed accordingly.
NSWebxGMAnalyti • • • • •
NSWebxGMContent • • • • • • • •
Legacy Application Support
Applicable only for deployments configured to support CDM flows.
NSWebXPresent • • • • •
NSCDMFlowLogger • • •
NSFlowRollup • • • •
NSWarehouse • • • •
NSFDSIndexing • • • • •
Specialized Server Support
Applicable only for the indicated servers.
NSArborThreatAn •
NSNSAContent •
NSLoadBalancer • •
PROCESS NAME STA CLO SBY NGF GM DGM NCM SCI NSA SCS
NSSCSContent •
NSDigitCache(1-N) •
Note: In many cases, parameters have a default that is applied internally even when not present
in the property file. Removing a parameter from a file has the effect of setting it to the default.
Restart requirement: Certain parameters require only a client logout; others require a server
process restart.
Scope: Settings in this file apply to the current nGeniusONE modules and also legacy modules
such as nGenius Performance Manager.
rtm.user.password.enforce.AlphaNumericValidation.minimum.uppercase 1
rtm.user.password.enforce.SpecialCharacterValidation true
rtm.user.password.enforce.SpecialCharacterValidation.minimum.specialCh 1
aracter
rtm.user.password.enforce.consecutiveCharacter.maximum 2
rtm.user.password.enforce.repeatCharacter.maximum 2
rtm.user.password.enforce.CaseSensitiveValidation true
avs.viewtype Advanced Voice Statistics v0
Monitor can be toggled to
present results in different
modes.
v0 : Displays SIP for all
transport (SIP, SIP_T(CP),
SIP_SCTP), as SIP
v2: Displays rows for SIP
transport
console.useractivity.timeout Set the number of minutes 15
after which a user display is
prompted and logged out
due to inactivity.
deviceConfig.UUID.enable= Enables or disables (default) false
visibility of:
l UUID column and
associated data in
Device Configuration >
Devices listing page.
l UUID entry field in
Device Configuration >
Devices > Modify
Device page.
l UUID and associated
data in Deployment >
Activity Logs.
Note: In many cases, parameters have a default that is applied internally even when not present
in the property file. Removing a parameter from a file has the effect of setting it to the default.
Scope: Settings in this file apply to the current modules and also legacy modules.
Replication requirement:
l Certain parameters in this file must be replicated to other configuration files on the same
server. This can be automated with the nGConfigSync.sh / nGConfigSync.bat file. That script
only modifies the local server, see note below.
l Changes made in this property file are not replicated to child servers in the cluster. You
must manually replicated changes here to all child servers in the cluster except to the
Standby Server, to which changes are replicated automatically.
serviceManager.userAccountLockup.enabl
ed is set to true
serviceManager.userAccount.maxLoginAttempts Sets the number of unsuccessful entries of 6
the password on logging in before the user
account is locked for logging in from the
same client machine. The above parameter
sets the interval before the account is
unlocked.
Note: This parameter is not activated
unless the
serviceManager.userAccountLockup.enabl
ed is set to true
1 FRESH_SSL 1.0
2 FRESH_SSL 2.0
3 FRESH_SSL 3.0
4 FRESH_TLS 1.0
5 FRESH_TLS 1.1
6 FRESH_TLS 1.2
7 FRESH_TLS 1.3
8 RESUMED_SSL 1.0
9 RESUMED_SSL 2.0
10 RESUMED_SSL 3.0
11 RESUMED_TLS 1.0
12 RESUMED_TLS 1.1
13 RESUMED_TLS 1.2
14 RESUMED_TLS 1.3
Note: In many cases, parameters have a default that is applied internally even when not present
in the property file. Removing a parameter from a file has the effect of setting it to the default.
Scope: Settings in this file apply to the current nGeniusONE modules and also legacy modules.
Replication requirement:
l Certain parameters in this file must be replicated to other configuration files on the same
server. This can be automated with the nGConfigSync.sh / nGConfigSync.bat file. That script
only modifies the local server, see note below.
l Changes made in this property file are not replicated to child servers in the cluster. You
must manually replicated changes here to all child servers in the cluster, except standby
(automatic).
Note: In many cases, parameters have a default that is applied internally even when not present
in the property file. Removing a parameter from a file has the effect of setting it to the default.
Scope: The properties in this file are primarily applicable to legacy clients such as nGenius
Performance Manager. As of v6.2.2, the nGenius Session Analyzer software uses this file as well.
Note: In many cases, parameters have a default that is applied internally even when not present
in the property file. Removing a parameter from a file has the effect of setting it to the default.
Restart requirement: Refresh of the client web browser is optimal for most options; server
restart typically not required for these.
Scope: The settings in this file are applicable primarily to nGenius UC Server modules.
When you enable this alarm (through a property setting), the alarm engine works in the
background to check for impending certificate expiration. If any certificate has days remaining
less than a default or custom threshold, an alarm is generated.
You can see these alarms in the Notification Center under the category of “Certificate Expiration”
and drill down from them to the Certificate Monitor.
To enable emails for situations, set the following property with email addresses in the
serverprivate.properties file: situation.analysis.email.recipient.list=address1,address2,etc..
After the property is enabled, recipients will receive a single email for any situation that occurs.
The email contains a description and a PDF attachment for the situation evidence.
Note: You must also provide your Outgoing SMTP Server the nGeniusONEserver's Server
Management Email Settings tab.
l <nGeniusONE install>/rtm/bin/admin/serverpublic.properties
l <nGeniusONE install>/tomcat/bin/tomcat.properties
Users can now log out and back in to use the Export to WAV option from the export menu of
Single Call view and Streams view.
Before installing this appliance, please refer to compliance and safety warnings, available online
at: http://www.dell.com/learn/us/en/uscorp1/regulatory-compliance
Rear
Front
Status: These icons Illuminate amber if there is an issue with the corresponding component.
Drive Status
In addition to the drive status icon on the left panel of the appliance, each disk has an activity
and status indicator. In this case, the database icon represents activity. The heartbeat icon
represents status, with the following meanings:
l Solid green: Drive is online
l Off: Drive may be ready for removal. Note that during initial boot, other drives in the array
may be initializing so this indicator remains off until all drives are initialized.
l Flashing green - slowly: Drive is rebuilding
l Flashing green - twice per second: identifying drive or preparing for removal
l Flashing green, then amber, then off: Predicted drive failure
l Flashing green - for three seconds, amber for three seconds, then off after six
Feature Value
Chassis 2U rack mountable chassis without bezel
(W 17.1" x D 26.72 x H 3.4")
Height 3.4 in (86.36 mm)
Width 17.09 in (434 mm)
Depth 26.72 in (678.8 mm)
Weight 63.05 lbs (28.6 kg)
(Maximum Configuration)
Temperature (Operating) 10°C to 35°C (50°F to 95°F)
Recommended ambient temperature is 30°C
Power Supplies 100-240 VAC/10-5A, 50/60Hz
(per module) Maximum consumption 2891 BTU/hr