In the SNMP Server boxes, enter the IP addresses of up to three SNMP (Simple Network Management Protocol - version 2c) servers on your network. After you have configured at least one SNMP server you will be able to send SNMP traps whenever an alarm is triggered. For more information, see “Issuing SNMP traps” in the Foglight Experience Monitor User Guide.
You must also enter the community identifier that the system uses to send SNMP traps. The two links, at the bottom of the page, give you access to the SNMP (Version 2) Structure of Management Information file and the Management Information Base (MIB) file.
This section contains additional network configuration settings.
In the Syslog server IP box, type the IP of a server running syslog that receives all of the configuration log messages that are generated on the appliance whenever a change is made to configuration. This facility allows you to monitor configuration changes that are made on the appliance to detect possible violations of your site's security or administrative policies.
Traceroutes can be assigned as actions that occur when an alarm is triggered. For more information, see “Perform traceroutes” in the Foglight Experience Monitor User Guide.
The User Accounts page enables you to manage user accounts and user account options. You can access this page by clicking Configure > Appliance > User Accounts.
For Foglight users who want the ability to view reports in the appliance, you must set up a user account that matches the login name used in Foglight. To complete the integration process, you must also setup the Foglight server IP and port on the Configure > Appliance > Network Settings page. For more information, see Foglight Management Server.
For more information, see these topics:
In order to connect to the Foglight Experience Monitor console to view Report Sets, create alarms, and view metric data, users require accounts. These are managed on the User Accounts page, accessed by clicking Configure > Appliance > User Accounts. Each user account offers a private workspace in which the user can manage and customize a personalized group of report sets and snapshots.
The SSH Access and DB Access columns provide a quick way to determine whether any users have SSH or database access enabled, in which case SSH port (22) or SQL database port (3306) are currently open on the appliance.
It is strongly recommended that you create individual user accounts rather than reusing the default admin account. If more than one user logs into the admin account, conflicts may arise.
A valid login name must adhere to the following guidelines:
|
|
|
|
1 |
2 |
3 |
TIP: A message appears to the right of the Password box, providing information about the strength level of the password you enter. |
4 |
Select an option from the Type list. |
Power Users have access to all features except those related to configuring, maintaining, and updating the appliance, the database, the appliance software, and user accounts. In the web console, the Configure > Appliance menu (which contains the restricted tasks) is removed. | |||
Similar to the Power User role except that Secured Power Users cannot run auto-discovery functions that can expose sensitive customer data. This includes session identifier auto-discovery, login variable auto-discovery, and variable rule auto-discovery. | |||
Assign this role to users who need to do the following tasks only:
| |||
Assign this role to users who need to do the following tasks only: |
5 |
To allow this user to log in to the web console, select the web console access enabled check box. |
6 |
To allow this user to establish an SQL connection with the appliance database, select the Remote database access enabled check box. |
7 |
To allow this user to log in using a physical terminal (or KVM device) attached to the appliance, select the Terminal access enabled check box. |
8 |
To allow this user to establish an SSH session with the appliance, select the Secure shell (SSH) access enabled check box. |
9 |
To allow this user to view User Session metrics (that is, metrics gathered about users who are accessing applications that the appliance is monitoring), select the Allow access to User Session metrics check box. |
10 |
If the user requires a Section 508-compliant user interface, select the Use Section 508 compliant settings check box. |
12 |
Click OK to save the new user profile. |
1 |
Click Configure > Appliance > User Accounts. |
2 |
In the User Accounts page, click Export Users. |
1 |
Click Configure > Appliance > User Accounts. |
2 |
In the User Accounts page, click Import Users. |
3 |
Click Browse. Navigate to and select the ZIP file you exported from the other appliance. |
4 |
Click Import. |
Existing user accounts can only be removed by a user whose own account is of type Administrative.
3 |
Click Delete. |
Existing user accounts can only be edited by a user whose own account is of type Administrative.
1 |
On the User Accounts page, click the Edit link beside the account name, in the Settings column. |
2 |
3 |
4 |
To allow this user to log in to the web console, select the web console access enabled check box. |
5 |
To allow this user to establish an SQL connection with the appliance database, select the Remote database access enabled check box. |
6 |
To allow this user to log in using a physical terminal (or KVM device) attached to the appliance, select the Terminal access enabled check box. |
7 |
To allow this user to establish an SSH session with the appliance, select the Secure shell (SSH) access enabled check box. |
8 |
To allow this user to view User Session metrics for the user account (metrics gathered about users who are accessing applications that the appliance is monitoring), select the Allow access to User Session metrics check box. |
9 |
If the user requires a Section 508-compliant user interface, select the Use Section 508 compliant settings check box. |
10 |
Click OK to save the edits made to the user’s profile. |
1 |
On the User Accounts page, click Edit beside the account that has been locked, in the Settings column. |
2 |
Click Unlock Account. |
3 |
Click OK to save the edits made to the user’s profile. |
Existing user account passwords can only be edited by a user whose own account is of type Administrative.
1 |
On the User Accounts page, click the Edit link beside the account name, in the Password column. |
2 |
IMPORTANT: The password creation rules you must follow depend on whether the Enforce strong passwords option is enabled on the main User Accounts page. For a description of the strong and standard policy, see Global user account options. |
3 |
Click OK. |
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center