CA NetQoS Multi Port Collector User Guide User_Guide
User Manual: User_Guide user guide pdf - FTP File Search (7/20)
Open the PDF directly: View PDF
.
Page Count: 129
| Download | |
| Open PDF In Browser | View PDF |
CA NetQoS Multi-Port Collector User Guide Version 2.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. The use of any software product referenced in the Documentation is governed by the applicable license agreement and such license agreement is not modified in any way by the terms of this notice. The manufacturer of this Documentation is CA. Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. Copyright © 2011 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. CA Technologies Product References This document references the following CA Technologies products: ■ CA NetQoS SuperAgent ■ CA Application Performance Management (APM) ■ CA Customer Experience Manager (CEM) ■ CA NetQoS NetVoyant ■ CA NetQoS Performance Center ■ CA Transaction Impact Manager (TIM) Contact CA Technologies Contact CA Support For your convenience, CA Technologies provides one site where you can access the information you need for your Home Office, Small Business, and Enterprise CA Technologies products. At http://ca.com/support, you can access the following: ■ Online and telephone contact information for technical assistance and customer services ■ Information about user communities and forums ■ Product and documentation downloads ■ CA Support policies and guidelines ■ Other helpful resources appropriate for your product Providing Feedback About Product Documentation If you have comments or questions about CA Technologies product documentation, you can send a message to techpubs@ca.com. If you would like to provide feedback about CA Technologies product documentation, complete our short customer survey, which is available on the CA Support website at http://ca.com/docs. Contents Chapter 1: What is Multi-Port Collector? 9 Support for SuperAgent ............................................................................................................................................. 10 Packet-Capture Investigations ............................................................................................................................ 11 Architecture for SuperAgent Support ................................................................................................................. 12 Comparison with the SuperAgent Standard Collector ........................................................................................ 13 Overview of SuperAgent Data ............................................................................................................................. 14 Support for Transaction Impact Manager .................................................................................................................. 15 Chapter 2: Post-installation Configuration Tasks 17 Log In to the Web Interface ....................................................................................................................................... 17 Configure a Trusted Internet Site ............................................................................................................................... 18 Change the Password of the Administrator Account ................................................................................................. 18 Verify Packet Flow Through Ports .............................................................................................................................. 19 Configure Logical Ports ............................................................................................................................................... 19 Use Hardware Filters to Manage Data ....................................................................................................................... 21 What is Packet Slicing? ........................................................................................................................................ 22 What are the Default Hardware Filters? ............................................................................................................. 22 Configure a Hardware Filter ................................................................................................................................ 23 Use Regular Expressions for Precise Filtering ..................................................................................................... 25 Configure Multi-Port Collector as a Collection Device for SuperAgent ...................................................................... 28 Verify Logical Port Status in SuperAgent ............................................................................................................. 30 Review TCP Session Information ......................................................................................................................... 31 Install the TIM Software ............................................................................................................................................. 32 Set Global Application Preferences ............................................................................................................................ 33 Create SNMP Traps .................................................................................................................................................... 35 SNMP Trap Severity Levels .................................................................................................................................. 36 Change Trap Behavior ......................................................................................................................................... 38 What are Users and Roles? ........................................................................................................................................ 39 User Account Information ................................................................................................................................... 40 Change the Properties of a User Account ........................................................................................................... 40 Role Information ................................................................................................................................................. 42 Product Permissions............................................................................................................................................ 43 Chapter 3: Analyzing Data 47 What is an Analysis? ................................................................................................................................................... 48 Analysis Menu ..................................................................................................................................................... 48 Contents 5 Predefined Analyses ............................................................................................................................................ 49 Create a Custom Analysis .................................................................................................................................... 51 Duplicate an Analysis .......................................................................................................................................... 52 Delete a Custom Analysis .................................................................................................................................... 52 Data Views .......................................................................................................................................................... 53 Use Filters to Customize Data in the Display Area ..................................................................................................... 55 View the Current Filter Conditions...................................................................................................................... 56 Analysis Filters ..................................................................................................................................................... 57 Global Filters ....................................................................................................................................................... 65 Understand the Data in the Display Area ................................................................................................................... 67 Types of Charts .................................................................................................................................................... 68 Types of Data ...................................................................................................................................................... 71 Export Data to a PDF File..................................................................................................................................... 80 Export Data to a CSV File ..................................................................................................................................... 81 Export Data to a PCAP File .................................................................................................................................. 82 Share Data by Email ............................................................................................................................................ 84 Chapter 4: Multi-Port Collector Health and Maintenance 85 System Status ............................................................................................................................................................. 85 System Information ............................................................................................................................................. 86 Process Information ............................................................................................................................................ 86 Database Status .................................................................................................................................................. 87 Capture Card Physical Port Status ....................................................................................................................... 88 Capture Card Logical Port Status......................................................................................................................... 88 Capture Card Physical Port Statistics .................................................................................................................. 89 RAID Status Information ..................................................................................................................................... 90 File Systems ......................................................................................................................................................... 91 Memory ............................................................................................................................................................... 92 CPU ...................................................................................................................................................................... 92 Maintenance Tasks ..................................................................................................................................................... 93 Upgrade Software ............................................................................................................................................... 93 Stop or Restart a Process .................................................................................................................................... 94 Review System Logs ............................................................................................................................................ 94 Generate a Support File ...................................................................................................................................... 95 Database Status and Usage ................................................................................................................................. 96 Purge Data from the Database ............................................................................................................................ 97 Log In to the Appliance ....................................................................................................................................... 99 System Setup ............................................................................................................................................................ 100 Machine Settings ...................................................................................................................................................... 101 Network Setup .................................................................................................................................................. 101 Choose the Time Zone ...................................................................................................................................... 102 6 User Guide Shut Down or Restart the Appliance ................................................................................................................. 102 Chapter 5: Troubleshooting 103 Capture Card Clock Differs from System Clock ........................................................................................................ 103 Time Range Exceeds Raw Packet Retention Time .................................................................................................... 103 Appendix A: Best Practices for Deployment 105 Appliance Placement ................................................................................................................................................ 105 Port Mirroring .......................................................................................................................................................... 105 Port Requirements ................................................................................................................................................... 108 Packet Deduplication ............................................................................................................................................... 109 Appendix B: Integration with SuperAgent 111 Collection Device Incidents ...................................................................................................................................... 111 Enable Collection Device Incidents ................................................................................................................... 112 Respond to an Inactive Collection Device Incident ........................................................................................... 113 Support for Special Initialization (.ini) Files .............................................................................................................. 114 Eliminate Duplicate Packets .............................................................................................................................. 115 Filter Out Keep-Alive Messages ........................................................................................................................ 116 How to Monitor in a WAN-Optimized Environment ................................................................................................ 118 SuperAgent Support for Cisco WAAS ................................................................................................................ 118 How Multi-Port Collector Integrates with a WAN Optimization Device ........................................................... 119 The SuperAgent Optimization Report ............................................................................................................... 120 Sharing Data from WAN Optimization Devices ................................................................................................. 120 Appendix C: Command Line Syntax 123 Appendix D: Regular Expression Syntax 125 Index 127 Contents 7 Chapter 1: What is Multi-Port Collector? CA NetQoS Multi-Port Collector is a powerful appliance that captures session-level packet data from a monitored data center. The appliance captures the data for reporting in CA NetQoS SuperAgent and CA Application Performance Management (APM). ■ Data from TCP packet headers help SuperAgent monitor end-to-end performance to measure application response time. ■ Data from full HTTP packets help APM map transactions in your environment to monitor the end-user experience and measure service-level agreements. By passively monitoring large volumes of data center traffic from multiple ports, Multi-Port Collector helps keep a continuous record of end-to-end system performance. Packet headers from all traffic passing through the monitored mirrored ports are recorded and stored on Multi-Port Collector for a short time. Data taken from 1-minute reporting intervals is kept for a few days and provided for analysis. Metrics are forwarded to SuperAgent for reporting or to CA Transaction Impact Manager, for reporting in APM. Charts and tables in a Multi-Port Collector analysis show per-host activity and performance data, with multiple views of sessions, volume statistics, and response times. An analysis also offers work flows for troubleshooting, several options for exporting data, and filtering options to help IT staff diagnose and respond to issues. Multi-Port Collector offers features to monitor its functionality. ■ Hardware-based filtering and packet-capturing options per logical port. ■ Hardware filters to calibrate performance and capture only the data of interest. ■ Multiple data feeds administered from a single web page. ■ SNMP traps send an automatic notification when errors occur that can affect data collection or capture. Multi-Port Collector includes the following components: Appliance Hardware and software that monitor traffic that flows into and out of a switch. Performs the following functions: ■ Captures packets and writes them to storage. ■ Collects traffic statistics and analyzes packets for performance information. Chapter 1: What is Multi-Port Collector? 9 Support for SuperAgent ■ Stores statistical data about network, server, and application performance in a high-performance database. ■ Sends statistical data to TIM or the SuperAgent management console for reporting and analysis. Web interface An administrative interface, accessible from a web browser, that lets you: ■ View appliance statistics, including drive, CPU, and capture card status. ■ Configure system settings, such as port definitions, filtering options, and secure user accounts. ■ View, filter, and sort performance data based on captured packets and presented in formatted charts and tables. ■ Review locally stored session-level data on the Analysis tab. This section contains the following topics: Support for SuperAgent (see page 10) Support for Transaction Impact Manager (see page 15) Support for SuperAgent The Multi-Port Collector appliance aggregates and exports metrics to one SuperAgent management console in a format compatible with a SuperAgent standard collector. The appliance collects more data, faster, than multiple standard collectors. The appliance is an alternative for enterprises that require high-volume monitoring with more flexibility and less overhead. The appliance stores packets to let you perform enhanced packet-capture investigations in SuperAgent. With a standard collector, these investigations capture only the packets that are sent after the investigation is initiated. By contrast, the capture files stored on the appliance let you perform a forensic analysis of a performance issue. With Multi-Port Collector and the management console, you can: 10 User Guide ■ Process a network throughput rate equivalent to multiple standard collectors. ■ View data at 1-minute granularity, and select from multiple chart types. ■ Generate packet-capture investigation files taken at the time the incident occurred, and store those files for up to 90 days. ■ Perform rapid, accurate detection of networks, servers, and applications. ■ Configure the items specified by inclusion rules in the management console and send data about the appropriate items to SuperAgent. ■ Track TCP sessions on multiple switches, and drill down into detailed metrics from a high-level SuperAgent summary report. Support for SuperAgent ■ Leverage multiple filtering and sorting capabilities to analyze the available data and rapidly isolate problem hosts. ■ Create and save analyses, which are troubleshooting work flows that combine frequently used filtering and reporting options. ■ Export packet-capture files in PCAP format and send them to IT Engineering staff for further analysis. ■ Monitor a Cisco Wide-Area Application Services (WAAS) environment without installing a separate Aggregator appliance. ■ Calculate response time metrics from the packet digest files provided by GigaStor. More information: Configure Multi-Port Collector as a Collection Device for SuperAgent (see page 28) Integration with SuperAgent (see page 111) Packet-Capture Investigations SuperAgent automatically runs packet-capture investigations in response to a network or server performance incident. These investigations increase the granularity of performance metric analysis by automatically recording packet-level data that can then be further analyzed. When such investigations are performed with the SuperAgent standard collector, the captured data may not include the traffic of interest. A packet-capture investigation performed by the Multi-Port Collector appliance is far more comprehensive. The short-term packet storage capabilities of the appliance let packet-capture investigations provide details of the traffic that was flowing at the time the incident occurred. Options for capture and collection let you inspect the packet headers or the entire packet, according to your preferences. By default, the appliance stores packet-capture investigation files for 90 days. To access them, log in to the SuperAgent management console and navigate to the Packet Capture Investigations report. Click the Incidents tab to see a link to the Investigations Report page. When a GigaStor is assigned to an appliance as a collector feed, it sends periodic packet digests to the appliance for aggregation. In the presence of a GigaStor, SuperAgent packet-capture investigations are based only on packets stored on GigaStor. Chapter 1: What is Multi-Port Collector? 11 Support for SuperAgent Architecture for SuperAgent Support The following illustration depicts Multi-Port Collector architecture and configuration to support SuperAgent. The Multi-Port Collector appliance works within a typical SuperAgent distributed configuration, with network connectivity to the SuperAgent management console server. Depending on the configuration you purchased, one appliance can be connected to mirror ports on as many as eight separate switches. The appliance sends data from the monitored switches to the management console, where it is included in all SuperAgent reports. 12 User Guide Support for SuperAgent Comparison with the SuperAgent Standard Collector The following table summarizes the most significant differences between the SuperAgent standard collector and Multi-Port Collector: Feature Standard Collector Multi-Port Collector Monitors multiple mirrored switch ports No Yes Offers availability monitoring of servers, applications, and networks Yes Yes Offers self-monitoring and alerting Yes Yes. The SuperAgent Inactive Collection Device incident is supported. Additional alerting provided by SNMP traps. Monitors URLs Yes No Supports investigations from Yes the SuperAgent management console Yes. Enhanced packet-capture investigations are supported. Collects all SuperAgent metrics Yes Yes Supports automatic configuration of servers, applications, and networks Yes Yes Duplicate packets (from a Yes, after extra mirrored VLAN, for example) configuration. are ignored Yes, automatically. Provides performance data at 1-minute granularity No Yes Filters and displays captured No data for the host, server, or application you specify Yes Receives packet digest data from Cisco Wide-Area Application Engine device Yes Yes Receives packet digest data from GigaStor device Yes Yes Chapter 1: What is Multi-Port Collector? 13 Support for SuperAgent Feature Standard Collector Multi-Port Collector Supports SuperAgent management console on 64-bit operating system Yes Yes. SuperAgent must be running on 64-bit operating system to be compatible with Multi-Port Collector. Overview of SuperAgent Data The SuperAgent product documentation provides information for interpreting report data and diagnosing issues that stem from a monitored network, server, or application. The metric that serves as a starting point for any troubleshooting activity is transaction time, another term for response time. A transaction consists of the following: ■ a single request and a single server response ■ one period of data transfer ■ one or more acknowledgments ■ observed latency caused by retransmitted packets SuperAgent data identifies performance from the network perspective. Corresponding data in an analysis highlights activity and performance data with multiple views of TCP sessions, volume statistics, and response times. As you investigate a performance issue, consider the transaction time and related metrics, such as throughput. Note: Session-level performance data is available only for the port mirror data received on the Multi-Port Collector logical ports. Session level data is not available for the packet digest data received from GigaStor or WAE devices. The basic process is as follows: 14 User Guide ■ Click Session Analysis in a SuperAgent report. ■ The management console passes information to Multi-Port Collector to identify the context and time frame of the data for the selected network, server, or application. ■ In a separate browser window, the web interface opens to the Analysis page. Data is filtered to display relevant performance data for the selected context. The graphs in an analysis look different from the graphs displayed in SuperAgent because Multi-Port Collector data is available in 1-minute increments. The smallest SuperAgent reporting interval is 5 minutes. Support for Transaction Impact Manager Averaging of metrics is also different because of the different reporting interval lengths. Your configuration determines whether data displayed in the analysis appears in the management console. For example, data from networks that are not defined in SuperAgent is available only in the analysis. ■ You can apply additional filters, select different chart formats, change the time frame, and save custom analyses. Support for Transaction Impact Manager Multi-Port Collector captures HTTP packets for Transaction Impact Manager (TIM). ■ TIM passively monitors traffic from mirrored ports ■ TIM records HTTP and HTTPS packets to identify user logins and related transactions for Customer Experience Manager (CEM) and Application Performance Management (APM) ■ TIM performs Secure Sockets Layer (SSL) decoding When TIM is installed on Multi-Port Collector, the resulting converged appliance provides visibility into the application and network-level data of application usage per user. As a standalone appliance, TIM monitors HTTP transactions in real-time and immediately generates defects for any anomalies it detects. Multi-Port Collector provides session-level data at 1-minute intervals. With the converged appliance, this finer granularity of data can be used to investigate the defects detected by TIM. You can drill down from defects in the APM console to data in the Multi-Port Collector web interface. The web interface lets you perform TIM-related administrative and maintenance tasks. Chapter 1: What is Multi-Port Collector? 15 Support for Transaction Impact Manager The following diagram shows the components in a network in which Multi-Port Collector, APM, and SuperAgent are installed. As shown in the diagram, Multi-Port Collector can support TIM and SuperAgent simultaneously. In this scenario, packets for TIM and SuperAgent are processed in parallel. Separate RAM disks help buffer packets for both applications. ■ For SuperAgent, Multi-Port Collector provides all packets with headers only. ■ For TIM, Multi-Port Collector provides filtered HTTP packets with a full payload. More information: What are the Default Hardware Filters? (see page 22) Install the TIM Software (see page 32) 16 User Guide Chapter 2: Post-installation Configuration Tasks The Multi-Port Collector appliance is designed to run with minimal configuration. However, the Administrator can organize, secure, and customize the system. After you install the hardware and the Multi-Port Collector software, perform the tasks discussed in this section. Note: Installation tasks are discussed in the CA NetQoS Multi-Port Collector Installation Guide. This section contains the following topics: Log In to the Web Interface (see page 17) Configure a Trusted Internet Site (see page 18) Change the Password of the Administrator Account (see page 18) Verify Packet Flow Through Ports (see page 19) Configure Logical Ports (see page 19) Use Hardware Filters to Manage Data (see page 21) Configure Multi-Port Collector as a Collection Device for SuperAgent (see page 28) Install the TIM Software (see page 32) Set Global Application Preferences (see page 33) Create SNMP Traps (see page 35) What are Users and Roles? (see page 39) Log In to the Web Interface Log in to the web interface to perform configuration tasks, analyze data, and monitor Multi-Port Collector system health. Follow these steps: 1. Access the web interface in a web browser. Use the following syntax in the browser Address field: http:/// The Multi-Port Collector Login page opens. 2. Log in using the following case-sensitive user name and password: ■ User name: nqadmin ■ Password: nq The web interface opens. Chapter 2: Post-installation Configuration Tasks 17 Configure a Trusted Internet Site Configure a Trusted Internet Site To improve user interface performance, add the host name of the appliance to the list of trusted internet sites. Microsoft Internet Explorer uses high security settings that restrict navigation to trusted sites. In Internet Explorer, you can add the host name to the list of Trusted Sites by clicking Tools, Internet Options, Security. We recommend Internet Explorer version 7 or 8, or Mozilla Firefox version 3.6. Change the Password of the Administrator Account The Multi-Port Collector appliance ships with predefined user accounts that provide different product privileges. The default Administrator account provides access to all configuration options. Administrators should change the password for this account in the following situations: ■ Multi-Port Collector will be a collection device for SuperAgent, but SuperAgent is not yet deployed. When Multi-Port Collector is configured as a collection device, it retrieves all user and role information, including passwords, from SuperAgent. ■ Multi-Port Collector is deployed only with TIM in an APM environment. Follow these steps: 1. Click Administration, Users in the web interface. The User Accounts page opens. 2. Click the Edit link for the nqadmin account. The Edit User page opens. 3. (Optional) Edit the default text in the Description field to mention that the default password has been changed. Although optional, this step is a best practice. 4. Delete the encrypted text and type the new password in the Password and Confirm Password fields. 5. Select the Enabled check box. This setting prevents you from accidentally disabling the account under which you are logged in to the web interface. 6. Click Save. The new password is saved. More information: What are Users and Roles? (see page 39) 18 User Guide Verify Packet Flow Through Ports Verify Packet Flow Through Ports Verify that packets flow through the ports to ensure that installation of the hardware and software was successful. Follow these steps: 1. Click System Status in the web interface. 2. Scroll to the Capture Card Physical Port Status section, which identifies the following: ■ Which ports are connected on the adapter ■ The number of packets received through each port Configuration is successful if the ports are active. Configure Logical Ports The Multi-Port Collector appliance has two, four, or eight physical ports through which it receives data from switches in your network. When connected to a mirrored port, a physical port is assigned a logical port definition that corresponds to its ID number on the high-performance adapter. You can associate a name with a logical port to make it easier to identify associated activity. You can change the default logical port definitions. Logical port settings also let you limit the amount of data captured and monitored from each mirror session. Port filters determine the segments of the network or hosts that are monitored and the types of data to include or exclude from capture files. TIM monitors mirrored ports from one logical port, despite the availability of multiple logical ports on the Multi-Port Collector appliance. To map multiple physical ports to one logical port, mirror the web traffic from the WAN to the logical port. This traffic is processed for TIM and SuperAgent. Use the other logical ports for other port mirroring, ideally from the access-layer switches closest to the servers. The non-TIM logical ports are processed for SuperAgent only. Follow these steps: 1. Click Administration, Logical Ports in the web interface. The Logical Ports page opens. 2. Take the following steps for each port that you want to configure: a. Type a new name for the port in the Name field. The name helps to identify the source of the traffic you want to monitor, such as the name or location of a core switch. Chapter 2: Post-installation Configuration Tasks 19 Configure Logical Ports b. Select Enabled to enable the port for monitoring. c. (Optional) Select Save Packets To Disk to save captured data packets on the hard disk drive of the appliance. Note: If this option is disabled, packet capture files are not saved, and are not available for packet capture investigations that are launched from SuperAgent. Nor are they available for the Export to PCAP feature. d. Select TIM Monitor to identify the port you are configuring as a TIM port. This check box is available only when TIM is installed on the Multi-Port Collector appliance. e. Click Filters to enable a hardware filter for the port you are configuring. For more information, see Use Hardware Filters to Manage Data (see page 21). Web traffic monitored by TIM must have full packets. f. Select a check box to assign a Physical Port to the logical port. The number of available ports depends on the capture card configuration you purchased. You can map two or more physical ports to one logical port. This configuration provides more accurate monitoring in environments with asymmetrical routing, and lets you monitor primary and failover circuits. Logical port numbering begins at 0. The capture layer performs the mapping of physical ports to logical ports. The mapping process is transparent to TIM. 3. Click Save. 4. Restart the nqcapd process if you changed any parameter other than the port Name. 5. (Optional) Review the status of the logical ports in the Capture Card Logical Port Status table on the System Status page. More information: Use Hardware Filters to Manage Data (see page 21) What is Packet Slicing? (see page 22) Export Data to a PCAP File (see page 82) Capture Card Logical Port Status (see page 88) Stop or Restart a Process (see page 94) Regular Expression Syntax (see page 125) 20 User Guide Use Hardware Filters to Manage Data Use Hardware Filters to Manage Data Hardware filters can further refine the data that is processed from your switches and thus optimize Multi-Port Collector performance. For example: ■ If data volume is heavy on your network, you can apply filtering or packet slicing to selected logical port definitions. ■ You can refine data capture and select specific IP addresses or subnets. Filtering options include prioritization and packet inclusion or exclusion per-protocol, per-VLAN, per-subnet or IP address, and per-port. Advanced filtering lets you create complex, regular-expression filters to determine the protocols, VLANs, or subnets to include or exclude from monitoring. The packet-slicing feature lets you limit the portion or size of the packets that are written to disk. Multi-Port Collector filtering and packet-slicing options are applied on a per-port basis, as part of logical port definition. You can set filter priority to determine the order in which filters are applied. Hardware filters are distinct from the analysis filters you can apply to captured data. ■ Hardware filters affect the capture of data. ■ Analysis filters affect the display of data. Traffic is captured when a packet matches the criteria of an enabled filter. Filters with overlapping instructions are applied in order, based on their Priority setting. The capture card provides a limited number of hardware filtering resources. Use these filters to refine the limitations on mirrored traffic. Tip: You can use hardware filters to refine the captured data. However, do not use hardware filters in place of properly configured mirror ports, which filter the data before it is captured. More information: Configure Logical Ports (see page 19) Use Filters to Customize Data in the Display Area (see page 55) Port Mirroring (see page 105) Chapter 2: Post-installation Configuration Tasks 21 Use Hardware Filters to Manage Data What is Packet Slicing? Multi-Port Collector filters include a packet-slicing option that lets you selectively discard parts of a frame as it is captured. Packet slicing is typically deployed when data volumes are high and the data of interest is in the packet headers. The packet payload is not typically needed for SuperAgent monitoring. Packet slicing reduces Multi-Port Collector load and uses fewer resources for capture file storage. The "All Traffic — headers only" filter specifies that all types of packets are captured and sliced to retain only their headers. The filter slices a packet to the size of the frame through the header, plus one byte of payload. Unless you add a filter or edit this filter, packet slicing is applied to all new logical port definitions on new installations. This filter was designed to maximize Multi-Port Collector performance while still capturing all data needed for monitoring with SuperAgent. The network adapter installed on the Multi-Port Collector appliance offers options for packet slicing, including fixed-length truncation and dynamic, per-protocol truncation. The capture card performs two types of slicing: Fixed slicing The frame size is truncated to a maximum specified length that you can set in bytes. Dynamic slicing The frame size is truncated to a maximum length after the header is included, for example, the full TCP header plus 8 bytes of payload. When dynamic slicing is selected, the card included encapsulations or TCP options when calculating the place where payload data is discarded. What are the Default Hardware Filters? Because higher data volumes can impede Multi-Port Collector performance, you can associate filters with logical port definitions. A filter determines the protocols, VLANs, or subnets to include or exclude from monitoring. For more granular captures, you can exclude or include individual IP addresses or TCP ports. Multi-Port Collector offers the following predefined filters. All Traffic — headers only Captures traffic of all types (protocols). Slices the packets to retain packet headers, plus one payload byte from each packet that passes through the SPAN or mirror source port. This filter is optimized for troubleshooting tasks you can perform using the Multi-Port Collector web interface. The filter is not strictly for use in TCP response-time monitoring in SuperAgent. This filter is enabled by default. 22 User Guide Use Hardware Filters to Manage Data HTTP — full packets Captures HTTP packets with full payloads from TCP traffic. The packets are needed for monitoring with TIM, which records and observes packets to identify user logins and related transactions. This filter is disabled by default. TCP — headers only Captures only TCP packet headers. This filter is disabled by default. This filter optimizes Multi-Port Collector performance for SuperAgent support. When applied to a logical port, the filter instructs the capture card to discard data for all non-TCP protocols. More information: Support for Transaction Impact Manager (see page 15) Configure a Hardware Filter You can create, enable, disable, and modify predefined filters or the filters you create. Follow these steps: 1. Click Administration, Logical Ports in the web interface. The Logical Ports page opens. 2. Click the Filters link in the Edit Filters column for the logical port you want to filter. The Logical Ports: Hardware Filters page opens. 3. 4. Perform one of the following: ■ Click New to create a filter. The Logical Ports: New Hardware Filter page opens. ■ Click Edit to modify or enable a filter. The Logical Ports: Edit Hardware Filter page opens. Complete the following fields: ■ Filter Enabled: Applies the filter on the logical port whose name is indicated. If selected, the filter is applied after you restart the nqcapd process. ■ Filter Name: The name of the filter you are creating or editing. The filter name is shown on the Hardware Filters page for the logical port to which it is applied. Chapter 2: Post-installation Configuration Tasks 23 Use Hardware Filters to Manage Data ■ Filter Priority: Priority determines which filters take precedence when filter criteria overlap. If two or more overlapping filters have the same priority, it is undefined which filter overrules the other. Values range from 0 (highest priority) to 62 (lowest priority). The default priority is 10. Filter priority settings can be used with packet slicing. For example, you want to keep more bytes of each HTTP packet. You specify a filter for TCP and Port 80 with slicing set to TCP headers + 50 bytes and Priority set to 1. You then apply a separate filter for TCP with slicing set to TCP headers + 1 byte and Priority set to 10. In this scenario, more payload bytes are kept for HTTP traffic than for other TCP traffic. Packet Slicing Mode: Options for capturing only selected parts of each packet. The hardware filters allow you to capture packets for protocols other than TCP/IP. However, Multi-Port Collector collects performance metrics only for TCP traffic. Volume metrics are collected for all traffic types. ■ Capture full packet: All information is captured from each packet that passes the filter. ■ Capture fixed size: Some bytes are captured from every packet. In the Packet Slicing Size field, supply the number of bytes to capture. ■ Capture headers plus size: All Layer 2, Layer 3, and Layer 4 headers are captured, plus the fixed number of payload bytes from the Packet Slicing Size field. -- Layer 2 headers include Ether II, LLC, SNAP, and Raw headers, and VLAN, ISL, and MPLS tags. -- Layer 3 headers include IPv4 (including IPv4 options), IPv6, and IPX headers. -- Layer 4 headers include TCP, UDP, and ICMP headers. Include only Protocols: Limits the protocols to capture and process. Only the selected protocols are included in monitoring. If no check boxes are selected, all protocols are included. ■ 24 User Guide ■ TCP: Transport Control Protocol, which is the main protocol monitored by SuperAgent ■ UDP: User Datagram Protocol, which is used for transport of data send by real-time or streaming applications, such as voice over IP ■ ICMP: Internet Control Message Protocol, which is used for error messaging among servers and for SuperAgent traceroute investigations VLANs: The identifiers of the virtual local area networks (VLANs) to include in or exclude from monitoring. List the identifiers of VLANs whose traffic passes through the indicated logical port. Separate multiple VLANs with commas and no spaces. Select Exclude to discard traffic from the VLANs you listed. Use Hardware Filters to Manage Data ■ Subnets: The subnets to include in or exclude from monitoring. Supply a valid IP address and subnet mask. Specify the number of bits to use for the mask. Use the following format: 10.9.8.0/24. Select Exclude to discard traffic from the subnets you listed. ■ IP Addresses: The IP addresses of individual hosts to include in or exclude from monitoring. Separate multiple IP addresses with commas and no spaces. Use dotted notation for the format, such as 10.9.8.7 or 10.9.8.7,10.9.8.5,10.9.7.7. Select Exclude to discard traffic from the IP addresses you listed. Ports: The TCP ports or port ranges to include in or exclude from monitoring. Separate multiple port numbers with commas and no spaces. For a range of ports, use the following format: 2483-2484. Select Exclude to discard traffic from the ports you listed. 5. (Optional) Click Show Details to view your selections as a regular expression. 6. (Optional) Click Advanced to use regular expressions to create more precise filters. For more information, see Use Regular Expressions for Precise Filtering (see page 25). 7. Click Save. The new filter appears on the Logical Ports: Hardware Filters page. 8. Restart the nqcapd process if you enabled a filter. More information: Configure Logical Ports (see page 19) Stop or Restart a Process (see page 94) Use Regular Expressions for Precise Filtering Hardware filters can include regular expressions that precisely control the data that is captured or discarded. You can apply regular expressions when you create a filter. Follow these steps: 1. Create a hardware filter (see page 23). 2. Click Advanced on the Logical Ports: New Hardware Filter page. The Logical Ports: New Advanced Hardware Filter page opens. 3. Complete the following fields: ■ Filter Enabled: Applies the filter on the logical port whose name is indicated. If selected, the filter is applied after you restart the nqcapd process. ■ Filter Name: The name of the filter you are creating or editing. The filter name is shown on the Hardware Filters page for the logical port to which it is applied. Chapter 2: Post-installation Configuration Tasks 25 Use Hardware Filters to Manage Data ■ Filter Priority: Priority determines which filters take precedence when filter criteria overlap. If two or more overlapping filters have the same priority, it is undefined which filter overrules the other. Values range from 0 (highest priority) to 62 (lowest priority). The default priority is 10. Filter priority settings can be used with packet slicing. For example, you want to keep more bytes of each HTTP packet. You specify a filter for TCP and Port 80 with slicing set to TCP headers + 50 bytes and Priority set to 1. You then apply a separate filter for TCP with slicing set to TCP headers + 1 byte and Priority set to 10. In this scenario, more payload bytes are kept for HTTP traffic than for other TCP traffic. Packet Slicing Mode: Options for capturing only selected parts of each packet. The hardware filters allow you to capture packets for protocols other than TCP/IP. However, Multi-Port Collector collects performance metrics only for TCP traffic. Volume metrics are collected for all traffic types. 4. ■ Capture full packet: All information is captured from each packet that passes the filter. ■ Capture fixed size: Some bytes are captured from every packet. In the Packet Slicing Size field, supply the number of bytes to capture. ■ Capture headers plus size: All Layer 2, Layer 3, and Layer 4 headers are captured, plus the fixed number of payload bytes from the Packet Slicing Size field. -- Layer 2 headers include Ether II, LLC, SNAP, and Raw headers, and VLAN, ISL, and MPLS tags. -- Layer 3 headers include IPv4 (including IPv4 options), IPv6, and IPX headers. -- Layer 4 headers include TCP, UDP, and ICMP headers. In the Field lists and the blank field, build your expression. All packets that match the filter syntax are captured. Wildcards are not accepted. a. From the first list, select the field from the packet header on which you want to filter. The filters you create include traffic. The items you select correspond to data that is captured from the traffic seen by the logical port where the filter is applied. To create a filter that excludes traffic, specify all traffic except for the traffic you want to exclude. ■ 26 User Guide VLAN ID: The identifier of the virtual LAN (VLAN) whose data you want to include. Specify the VLAN IDs to include as a comma-separated list in the empty field provided. For example, to include traffic from VLANs 165 and 140, enter 165,140. If you did not add filtering to this logical port, the packets with either of these VLAN identifiers is captured. You can also specify a range of VLANs, such as 140-165. Such a filter is inclusive. Use Hardware Filters to Manage Data b. ■ Encapsulation: The encapsulation applied to a packet. If you select this option, then supply a value for the type of encapsulation to include from capture files. The following values are valid: -- VLAN: A category that includes all packets with a VLAN header in the filter operation. -- MPLS: The Multiprotocol Label Switching network architecture. MPLS affixes a header to each packet containing labels to control packet routing, including quality of service and TTL information. -- ISL: A proprietary Cisco VLAN encapsulation method for high-performance links. ■ Layer 3 Protocol: The Layer 3 protocol to include in the filter operation. If you select this option, then specify one protocol, or a comma-separated list of protocols. Valid values are IP, IPv4, and IPv6. ■ Layer 4 Protocol: The Layer 4 protocol to include in the filter operation. If you select this option, then specify one protocol, or a comma-separated list of protocols. Valid values are TCP, UDP, and ICMP. ■ Source Subnet, Destination Subnet: The IP address of the subnet to include in the filter operation. Select Source Subnet or Destination Subnet, or click the AND or OR button to add them both to the regular expression. The filter is applied to the Source or Destination field in the packet header. Provide an IP address and mask, the number of bits in the subnet mask. Use the following syntax: 123.45.67.0/24. ■ IPv4 Source IP Address, IPv4 Destination IP Address: The full IPv4 address of the host to include in the filter operation. The filter is applied to the Source or Destination field in the packet header. You can enter one IPv4 address, a comma-separated list, or a range. Use standard syntax, such as 123.45.67.89, or 123.45.67.8,123.45.67.15, or 123.45.67.8 - 123.45.67.15. ■ IPv6 Source IP Address, IPv6 Destination IP Address: The full IPv6 address of the host to include in the filter operation. You can enter one IPv6 address, a comma-separated list, or a range. Each IPv6 address has the format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where xxxx is hexadecimal separated by colons. Do not remove leading zeros. ■ TCP Source Port, TCP Destination Port: A single port number, a comma-separated list of port numbers, or a hyphenated range of port numbers to include in the filter operation. The filter is applied to the Source or Destination port fields in the packet header. Select a condition from the second list: Equals (==) or Not Equals (!=). Chapter 2: Post-installation Configuration Tasks 27 Configure Multi-Port Collector as a Collection Device for SuperAgent c. In the blank field, type the value associated with your selection in step a. d. (Optional) To add additional conditions to the filter, click one of the Boolean operator buttons, AND or OR, and then repeat steps a through d. The filter syntax appears in the Conditions field. 5. Click Save. The filter appears on the Logical Ports: Hardware Filters page. 6. Restart the nqcapd process if you enabled a filter. More information: Stop or Restart a Process (see page 94) Regular Expression Syntax (see page 125) Configure Multi-Port Collector as a Collection Device for SuperAgent When configured as a collection device, Multi-Port Collector sends data to SuperAgent. Note: If you use Multi-Port Collector only with TIM and APM, you do not need to add a collection device to SuperAgent. Tip: Take the following optional steps before configuring the collection device. ■ Configure hardware filters to control the data that is sent to SuperAgent. For more information, see Configure a Hardware Filter (see page 23). ■ Assign meaningful labels to each logical port to make it easier to identify each data source. For more information, see Configure the Logical Ports (see page 19). Follow these steps: 1. Disable the popup blocking feature in your web browser. SuperAgent uses popups when it adds the collection device. 2. Log in to the SuperAgent management console as a user with Administrative privileges. 3. Click Administration, Data Collection, Collection Devices. The SuperAgent Collectors page opens. 4. Click Add SuperAgent Collector. The Standard Collector Properties page opens. 28 User Guide Configure Multi-Port Collector as a Collection Device for SuperAgent 5. Complete the following fields: Server Name Type the server name for the Multi-Port Collector appliance. If you do not know the server name, type an IP address in the "Management Address" field and click DNS. SuperAgent attempts to resolve the IP address. Management Address Type the IP address of the Multi-Port Collector Management NIC. If you do not know the IP address, type the DNS name in the "Server Name" field and click IP. SuperAgent attempts to resolve the DNS name. Incident Response (Optional) Select Collector to receive a SuperAgent incident report when Multi-Port Collector is not running. Availability Monitoring (Optional) If you selected Collector in the "Incident Response" field, select Enabled in this field. The Enabled option lets SuperAgent monitor the availability of Multi-Port Collector every 5 minutes. Is Multi-Port Collector This field is displayed only when SuperAgent cannot contact Multi-Port Collector. Select this check box to identify the type of collection device. The management console verifies the collection device as Multi-Port Collector. Note: The following fields do not apply to Multi-Port Collector: 6. ■ Enable Multiple Monitor NICs ■ Disable Packet Collection ■ Monitor Address Click OK. The page refreshes to show that Multi-Port Collector is available. 7. Click the Synchronize Collection Devices link to send monitoring instructions to Multi-Port Collector. Chapter 2: Post-installation Configuration Tasks 29 Configure Multi-Port Collector as a Collection Device for SuperAgent 8. Configure the networks, servers, and applications that you want to monitor. The CA NetQoS SuperAgent Administrator Guide contains complete instructions. 9. Perform synchronization again: a. Click Administration, Data Collection, Collection Devices. The SuperAgent Collectors page opens. b. Click the blue arrow above the Options column and select Synchronize Collection Devices. The Synchronize Collection Devices confirmation dialog opens. c. Click Continue. The Current Status dialog opens. d. Click Close Status Window when synchronization is complete. 10. Confirm that Multi-Port Collector sends data to SuperAgent: a. Click Administration, Data Collection, Collection Devices. b. Review the Collectors list, which provides status information for all collection devices. Note: The Last Collection and Status fields are not updated until you configure at least one valid server subnet and one network. See Step 8. Several minutes can elapse after the completion of Step 9 before Multi-Port Collector sends data to SuperAgent. More information: Support for SuperAgent (see page 10) Verify Logical Port Status in SuperAgent For SuperAgent, Multi-Port Collector monitors network data from multiple switches. A discrete logical port definition identifies each monitored switch. A logical port is a source of TCP response-time data. You can view the status of each logical port, identified as a collector feed, in the SuperAgent management console. This procedure is valid only if Multi-Port Collector is configured as a collection device for SuperAgent. Follow these steps: 1. Click Administration, Data Collection in the SuperAgent management console. The Multi-Port Collector device name appears in the Collectors list. 2. 30 User Guide Click the Edit icon in the Options column. Configure Multi-Port Collector as a Collection Device for SuperAgent The Multi-Port Collector Properties page opens. The Collector Feeds table provides status information for each logical port. 3. Click Help for a description of the information in the table. Review TCP Session Information The Multi-Port Collector appliance tracks the health and performance of your enterprise network based on TCP data. A mirror port on a switch sends data to the high-performance capture card on the appliance. The appliance has the processing power and sufficient monitoring ports to handle data from multiple switches. A discrete logical port definition identifies each monitored switch. Each logical port reports the number of active TCP sessions, with a server name, address, and port number to identify the traffic. A logical port is identified as a collector feed in the SuperAgent management console. Follow these steps: 1. Click Administration, Data Collection, Collection Devices in the SuperAgent management console. The device name of the Multi-Port Collector appears in the Collectors list. 2. Click the Edit icon in the Options column. The Multi-Port Collector Properties page opens. 3. Click Active Sessions in the third Show Me list. The Active Sessions page opens. The Active Sessions page provides information about monitored servers and their corresponding feeds. The Active Sessions data is helpful for verifying collector and mirror port setup and for troubleshooting network or server issues. 4. Select the feed whose TCP sessions you want to review in the "View Active Sessions for Feed" field. The page refreshes to display active sessions for the selected feed. 5. Click Help for information about the fields on the Active Sessions page. Chapter 2: Post-installation Configuration Tasks 31 Install the TIM Software Install the TIM Software The software for Transaction Impact Manager (TIM) is available for download from CA Technical Support. Note: If you use Multi-Port Collector only with SuperAgent, you do not need to install the TIM software. You use the Multi-Port Collector web interface to install the following: ■ TIM third-party-CentOS5.5 file ■ TIM tim-complete-CentOS5.5 file Follow these steps: 1. Download the installation files from CA Technical Support to a workstation that has web browser access to the Multi-Port Collector appliance. 2. Log in to the Multi-Port Collector web interface as a user with Administrative privileges. The web interface opens. 3. Click System Setup, Install Software in the web interface. The Install Software page opens. 4. Click Browse and navigate to the location where you downloaded the installation files. 5. Select the TIM third-party-CentOS5.5 file. 6. Click Open. The name of the file appears on the Install Software page. 7. Click Upload and Install. 8. Read and accept the License Agreement. The software installation log opens. If the log contains errors in red text, contact CA Technical Support. 9. Click Browse on the Install Software page and navigate to the location where you downloaded the installation files. 10. Select the TIM tim-complete-CentOS5.5 file. 11. Repeat Steps 6 through 8. 12. Click System Setup in the web interface. When installation is successful, the names of the files you installed appear on the System Setup page. 32 User Guide Set Global Application Preferences 13. Identify the logical port to use for TIM monitoring. For more information, see Configure the Logical Ports (see page 19). 14. Enable the "HTTP - full packets" hardware filter to capture full packets a. Click Administration, Logical Ports in the web interface. b. Click the Filters link for the logical port that is associated with TIM monitoring. The Logical Ports: Hardware Filters page opens. c. Click the Edit link for the "HTTP - full packets" filter. The Logical Ports: Edit Hardware Filter page opens. d. Select the Filter Enabled check box. e. Restart the nqcapd process. More information: Support for Transaction Impact Manager (see page 15) Stop or Restart a Process (see page 94) System Setup (see page 100) Set Global Application Preferences You can configure global settings that affect the way data is automatically collected, stored, and forwarded, such as the following: ■ The number of hours to retain packet capture files ■ The frequency of automatic database maintenance ■ Whether packet deduplication is enabled In most cases, the default settings are appropriate. However, you can change the settings to help ensure optimal functioning of your system. Follow these steps: 1. Click Administration, Application Settings in the web interface. The Application Settings page opens. 2. Complete the following fields: ■ Perform automatic file maintenance every. The number of minutes between automatic file maintenance operations. If necessary, the oldest raw packet capture files are deleted during maintenance. This setting determines the frequency of capture file deletion. The default is 5. If you change this setting, restart the nqmaintd process. The Raw Packet Capture Removal threshold also affects the frequency of file deletion. Chapter 2: Post-installation Configuration Tasks 33 Set Global Application Preferences 3. ■ When disk space usage is normal, keep raw packet capture files for. The length of time raw packet capture files are stored before being automatically deleted. These files are continually generated during ordinary monitoring. The default is 6. If you change this setting, restart the nqmaintd process. ■ Automatically remove raw packet capture files older than one hour when disk utilization reaches. The maximum percentage of disk space that can be in use before raw packet capture files older than one hour are automatically purged. The File Maintenance Interval also affects the frequency of file deletion. The default is 80 percent. This threshold does not apply to packet capture investigation files. If you change this setting, restart the nqmaintd process. ■ Keep SuperAgent packet capture investigation files for. The number of days that packet capture investigation files are stored before being automatically deleted. These files are generated in response to a packet capture investigation request from SuperAgent. Packet capture investigation files are stored separately from raw capture files. This threshold does not apply to raw packet capture files. The default is 90. If you change this setting, restart the nqmaintd process. ■ Keep one-minute session metrics for. The number of days that metric data taken from captured packets are kept in the Multi-Port Collector database. The default is 7. An internal maximum threshold is applied to this database. Data from fewer than the selected number of days is kept when the number of rows in the database exceeds 12 billion rows. If the threshold is exceeded, the oldest data is discarded first. ■ Perform packet deduplication. When enabled, Multi-Port Collector attempts to filter out duplicate packets that can be received from mirrored ports. By default, deduplication is enabled. The System Status page tracks the number of packets that the capture card discarded. If you change this setting, restart the nqcapd process. ■ Encrypt raw packet capture files on disk. When enabled, raw packet capture files are saved in encrypted format on the Multi-Port Collector hard disk. By default, these files contain only the header information of all traffic captured. But they can contain payload data when packet slicing options are changed to retain more of the packet. Packet capture investigation files, which are filtered to contain information from a single server, are not encrypted. Encryption is processor-intensive. Enabling this option can degrade the ability of the collection device to save packet capture files. A unique key for the encryption is created when you first start Multi-Port Collector. The key is not changed thereafter. If you change this setting, restart the nqcapd process. Click Save. The Application Settings page is refreshed with your changes. 4. 34 User Guide Restart the nqmaintd process or the nqcapd process if necessary. Create SNMP Traps More information: What is Packet Slicing? (see page 22) Capture Card Physical Port Statistics (see page 89) Stop or Restart a Process (see page 94) Purge Data from the Database (see page 97) Packet Deduplication (see page 109) Create SNMP Traps The Multi-Port Collector SNMP alerting feature adds a layer of error reporting to the SuperAgent incidents feature. Alerting by SNMP traps is distinct from the SuperAgent incidents feature. Multi-Port Collector performs some self-monitoring and sends trap notifications to alert you to conditions that potentially affect its performance. The nqsnmptrap_[Date].log files identify the conditions that triggered SNMP traps. For more information, see Review System Logs (see page 94). SNMP traps are sent automatically to a third-party monitoring application when an error condition is detected. You can modify SNMP trap settings to change reason that traps are sent. Traps are defined in the Management Information Base (MIB) and are sent as SNMP v2 notifications. Multi-Port Collector includes a MIB file that contains unique OIDs: NETQOS-MULTI-PORT-COLLECTOR-MIB. You can review the contents of the MIB file at Administration, SNMP Traps in the web interface. Prerequisites: ■ Configure a trap receiver, such as CA NetVoyant, to communicate with the Multi-Port Collector appliance. ■ Import NETQOS-MULTI-PORT-COLLECTOR-MIB into the trap receiver. The process of importing a MIB file is specific to the trap receiver. Follow these steps: 1. Click Administration, SNMP Traps in the web interface. The SNMP Traps page opens. Chapter 2: Post-installation Configuration Tasks 35 Create SNMP Traps 2. Type the IP address or host name of the computer where the SNMP trap receiver is installed. 3. Click Save. By default, all traps shown in the table are enabled, with a severity level of Warning. This setting means that Info traps are not sent by default. However, traps are sent in response to conditions that meet either the Warning criteria or the Error criteria. More information: Review System Logs (see page 94) SNMP Trap Severity Levels Multi-Port Collector SNMP traps are associated with key processes that detect error conditions that affect performance. Error conditions that correspond to the following severities trigger each trap: ■ Info (least severe condition) ■ Warning (medium-severity condition) ■ Error (highest-severity condition) You can select the minimum severity of traps that you want Multi-Port Collector to send. Traps are then sent for any condition that meets or exceeds the criteria for the minimum severity. By default, all traps are enabled with a Warning severity, which means that the Error trap is also enabled, but not the Info trap. The following SNMP traps are available: mpcProcessTrap This trap is sent when a Multi-Port Collector process fails or is restarted. The trap text supplies the name of the process that was restarted. ■ Warning is sent when the watchdog process restarts another process. ■ Error is sent when the watchdog process restarts the same process the maximum number of times. By default, traps are sent for a Warning or Error condition. 36 User Guide Create SNMP Traps mpcCaptureTrap This trap is sent in response to an error or warning message from the network adapter (the capture card). Where applicable, the trap text supplies information to identify the affected adapter. ■ Warning is sent when a physical port is no longer connected. ■ Error is sent when the nqcapd process encounters a problem while capturing packets. By default, traps are sent for a Warning or Error condition. mpcDiskUsageTrap This trap is sent when a disk usage threshold is exceeded for a file system. ■ Warning is sent when disk usage reaches 80 percent. ■ Error is sent when disk usage reaches 95 percent. By default, traps are sent for a Warning or Error condition. Tips: ■ ■ The mpcDiskUsageTrap monitors the /nqtmp/headers file system, a RAM disk file system. When the /nqtmp/headers file system exceeds a threshold, it often means that the nqmetricd process is not sufficiently processing header files. Possible reasons include the following: – The nqmetricd process cannot query the SuperAgent management console for configuration information. Review the nqMetricReader.log file for indications of a SQL error. – The Multi-Port Collector appliance can have resource issues that affect the nqmetricd process. Restart the appliance. If the problem persists or occurs again, contact CA Technical Support. The mpcDiskUsageTrap also monitors the /nqtmp/tim file system, a RAM disk file system. When the /nqtmp/tim file system exceeds a threshold, it often means that the TIM process is not sufficiently processing packet files. mpcRAIDTrap This trap is sent in response to a RAID array or disk drive failure. ■ Info is sent when a RAID array that was rebuilding returns to an Optimal state. ■ Warning is sent when a disk RAID array is degraded because a disk drive is rebuilding. ■ Error is sent when either a disk RAID array failure or a degraded disk RAID array due to a disk drive failure is detected. By default, traps are sent for a Warning or Error condition. Note: This trap is available only if the Adaptec Storage Manager (arcconf) utility is installed. For more information, see the CA NetQoS Multi-Port Collector Installation Guide. Chapter 2: Post-installation Configuration Tasks 37 Create SNMP Traps More information: Process Information (see page 86) Review System Logs (see page 94) Log In to the Appliance (see page 99) Change Trap Behavior Multi-Port Collector SNMP trap notifications are sent in response to selected error conditions. By default, these traps are sent in response to conditions that meet Warning or Error severity. By default, traps that meet the Info severity level are not sent. You can change the severity for each type of trap. For mpcDiskUsageTrap, you can also change the usage thresholds. Each type of trap includes several severity parameters. You can select a minimum severity level that can trigger the trap notification. Severity levels range from Info, the least severe, to Error, the most severe. Follow these steps: 1. Click Administration, SNMP Traps in the web interface. The SNMP Traps page displays the IP address or host name of the configured trap receiver and table describing the SNMP traps. 2. Click Edit for the trap you want to disable or change. The Edit SNMP Trap Settings page opens. 3. Select the severity level of the trap in the Setting field. 4. Change the value in the "Send Warning trap when disk utilization reaches" field. The default is 80. Note: This field applies to mpcDiskUsageTrap. 5. Change the value in the "Send Error trap when disk utilization reaches" field. The default is 95. Note: This field applies to mpcDiskUsageTrap. 6. Click Save. The SNMP Traps page opens. The changes you made to the trap settings are shown in the table. 38 User Guide What are Users and Roles? What are Users and Roles? Before you configure the Multi-Port Collector appliance as a collection device for SuperAgent, two default user accounts can be used: nqadmin and nquser. After the appliance is configured as a collection device, the appliance obtains user and role information from SuperAgent. The SuperAgent Administrator creates and manages secure user accounts that are valid for SuperAgent and Multi-Port Collector. These accounts allow operators to access the System Status page, Analysis page, System Setup page, or Administration page. In addition, these accounts are synchronized and displayed on the User Accounts page in the web interface. Important: Multi-Port Collector does not obtain user and role information from TIM or APM. Only the default user accounts are applicable when TIM is installed on the appliance and the appliance is not a collection device for SuperAgent. Multi-Port Collector security is fully compatible with SuperAgent and is based on login access privileges. ■ Users with the SuperAgent User right can view the data on the System Status tab. ■ Users with the SuperAgent Administrator right can access the Multi-Port Collector Administration tab. The rights associated with user account roles further determine access. ■ Users with the SuperAgent Engineering role can view the Analysis page. ■ Users with the SuperAgent Investigations role can view the Analysis page and use the Export to PCAP feature. The SuperAgent Administrator can create additional user accounts to track Multi-Port Collector status and configure data collection. For better security, change the default password of the Administrator and user accounts. More information: Change the Password of the Administrator Account (see page 18) Chapter 2: Post-installation Configuration Tasks 39 What are Users and Roles? User Account Information Multi-Port Collector provides default user accounts with different product permissions and different roles. The product permissions of the default accounts allow for two different levels of access to the web interface. ■ User permission level: Provides view-only privileges that are restricted to the System Status and Analysis pages. ■ Administrator permission level: Provides access to all product features. The role assigned to each user account determines, at a more granular level, the product web pages and features that the associated user can access. When Multi-Port Collector is a collection device for SuperAgent, the Administrator can create and modify accounts in the management console or in NetQoS Performance Center. These accounts are synchronized and displayed on the Multi-Port Collector web interface. You can view details about user accounts at Administration, Users. Name The user name and login ID for this account. Identifies the user account. Identifies the product permission level for the default accounts. Role Determines the level of access to product features for the user. Privilege The level of access to product configuration, either Administrator or User. Only a user with the Administrator permissions can change product configuration, such as setting capture filters or changing database retention settings. Status The status of the user account, either Enabled or Disabled. Time Zone The local time zone of the operator most likely to be using the user account. Allows reports to be viewed in the local time zone. Change the Properties of a User Account User accounts establish the credentials of people who are authorized to operate Multi-Port Collector and perform certain tasks. Information about the default user accounts, nqadmin and nquser, can be viewed on the User Accounts page of the web interface. You use the SuperAgent management console to create new user accounts. Therefore, configure Multi-Port Collector as a collection device for SuperAgent before creating a user account. 40 User Guide What are Users and Roles? However, before you add Multi-Port Collector as a collection device, you can use the web interface to modify the default user accounts. For example, you can change an account password, update the associated time zone, or assign the user another role. Note: The settings associated with these accounts are updated with the settings from SuperAgent after you add Multi-Port Collector as a collection device and synchronize. SuperAgent user accounts can be viewed in the web interface after you add Multi-Port Collector as a collection device. However, they can be edited only in the SuperAgent management console or in NetQoS Performance Center. Follow these steps: 1. Click Administration, Users in the web interface. The User Accounts page displays the predefined user accounts and the custom accounts you created. 2. Click the Edit link for the account that you want to edit. The Edit User page opens. 3. Complete the following fields: Description Type a description of the account or of a recent change. For example, you can state that the password has been changed. This optional step is a best practice. Password, Confirm Password Delete the encrypted text in each field and type a new password in each field. Product Privilege Select a permission level that determines whether the user can perform administrative tasks. Role Select a role to determine the permissions that the user has to view report data and access product features. Time Zone Select the local time zone of the operator most likely to use this user account. Enabled Select this check box to prevent accidental disabling of the account under which you are logged in to the web interface. To disable the nqadmin account, create another user with the Administrator product permission and log in as that user. 4. Click Save. Chapter 2: Post-installation Configuration Tasks 41 What are Users and Roles? Role Information Multi-Port Collector user roles are managed in the SuperAgent management console until you configure SuperAgent as a data source for NetQoS Performance Center. In SuperAgent and NetQoS Performance Center, user roles control operator access to menus and data sources. Assigning roles lets you restrict functionality to selected users. For instance, the Administrator can limit Multi-Port Collector operators to have access only to the System Status page. If you limit users by role, they cannot view restricted parts of the product. The role associated with a user account determines the following: ■ The menus and report pages a user can access. ■ The ability of the user to customize data and to drill down for additional information. In SuperAgent, each role has an Area Access parameter that determines page-level access to SuperAgent reports and other features, such as on demand investigations. The same roles also operate within NetQoS Performance Center after the SuperAgent data source is registered. The privileges controlled by the role do not extend to administration. Administration permissions are assigned to the user during user account creation. The Multi-Port Collector Roles page is a view-only list of predefined role names and descriptions. Network Manager This Administrator role for Multi-Port Collector and SuperAgent provides access to the following SuperAgent reports: 42 User Guide ■ Investigations ■ Engineering ■ Operations ■ Incidents ■ Management What are Users and Roles? Network Engineer This role consists of user permissions geared toward the troubleshooting of reported issues. This role is also known as the Investigator role and provides access to the following SuperAgent reports: ■ Investigations ■ Engineering ■ Operations ■ Incidents ■ Management Network Operator This role consists of user permissions with access to basic SuperAgent reports: ■ Engineering ■ Operations ■ Incidents ■ Management Product Permissions Product permission is an aspect of a user account that grants or restricts access to administrative features. Each level of product permission corresponds to a predefined role. The SuperAgent Administrator can assign different roles and privileges to user accounts and can customize roles to grant access to different product areas. The predefined Power User permission does not exist in Multi-Port Collector. However, Power Users with access to the SuperAgent Engineering product area can access all Multi-Port Collector features except features on the Administration page. NetQoS Performance Center supports the product permissions in use in SuperAgent and Multi-Port Collector, but they operate on a different level. Product privileges can be used to allow a single user account different levels of access to different CA data source products. For example, a person can be a user of SuperAgent, with the ability to view selected items in NetQoS Performance Center. This same person can also be an Administrator for a specific instance of SuperAgent when navigated to from a NetQoS Performance Center view. Chapter 2: Post-installation Configuration Tasks 43 What are Users and Roles? All Multi-Port Collector operators have access to the System Status page by default. The Administrator product permission is required for an operator to access the Administration page. However, the role for the user account determines access to the Analysis area. And the ability to export an analysis to PCAP format is further restricted to a second area access parameter. Access to the Analysis page in Multi-Port Collector is associated with access to the SuperAgent Engineering tab. The Area Access parameter of the user account role determines this access. But even this access is not sufficient to allow the user to export PCAP files, which requires access to the Investigations area. The following list summarizes the types of product permission available in SuperAgent and Multi-Port Collector and explains their default areas of access: Administrator level This level of permission is typically associated with the role of Network Manager and provides access to the following features: ■ Analysis page ■ System Status page ■ Administration page ■ Export Analysis to PCAP feature Power User, or Investigator, level No predefined Power User account is available in Multi-Port Collector. This level of permission is the default for the role of Network Engineer and provides access to the following features: ■ Analysis page ■ System Status page ■ Export Analysis to PCAP feature User level This level of permission is the default for the role of Network Operator and provides access to the following features: ■ Analysis page ■ System Status page The default Network Operator role does not allow the associated user to export data to the PCAP format, which can contain sensitive data. To grant the necessary area access to a user with this role, the SuperAgent Administrator can add the Investigations area to the Network Operator role. SuperAgent user accounts also have assigned permission sets, which control access to data by user, based on aggregations of managed items. Multi-Port Collector does not support permission sets. 44 User Guide What are Users and Roles? In NetQoS Performance Center, the product permission setting overlaps with the role settings at the data source level. A user must have access rights and at least User product permissions for a data source to perform the following: ■ View reports ■ Drill into views ■ Navigate to that data source from NetQoS Performance Center. Permissions and role-determined access rights that apply in NetQoS Performance Center are preserved within the Multi-Port Collector web interface. Chapter 2: Post-installation Configuration Tasks 45 Chapter 3: Analyzing Data Granular views of session-level network data appear on the Analysis page in the web interface. The Analysis page contains two panes. Display area The right pane, which contains a chart and a data table. Tabbed views provide easy access to formatted performance metrics. The chart and table provide multiple options for viewing data, selecting chart formats, and sorting metrics to find outliers. Note: Although Multi-Port Collector reports data at a 1-minute granularity, it loads collected metrics to the database every 2 minutes, for performance reasons. This difference causes a delay before you can view the most recent collected data in the Display area. Analysis pane The left pane, which contains options for selecting data views and filtering the data shown in the Display area. You can create analytical filters for data views and save them as reusable troubleshooting work flows. A list of active filters appears at the top of the Analysis pane. The primary filtering types are: ■ Analysis filters (see page 57) are explicitly applied to data when you use the Add Analysis Filter option, or are implicitly created when you double-click an item in the Display area. ■ Global filters (see page 65) apply to all analyses and are based on a drill-down context from SuperAgent. This section contains the following topics: What is an Analysis? (see page 48) Use Filters to Customize Data in the Display Area (see page 55) Understand the Data in the Display Area (see page 67) Chapter 3: Analyzing Data 47 What is an Analysis? What is an Analysis? An analysis is a description of a troubleshooting path into packet-level session data stored on Multi-Port Collector. The description proceeds as a series of hierarchically organized views of the data. Multi-Port Collector offers two types of analysis. Predefined Analysis Provides access to TCP session-level information that is used when drilling in from a SuperAgent report or APM Defect Details page. For example, you examine the SuperAgent Components report and narrow the data for the 192.94.5.6 network. When you click the Session Analysis button, an analysis for the selected report appears on the Multi-Port Collector Analysis page. The selected network and time frame filter the session-level data in the analysis. Custom Analysis Provides multiple options for filtering and viewing session-level metrics to speed up the troubleshooting process. The Multi-Port Collector user can create, save, and reuse custom analyses. For example, the drilldown, or Session Analysis, path from SuperAgent places you in a preselected context that is not applicable to your situation. You create an analysis or open a saved analysis to save some steps in selecting the desired views and their hierarchical arrangement. The associated charts and tables provide a sufficiently narrowed perspective on the data you want to analyze. All analyses are displayed in the Analysis pane, to the left of the Display area on the Analysis page. Filters are added to analyses at the view level and are applied to all subordinate views within the same analysis. New analyses do not contain default data views. Add a view to data before applying a new analysis. Analysis Menu The Analysis menu lets you see all available analyses, and create and modify analyses. The menu is visible by default in the left pane of the Analysis page. You can hide it to expand the available viewing area for charts and tables. Click the << or >> symbol labeled Analysis Menu to hide or display the Analysis pane. 48 User Guide What is an Analysis? Within the Analysis pane, the active analysis is highlighted in blue with white text. All other analyses are shown in gray. The active analysis and its filters are applied to the report that is visible in the Display area. Child views of the active analysis are available to report increasing levels of detail, down to the TCP conversation level in some analyses. Their associated filters are designed to include or exclude specific sessions in the metrics shown in the Display area. Expand an analysis to see the views associated with it. Click the blue arrow next to the analysis name to expand or collapse it. Collapsing or expanding an active analysis does not remove or add filters. You can apply another view to the current time frame to look at the data in a different context. To apply another analysis, expand it in the Analysis pane, and then click an associated view. Predefined Analyses Predefined analyses are sorting and display options selected to assist you in analyzing data. They have a designation of "Default" in the Analysis menu. You can temporarily customize predefined analyses by adding analysis filters. You cannot save these modifications, which persist only for the current login session. All analyses mine the data to an increasing level of granularity. Each view into the data is associated with a predefined analysis. When you select an analysis, it expands to show a list of views in a hierarchical structure. This structure represents the increasing level of detail that you can access from the monitored data. Each view thus provides access to more detailed metrics stored in the database for the selected time frame. Chapter 3: Analyzing Data 49 What is an Analysis? Analyses aid troubleshooting efforts by helping you investigate a particular item. With any analysis, it is helpful to think of the initial data view as corresponding to the item being investigated. For example, the Client IP Address analysis helps you find the source of an issue with a client computer whose IP address is known. First, the Client view is applied. Double-click a client to drill down to the next view in the analysis, which shows all servers that conversed with that client. Multi-Port Collector offers the following predefined analyses. Application Use this analysis to identify an application that has a problem. This analysis identifies the IP address of the server where the application is running and the port numbers that the application uses. Contains the following data views: ■ Server IP Address Server/Client Pair TCP Conversation ■ Client IP Address Server/Client Pair TCP Conversation Server IP or Client IP Use this analysis to identify a single host that has a problem. Contains the following data views: ■ Server IP Address Server/Client Pair TCP Conversation ■ Client IP Address Server/Client Pair TCP Conversation Network Use this analysis to identify the problem for multiple hosts on a subnet. Contains the following data views: ■ Server IP Address Server/Client Pair TCP Conversation ■ Client IP Address Server/Client Pair TCP Conversation IP Address Use this analysis to identify a single host that has a problem. Contains the following data views, organized into several possible filtering paths through the captured data: ■ Server IP Address Server/Client Pair TCP Conversation ■ Client IP Address Server/Client Pair TCP Conversation ■ IP Address Pair IP Session Protocol Use this analysis to identify the problem for traffic that uses a single protocol. Contains the following data views: ■ 50 User Guide IP Address IP Address Pair IP Session What is an Analysis? Create a Custom Analysis Predefined analyses cannot be permanently modified. To preserve filters or analytical work flows, create a custom analysis. Follow these steps: 1. Click New Analysis in the Analysis pane. A new item appears in the Analysis pane. The default name, My Analysis 1, is highlighted. The Views pane opens to the right of the Analysis pane. 2. Type a name for the new analysis in the highlighted field. 3. Select a view to add to your custom analysis in the Views pane. 4. Drag the view to the "Drag and drop views here" section of the Analysis pane. 5. Repeat Steps 3 and 4 to add data views to your analysis. We recommend adding views in a hierarchical flow of increasing granularity, with additional items filtered out as the views proceed downward. Chapter 3: Analyzing Data 51 What is an Analysis? 6. (Optional) Add advanced filters. Right-click a view and select Add Analysis Filter. The Add Analysis Filter dialog opens. For descriptions of the fields, see Filters for Data Views (see page 57). 7. Click Save My Analyses. The action of saving an analysis preserves the changes you make to a custom analysis. Multiple changes can be saved simultaneously. Important: If you are viewing an emailed analysis that you received from another user, clicking Save My Analyses overwrites all previously saved analyses. Duplicate an Analysis You can duplicate custom and predefined analyses. The duplication feature lets you save the modifications you make to an analysis. Follow these steps: 1. In the Analysis pane, right-click the analysis that you want to duplicate. 2. Select Duplicate. A new analysis appears in the Analysis pane, with the naming convention of "My Analysis #." 3. Type a new name for the duplicated analysis. Delete a Custom Analysis You can delete a custom analysis. You cannot delete a predefined analysis. Follow these steps: 1. In the Analysis pane, right-click the name of the analysis you want to delete. 2. Select Delete Analysis. 3. Click OK in the confirmation message. The analysis is removed from the Analysis pane. 52 User Guide What is an Analysis? Data Views Data views help you investigate an area of network performance. Predefined analyses contain data views. You can create and modify custom analyses with their own sets of views. The Views menu opens automatically when you create an analysis. You can also click the Views button to see the list of available data views. You can customize Multi-Port Collector data views based on the following: ■ Filters, which focus on the traffic of interest ■ Chart formats, which graphically display performance metrics of interest ■ Data table settings, which selectively display metrics of interest. For each view, a default sorting method is applied. For example, in the Protocol analysis, protocols are sorted from highest byte rate to lowest. You can customize data views. Some changes are automatically saved to views, such as a change in the chart format. Application Highlights response time (Transaction Time in milliseconds) per application. Application names are derived from SuperAgent configuration or from well-known port usage. Where available, the application name is supplied. Otherwise, the port number is shown. The default chart shows the trend in response times and their composition. The Transaction Time is broken down into Network Round-Trip Time, Retransmissions, Data Transfer Time, and Server Response Time. Client IP Address Highlights response time (Transaction Time in milliseconds) per client. Multi-Port Collector identifies client computers based on the three-way handshake that initiates a TCP conversation. The chart shows the trend in response times and their composition. IP Address (Traffic tab) Highlights throughput (Byte Rate in bits per second) per host IP address, sorted by highest to lowest byte rate. The chart shows the directional Byte Rate, to and from the host with the highest rate. IP Address Pair (Traffic tab) Highlights throughput (Byte Rate in bits per second) per conversing pair of host IP addresses, sorted by highest to lowest byte rate. The chart shows the directional Byte Rate, to and from the pair of hosts with the highest rate. Chapter 3: Analyzing Data 53 What is an Analysis? IP Session (Traffic tab) Highlights throughput (Byte Rate in bits per send) per session. Each session represents a conversing pair of host IP addresses. Sessions are sorted by highest to lowest Byte Rate. The chart shows the composition of the Byte Rate to and from the top ten sessions with the highest throughput. Logical Port Highlights response time per logical port, that is, per switch mirror port session, coming in to Multi-Port Collector. The chart shows the trend in response times (as Byte Rate). Network Highlights response time (Transaction Time in milliseconds) per network. Networks are identified based on SuperAgent configuration. The chart shows the trend in response times and their composition. Protocol (Traffic tab) Highlights throughput (Byte Rate in bits per second) for each protocol that passes hardware filtering. The total number of bytes sent and received is shown, and the number of TCP bytes. The Layer 3 protocol is also indicated. The chart shows the throughput trend (as Byte Rate) over time. Server IP Address Highlights response time (Server Response Time in milliseconds) per server. The chart shows the trend in response times and their composition. Server/Client Pair Highlights response time (Transaction Time in milliseconds) per pair of hosts (client and server). The chart shows the trend in response times and their composition. TCP Conversation Highlights response time (Transaction Time in milliseconds) per session. Each session consists of a server host plus a client host and port. The chart shows the trend in response times and their composition. More information: Use Hardware Filters to Manage Data (see page 21) Configure Logical Ports (see page 19) Create an Analysis Filter (see page 57) View the Current Filter Conditions (see page 56) 54 User Guide Use Filters to Customize Data in the Display Area Use Filters to Customize Data in the Display Area Multi-Port Collector offers several methods for narrowing the scope of session-level metrics shown in the Display area of the Analysis page. The following options can be applied to the data displayed from a selected analysis. Data views You can select different data views to focus on the network aspect that makes the most sense for the current troubleshooting task. For example, if an application has slow response time, select the Server IP view or the Application view to see the associated metrics. Use analysis filters (see page 57) to filter the data in a view. Note: Analysis filters are distinct from the Hardware filters you apply to captured data. Hardware filters affect the capture of data. Analysis filters affect the display of data. Context-specific filtering ■ Select a row or a series of rows in the data table. Right-click and select Apply As Filter to narrow the scope of data in the current analysis. To highlight multiple rows, use Ctrl+Click or Shift+Click. ■ Use the mouse pointer to select a specific section of the chart. Release the mouse pointer and click Set. The chart refreshes to focus on a narrower segment, such as a spike in the line graph indicating exceptions to baseline metrics. Drill-down filtering ■ Double-click a row in the data table to drill one level down to the next view in the analysis. ■ Drill down from an APM defect to view associated data on the Analysis page. An analysis filter is automatically created based on the context of the defect, such as server, application, or client. ■ Click Session Analysis in a SuperAgent report to view associated data on the Analysis page. Global filters (see page 65) on the Analysis page are based on the context of the SuperAgent report. Zoom filtering Line graphs provide additional filtering options. The Zoom In and Zoom Out links let you focus more closely on the performance metrics from a smaller segment of captured data. ■ Zoom In reduces the current time frame so that a smaller segment of data is charted. ■ Zoom Out restores the time frame to a broader segment of data. Chapter 3: Analyzing Data 55 Use Filters to Customize Data in the Display Area Time frame filtering The Summary Trend chart, Line Trend chart, and Stacked Trend chart formats include a time-navigation component above the Display area. The default time frame is 15 minutes. The Time Period Selector enables precise selection of another time frame. ■ The Backward and Forward buttons let you move forward or backward in time through the captured data. This type of time navigation lets you view trend data and follow each trend as it proceeds. ■ The date, hour, and minutes are menus from which you can select other date and time parameters. ■ The date is a graphical calendar menu with forward and backward navigation. ■ The Timeframe link provides quick access to larger time segments, from "Last 15 Minutes" to "Last 180 Minutes." More information: Use Hardware Filters to Manage Data (see page 21) Data Views (see page 53) View the Current Filter Conditions You have several options for viewing the information about the filters that are applied to an analysis. ■ 56 User Guide Click the Show Filters link in the Analysis pane or in the Display area to see the following information: ■ A list of all global filters inherited from the SuperAgent report ■ A list of analysis filters applied to the current data view ■ In an analysis, use the mouse pointer to hover over a filtered data view. The flyover text describes the conditions and syntax of the filter. ■ In an analysis, right-click a data view and select Edit Analysis Filter. The Conditions field in the Edit Analysis Filter dialog identifies the conditions and syntax of the filter. ■ In an analysis, click the filter icon. The Conditions field identifies the conditions and syntax of the filter. Use Filters to Customize Data in the Display Area Analysis Filters You can apply regular expressions to data views to limit the data in the Display area. This type of filtering is an analysis filter. Regular expression filters are applied directly to a data view that is a component of an active analysis. You can only save the filters as part of analysis customization. Create an Analysis Filter You can apply regular expressions to data views to limit the data in the Display area. This type of filtering is an analysis filter. Regular expression filters are applied directly to a data view that is a component of an active analysis. You can only save the filters as part of analysis customization. When you add an analysis filter to a data view, the new filter and any inherited filters are applied to the view. You can see the inherited filters in the Add Analysis Filter dialog. Note: New filters do not modify inherited global filters. Instead, they provide an additional filter to the data that passed the global filters. Follow these steps: 1. Right-click a view within an analysis and select Add Analysis Filter. The Add Analysis Filter dialog opens. Filters inherited from another view in the same analysis are indicated in the Inherited Analysis Filters field. 2. Select filters from the Parameter field. As you click each item, help with the appropriate syntax for the Value appears. 3. Select an operator. 4. ■ Equals (=) ■ Does Not Equal (!=) Type a value to complete the expression. Use the syntax online help for guidance. Note: The use of certain expressions in the Value field effectively disables the filter. Do not use the expressions from the list of Reserved Filter Expressions. 5. Click Add to Conditions. The filter statement appears in the Conditions field. Note: To remove the filter statement, click the [Clear] link above the Conditions field. You can also edit the statement by typing in the Conditions field. Chapter 3: Analyzing Data 57 Use Filters to Customize Data in the Display Area 6. 7. (Optional) Select a Boolean operator and repeat steps 3 through 5 to add conditions in relationship to the existing filter statement. ■ AND (concatenation) ■ OR (alternation) Click OK. The filter is validated. If valid, it is applied to the data table and chart in the Display area. A filter icon appears next to the view name in the Analysis pane to indicate that analysis filtering is applied. More information: Create a Custom Analysis (see page 51) Reserved Filter Expressions The following is a list of reserved filter expressions. Do not use the following case-sensitive strings in the Value field in the Add Analysis Filter dialog. ApplicationName, ApplicationTypeID, ApplicationNameTypeID ClientNetworkName, ClientNetwork HostName, Host L4Port LogicalPortName, LogicalPort L3ProtocolName, L3ProtocolNumber, L4ProtocolName, L4ProtocolNumber, L34ProtocolName, L34ProtocolNumber MAC NetworkName, Network PairName, Pair ServerName, Server SessionID, ToS, or VLAN The analysis filtering function cannot create the query syntax when the parameters include one of the reserved filter types followed by "=" or "!=." If you use a reserved term, use a different case than the one specified in the list. 58 User Guide Use Filters to Customize Data in the Display Area Values Associated with the Parameter Field The following table describes the syntax for the Values field, based on the item selected in the Parameter field. Application Name Filter for an application name. Application names in the Display area are derived from SuperAgent configuration or from well-known port usage. Type a name or a comma-separated list of names. Wildcards are accepted. Examples: Secure HTTP* Secure HTTP (443) Application Name/Type/ID Filter for three values that represent an application name, type, and ID number. These values can be seen when the Application Name, Application Type, and Application ID columns are enabled in the Edit Columns dialog. Specify the trio as “name/type/ID.” Example: MySQL (3306)/Monitored/3 Note: The Application Type/ID and Application Name/Type/ID parameters require internally assigned values. Apply them directly from the data table with the right-click menu. Application Type/ID Filter for a pair of values that represent an application type and its ID number. These values are available when the Application Type and Application ID columns are enabled in the Edit Columns dialog. Specify the pair as “type/ID." Example: Monitored/10 Client Network Filter for the IP address of a client network subnet, or a comma-separated list of subnets. Use a slash (/) to separate the mask from the address. Examples: 192.3.45.0/24 192.3.45.0/24,192.3.46.0/24,192.3.50.0/24 Client Network Name Filter for the name of a client network, or a comma-separated list of networks that are defined for monitoring in SuperAgent. Host Filter for an IP address. The default filter parameter. Type a single IP address, a range of IP addresses, a comma-separated list of IP addresses, or a comma-separated list of address ranges. Use hyphens and no spaces in address ranges. Examples: 198.168.0.1, 198.165.0.1-198.165.1.255 Chapter 3: Analyzing Data 59 Use Filters to Customize Data in the Display Area Host Name Filter for a client or server DNS host name. Type a DNS host name or a comma-separated list of host names. Wildcards (*) are supported. This parameter is the default. Examples: exchangeserver1, *noc*, database* Layer 3 Protocol Name Filter for a Network Layer protocol. Type the name of a Layer 3 protocol, or a comma-separated list of names. Example: IP Layer 3 Protocol Number Filter for a Network Layer protocol. Type the decimal registry number of a Layer 3 protocol, or a comma-separated list of registries. Layer 3-Layer 4 Protocol Name Filter for a pair of protocols from Layers 3 and 4. Type a pair of protocol names, or a list of pairs of names. Use a slash (/) as a separator to indicate a pairing. Example: IP/TCP Layer 3-Layer 4 Protocol Pair Filter for a pair of protocols from Layers 3 and 4. Type a pair of protocol registry numbers, or a list of pairs of numbers. Use a slash (/) as a separator to indicate a pairing. Example, for IP/TCP: 2048/6 Layer 4 Port Filter for Transport Layer port numbers. Type a port number or a comma-separated list of port numbers. Example, for HTTPS: 443 Layer 4 Protocol Name Filter for a Transport Layer protocol. Type the name of a Layer 4 protocol, or a comma-separated list of names. Layer 4 Protocol Number Filter for a Transport Layer protocol. Type the decimal registry number of a Layer 4 protocol, or a comma-separated list of registries. Logical Port Filter for a logical port number. Type a logical port number or a comma-separated list of numbers. This parameter lets you see only the data that is mirrored from specific sources. 60 User Guide Use Filters to Customize Data in the Display Area Logical Port Name Filter for a logical port name that you defined on the Multi-Port Collector appliance. Type a logical port name or a comma-separated list of names. MAC Address Filter for a Media Access Control address, or a comma-separated list of MAC addresses. Example: 00:19:2f:aa:bb:cc Network Name Filter for a SuperAgent network name. When you configure networks in SuperAgent Administration, you can provide a name for each. In this field, type a network name or a comma-separated list of names. Network Filter for a network subnet. Type the IP address of a network subnet, or a comma-separated list of subnets. Use a slash (/) to separate the mask from the address. Examples: 192.3.45.0/24 192.3.45.0/24,192.3.46.0/24,192.3.50.0/24 Pair Filter for a pair of conversing hosts by IP address. Type a pair of IP addresses or a comma-separated list of pairs of IP addresses. Use a slash (/) between the addresses to indicate a pair. Example: 198.168.0.1/198.168.0.18 Pair Name Filter for a pair of conversing hosts by DNS host name. Type a pair of host names or a comma-separated list of pairs for the value. Use a slash (/) between the host names to indicate a pair. Example: MyServer1/MyClient1 Server Filter for a server IP address. Type the IP address of a server, or a comma-separated list of addresses. Use dotted notation. Example: 192.3.45.0 Server Name Filter for a server host name. Type a host name or a comma-separated list of host names. Chapter 3: Analyzing Data 61 Use Filters to Customize Data in the Display Area Session ID Filter for a TCP session ID number. Type a session ID number or a comma-separated list of ID numbers. The session ID is an internal identifier that is available when the Session ID column is enabled in the Edit Columns dialog. ToS Filter for a Type of Service bit setting. Type a ToS setting, in decimal format, or a comma-separated list of settings. Example for 0100, maximize throughput: 4 VLAN Number Filter for a Virtual LAN ID number. Type a VLAN ID number or a comma-separated list of numbers. More information: Configure Logical Ports (see page 19) Add or Remove Columns in a Data Table (see page 80) How Filters Query the Database Some analysis filters are paired sets in the Add Analysis Filter dialog. For example, you can filter by Host (the IP address) or by Host Name: These filter parameters are applied intelligently to create a useful chart. For example, select the Host parameter to filter data on the TCP tab of the Client IP Address view. The data shows only client addresses that match the filter value. If you then apply the same Host filter to the Server IP Address view, the data shows only server addresses that match the value. 62 User Guide Use Filters to Customize Data in the Display Area Some data views do not limit the display in this way. For example, the Protocol or Application views filter by clients or servers. The Traffic tab applies less filtering in general. For the Host or Host Name parameters, the Traffic tab displays hosts in the Address1 or Address2 column. The Network data view and the Network analysis filters do not always search all networks defined in SuperAgent. SuperAgent classifies networks as either client or server networks, based on the role these hosts play in captured transactions. The Network and Network Name filters, which match network address or name values, default to matching on client networks. However, they also issue different database queries based on the selected data view and tab. ■ When the Network view and TCP tab are selected, only client networks are queried for matching values. ■ When the Server IP view is selected, only the Network and Network Name analysis filters send queries for matching server networks. Change the Properties of an Analysis Filter You can modify an analysis filter that is applied to a data view. You can modify filters from the Analysis menu, using the following procedure detailed. Or you can modify a parent filter using the right-click options on the data table. Those changes overwrite any analysis filters previously applied to child views. Follow these steps: 1. Locate the filter you want to delete. A filter icon identifies an active filter. 2. Right-click the filter and select Edit Analysis Filter. The Edit Filter dialog identifies the active filters in the Conditions field. Filters inherited from another view in the same analysis are shown in the Inherited Analysis Filters" field. Note: Within an analysis, filter inheritance proceeds downward from a preceding view to all subsequent views in the same analysis. 3. 4. Select a Boolean operator to add conditions in relationship to the existing filter statement. ■ AND (concatenation) ■ OR (alternation) Select filters from the Parameter field. As you click each item, help with the appropriate syntax for the Value field appears. Chapter 3: Analyzing Data 63 Use Filters to Customize Data in the Display Area 5. 6. Select an operator. ■ Equals (=) ■ Does Not Equal (!=) Type a value to complete the expression. Use the syntax online help for guidance. Note: Certain expressions disable the filter when supplied for the Value field. Do not use the expressions from the list of Reserved Filter Expressions. 7. Click Add to Conditions. The filter statement appears in the Conditions field. Note: To remove the statement, click the [Clear] link above the Conditions field. You can also edit the statement by typing in the Conditions field. 8. Click OK. The modified filter is validated. If valid, the filter is applied to the data table and chart in the Display area. More information: Reserved Filter Expressions (see page 58) Values Associated with the Parameter Field (see page 59) Delete an Analysis Filter You can delete an analysis filter that is applied to a data view. Use the mouse pointer to hover over a filter to see the current filter conditions. You can delete one filter or all filters for an analysis. Follow these steps: 1. Locate the filter that you want to delete. A filter icon identifies a filter. 2. Right-click the filtered view and select Remove Analysis Filter to delete one filter. The table and chart in the Display area are refreshed to include data that had been filtered out. 3. Right-click the name of the analysis and select Remove All Filters to delete all filters. The table and chart in the Display area are refreshed to include data that had been filtered out. 64 User Guide Use Filters to Customize Data in the Display Area Global Filters Global filters are inherited from the SuperAgent report context that was in effect when you initiated a Session Analysis. Each global filter setting indicates the context, such as a specific server, or ‘All’ if no specific context is indicated by SuperAgent. A list of active global filters is displayed at the top of the Analysis pane. Application, Server, and Network global filters are listed first, followed by the Logical Port that was selected during the Session Analysis procedure. Queries to the Multi-Port Collector database filter the data. The queries depend on the type of filter and on the selected data view, and are selected to optimize the data that is returned. The Server global filter focuses attention on the specified server. The Network global filter focuses attention on clients within that network. You can modify a global filter to limit the data that is presented in the Display area. You can also clear a global filter to return it to the default setting. Global Filters Dialog The Global Filters dialog provides the following information. Application tab ■ Name. The name of the application, if available. The port number is shown in parentheses. ■ Application Type/ID. The application identifier. Usually a pair of values that represent an application type and its ID number. Each pair identifies an application in the Multi-Port Collector database. Server tab The Server tab contains a list of hosts. A host is determined to be a server based on its role in monitored transactions. Multi-Port Collector can distinguish servers and clients within the captured conversation data. ■ Name. The name of the server as configured in SuperAgent, usually the DNS host name. ■ IP Address. The IP address of the server. Network tab The Network tab identifies client networks. The SuperAgent concept of networks is based on monitoring client regions and observing client-server transactions from those regions. ■ Name. The name of a network as defined in SuperAgent. A network is treated as a client region for purposes of SuperAgent performance monitoring. ■ Subnet. The client region, as determined by the combination of subnet IP address and mask. Chapter 3: Analyzing Data 65 Use Filters to Customize Data in the Display Area Logical Port tab ■ Name. The name of the logical port, as defined by the Multi-Port Collector Administrator. The default name is the same as the port number. ■ Logical Port. The number of the logical port. Identifies the port on the Logical Ports page. The default logical port definition corresponds to the port ID number on the adapter. Modify a Global Filter You can change a global filter to restrict the data included in an analysis. Note: If you change the Logical Ports global filter, you effectively change the entire data set for the selected analysis. Follow these steps: 1. Click [change] next to the global filter you want to change in the Analysis pane. The Global Filters dialog opens. 2. Click the tab that corresponds to the global filter you want to change. For example, to filter the analysis by an application running on the monitored network, click the Application tab. The tab displays a list of all known applications whose traffic is reflected in the captured packets from the time frame you are viewing. 3. Select an application in the list. For example, select "Simple Mail Transfer Protocol." The application you selected is displayed as Currently Selected, and the application port number is displayed in parentheses. The selected application also filters the lists of items on the other tabs in the Global Filters dialog. 4. Click another tab to apply more restrictions to the data included in the analysis. For example, click the Server tab. Only servers that are running the selected application (SMTP, in this example) are shown in the list. Select a server. 5. Click OK. The chart and table for the current analysis are filtered to show only data from the SMTP application and its application servers. 66 User Guide Understand the Data in the Display Area Clear a Modification to a Global Filter You can remove, or clear, a change you made to a global filter. By clearing a change, you return the global filter to the default setting, "All." Follow these steps: 1. Click [change] next to the global filter you want to clear in the Analysis pane. The Global Filters dialog opens and displays active global filters as Currently Selected. 2. Click [Clear] next to the selected filter. 3. Click another tab to see which filters are selected and then repeat step 2. 4. Click OK. The data table and chart are refreshed to include the information that had been filtered out. Understand the Data in the Display Area The Display area contains a chart and a data table. The following items affect the data in the chart and table: ■ Time frame ■ Global filters ■ Analysis filters ■ The active tab in the data table: either the TCP or Traffic tab The chart provides a series of format buttons down the right side to let you apply other chart formats for the same data. You can expand the size of the Display area by hiding the Analysis pane. Click the Hide icon (<<) on the Analysis pane to hide it. The chart and table are linked so that they always display data in complementary formats. The table displays more data than the chart. However, the chart reflects the filters you apply to the table, such as changing the sort order and selecting a new page. The data table presents performance data for troubleshooting and analysis. You can sort each column to view outliers and minimum results. Two filters always affect the data table: ■ The current time frame ■ The filtering parameters of the current analysis Chapter 3: Analyzing Data 67 Understand the Data in the Display Area A predefined analysis includes minimal filters and applies some logic to limit the data to a manageable quantity. This technique speeds up database queries and also makes the Display area more coherent for the typical user. Data from the first ten table rows is represented in the chart, with the exception of the Summary Trend chart. The Summary Trend chart reflects data from all table rows. You can display more table rows by increasing the Max Per Page setting. More information: Data on the Traffic Tab (see page 72) Data on the TCP Tab (see page 75) Add or Remove Columns in a Data Table (see page 80) Types of Charts The chart in the Display area is refreshed in the following circumstances: ■ You initiate a Session Analysis from a SuperAgent report ■ You click a data view in the Analysis pane ■ You select a column in the data table in the Display area ■ You drill down from an APM defect The chart and table offer mutually supported filtering options. When you click a column heading in the data table, the table is refreshed to sort all the available rows by the selected item. The chart is refreshed to display the selected item. When you click the TCP or Traffic tab, the data in the chart automatically changes accordingly. Most charts are restricted to the top ten entries. One exception is the Summary Trend chart, which conforms to SuperAgent conventions and includes data from the entire data table. Each trend chart lets you select the time frame and zoom options. 68 User Guide Understand the Data in the Display Area Bar Chart The Bar chart format represents data averages from across the selected time period. Each bar represents the data in a single table row. The Y-axis identifies each table row. A maximum of ten rows can be included in a single Bar chart. The Y-axis label indicates the columns that identify the row. For example, the Y-axis shows each corresponding server name for the Server IP Address view. The X-axis usually displays the metric values and their units. This type of chart format is most useful for comparing performance metrics from different entities. For example: ■ Compare the server response time of one server to another ■ Compare the TCP Byte Rate of the top ten applications Each part of the bar provides flyover text to identify a metric and its value. This feature is useful for understanding which component metric contributed the most to the total represented by the bar. Click a bar in the chart to highlight the corresponding row in the data table. You can then right-click the table row and select Apply as Filter to view data associated solely with the entity on which you are focused. Important: Certain metrics are shown as a single value, such as Server Response Time. Other metrics are shown in a composite format, such as Transaction Time. A composite chart displays as selected metric as a portion of the whole metric. The composite Bar chart shows a breakdown of a single value to its units. Line Trend Chart In the Line Trend chart format, a line represents data from each row in the data table. The line plots the selected metric across the time period. Up to ten data rows are plotted per chart. The Y-axis identifies buckets of metric values, such as Server Response Time (SRT) in milliseconds. The X-axis displays time units to indicate trends. This type of chart format provides a quick overview of system status and trends. For example: ■ when you access the Server IP Address view to compare server response time trends and drill down into a spike in SRT ■ when you filter on a single IP address to find the source of gradually increasing transaction times Chapter 3: Analyzing Data 69 Understand the Data in the Display Area Pie Chart The Pie chart format represents the top ten entries for a selected metric as pieces of a pie. Each piece is a percentage of a whole. All pieces add up to 100 percent of the selected metric total for the top 10 table entries. One pie piece, with an assigned color, represents a row in the data table. Note: Certain metrics, such as TCP Byte Loss Percentage, are not appropriate for display in the Pie chart format. The top 10 entries do not always account for 100 percent of all activity observed during the selected time period. You can enable an 11th pie piece to represent an aggregate of the rest of all the table rows (Other). Flyover text is available for each pie piece to help identify the hosts. Click a pie piece to highlight the associated hosts in the data table. You can then filter by that data. Drill-in to the “Other” piece is not supported. This type of chart format is most useful for comparing the relative contributions of hosts to a selected metric. For example, filter on a particular server and select the Server/Client Pair view. Then select the TCP Bytes metric and see which clients contribute most to the data volume of a server. Stacked Trend Chart The concept behind the Stacked Trend chart is similar to that of the Pie chart, except that the values are plotted over time. One line of a different color is displayed per table row. Up to ten rows are plotted per chart. The lines are filled and stacked, with the highest table row plotted on the bottom of the chart. A downward fill below each line helps you see how each region of data is related to the others and to the larger metric. A thick, black line labeled "Total" identifies where 100 percent of the plotted metric falls along the Y-axis. To remove this line from the chart, click the Hide link next to the legend. This type of chart is most useful for comparing the relative contributions of selected entities to a performance metric over time. For example, filter on a particular server and select the Server/Client Pair view. A Stacked Trend chart for the TCP Bytes metric indicates whether data volumes from different clients are changing over time. The Stacked Trend chart is not applicable for certain types of metrics, such as TCP Byte Loss Percentage. 70 User Guide Understand the Data in the Display Area Summary Trend Chart The Summary Trend chart uses a stacked format to display the data points from all table rows and all pages in the data table. The chart displays a layered view of the values for a selected metric. Each value equals the vertical distance between the upper and lower metric boundary lines, not the distance from 0 to the upper boundary line. This chart format resembles the Stacked Trend chart, with the following differences: ■ The Stacked Trend chart displays a single metric, representing a single column in the data table, for only the current page of the data table. ■ The Summary Trend chart displays multiple metrics from all rows and table columns, with values averaged across all columns. The stacked format is useful for showing composite data. The value for each metric is treated as a portion of the whole metric. Each data point shows a breakdown of a single metric into its component parts. Lines of different colors show the data points that compose an overarching value, such as the components of TCP transaction response time: network round-trip time, server response time, and data transfer time. To represent the trends in the plotted metrics, the chart is plotted over the selected time period, with time values shown on the X-axis. Types of Data The data table consists of two tabbed views that provide different perspectives on captured data from the same time frame. Each view provides different metrics and applies filters in different ways. TCP tab The TCP tab contains data specific to TCP-based applications and metrics that are used in SuperAgent reports, and performance metrics calculated from the captured packets. The label on the Name column changes to indicate whether clients or servers are displayed. Note: The TCP tab is selected by default when you drill down from SuperAgent. In general, the format of the data on the TCP tab closely resembles the format of data in SuperAgent reports. Chapter 3: Analyzing Data 71 Understand the Data in the Display Area Traffic tab The Traffic tab contains all other available data, not restricted to TCP applications. The Traffic tab does not apply a concept of client or server. Therefore, the Name column can show the names of both clients and servers, depending on the selected view. The Traffic tab also includes non-TCP traffic, which can result in the inclusion of additional hosts. The names of some performance metrics are abbreviated in the data table to reduce table width. To see the full name of a metric, position the mouse pointer over the abbreviated column name or its check box. The flyover text provides the full name of the selected metric. Data on the Traffic Tab The Traffic tab of the data table provides a comprehensive view of the packets passing through the monitored mirror ports. Only the columns applicable to the selected view are shown in the table. The following list describes all possible columns for the Traffic tab. Application Application names are derived from SuperAgent configuration or from well-known port usage. Where available, the application name is supplied. Otherwise, the port number is shown in parentheses. Application ID The second value in a pair of values that identifies an application. An internal identifier. Application Type Identifies an application in the Multi-Port Collector database. In most cases, conveys the state of this application with respect to SuperAgent. One of the following types: ■ n/a: Unknown protocol. ■ Monitored: Application uses TCP. SuperAgent monitors this application. If multiple collection devices report to one SuperAgent management console, it is possible that a different collection device monitors this application for SuperAgent. The Application Type designation refers to items actively monitored only by this Multi-Port Collector. 72 User Guide ■ UDP-Not monitored: Application is defined in SuperAgent, but uses UDP. SuperAgent does not monitor UDP. ■ TCP-Not monitored: Application is defined in SuperAgent and uses TCP. However, SuperAgent is not monitoring the application. Understand the Data in the Display Area ■ TCP-Unknown: Application uses TCP, but is not defined in SuperAgent. Application column shows “Port X.” ■ UDP-Unknown: Application uses UDP, which SuperAgent does not monitor. Application is not defined in SuperAgent or in the Multi-Port Collector list of well-known UDP ports. Application column shows “Port X.” Byte Rate Server processing efficiency, measured in bits per second (bytes per second x 8). This throughput value is significant for capacity planning, because it provides a sense of server load or usage. Byte Rate From, Byte Rate To Throughput in bits per second (bytes per second x 8) for data sent by or received by the selected host. Bytes Data volume in bytes. The total number of Application-Layer bytes sent and received during the selected time period and selected client-server sessions. Bytes From, Bytes To Data volume in bytes. The total number of Application-Layer bytes sent by or received by the selected host during the selected time period. IP Address, IP Address 1, IP Address 2 The IP address of the host. The “1” or “2” designation appears for the paired data views and indicates the direction of data flow between hosts. Layer 3 Protocol The name of the Network Layer protocol (IP, IPv6, or ARP), or an ID number from the Ethertype field in the packet header. Indicates “Ethertype=X” when an IEEE 802 Ethertype value is found. Layer 3 Protocol Number The decimal registry number of a Network Layer protocol, such as 2048 for IPv4. Layer 4 Protocol The name of the Transport Layer protocol, such as TCP. Layer 4 Protocol Number The decimal registry number of the Transport Layer protocol, such as 6 for TCP. Logical Port, Logical Port Number The logical port and port number on the Multi-Port Collector appliance that is the source of the data in the table. Chapter 3: Analyzing Data 73 Understand the Data in the Display Area MAC Address, MAC Address 1, MAC Address 2, IP Address MAC The Media Access Control address of the server that had the assigned IP address indicated during the selected session. The “1” or “2” designation appears for the paired data views and indicates the direction of data flow between hosts. Name, Name 1 or 2, Server Name, Client Name The name of the host, either a client or a server. For some views, a Client or Server designation is indicated. Where not indicated, hosts are shown without regard to their client or server role. The “1” or “2” designation appears for the paired data views and indicates the direction of data flow between hosts. Network Name, Network Name 1, Network Name 2 The name of a network as it is defined for monitoring in ADA. The “1” or “2” designation appears for the paired data views and indicates the direction of data flow between networks. Network Subnet, Network Subnet 1, Network Subnet 2 The IP address of a network subnet. The “1” or “2” designation appears for the paired data views and indicates the direction of data flow between subnets. Packet Rate Server processing efficiency, measured in packets per second. This throughput value is significant for capacity planning, because it provides a sense of server load or usage. Packet Rate From, Packet Rate To Throughput in packets per second data sent or received by the selected host. Packets Data volume in packets. The total number of packets sent and received during the selected time period and selected client-server session. Packets From, Packets To Data volume. Total number of packets sent or received by the selected host. Port 1, Port 2 The port on the host that sent or received conversation- or session-related data. Session ID The ID number of the TCP session. An internal identifier. ToS The bit setting for the Type of Service field in the IPv4 header. ToS Description A standard description of the TOS setting, such as “Default Traffic” or “Max throughput.” 74 User Guide Understand the Data in the Display Area TCP Bytes TCP data volume in bytes. The total number of TCP bytes sent and received during the selected time period by the selected host or pair of hosts. TCP Packets TCP data volume in packets. The total number of TCP packets sent and received during the selected time period by the selected host or pair of hosts. VLAN The ID number of the Virtual Local Area Network. Data on the TCP Tab The TCP tab of the data table excludes non-TCP packets and displays the data that SuperAgent and APM monitor from all Multi-Port Collector logical ports. Only the columns applicable to the selected view are shown in the table. The following list describes all possible columns for the TCP tab. Application Application names are derived from SuperAgent configuration or from well-known port usage. Where available, the application name is supplied. Otherwise, the port number is shown in parentheses. Application ID The second value in a pair of values that identifies an application. An internal identifier. Application Type Identifies an application in the Multi-Port Collector database. In most cases, conveys the state of this application with respect to SuperAgent. One of the following types: ■ n/a: Unknown protocol. ■ Monitored: Application uses TCP. SuperAgent monitors this application. If multiple collection devices report to one SuperAgent management console, it is possible that a different collection device monitors this application for SuperAgent. The Application Type designation refers to items actively monitored only by this Multi-Port Collector. ■ UDP-Not monitored: Application is defined in SuperAgent, but uses UDP. SuperAgent does not monitor UDP. ■ TCP-Not monitored: Application is defined in SuperAgent and uses TCP. However, SuperAgent is not monitoring the application. Chapter 3: Analyzing Data 75 Understand the Data in the Display Area ■ TCP-Unknown: Application uses TCP, but is not defined in SuperAgent. Application column shows “Port X.” ■ UDP-Unknown: Application uses UDP, which SuperAgent does not monitor. Application is not defined in SuperAgent or in the Multi-Port Collector list of well-known UDP ports. Application column shows “Port X.” Client IP Address The IP address of the client computer in the client-server session. Client Name The host name of the client computer in the client-server session (a conversation pair). Client Port The port on the client that sent or received the data. CT Obs Connection Time Observations. The number of monitored TCP connections occurring during the selected time interval. A good indication of usage levels and a gauge of metric significance. For example, many observations can indicate an event that can affect users. DTT Data Transfer Time. Elapsed time between when the server starts responding and when it finishes sending data. Factors such as the response sizes, the bandwidth available on the network, and interaction between the application and the network affect this value. Excludes the initial server response time and includes only NRTT if there is more data to send than fits in the TCP window. This metric is related to the number of network round trips required to deliver all data and the delay per round trip. ENRTT Effective Network Round-Trip Time. NRTT plus delays caused by retransmissions for a single transaction. Reflects the latency that users actually experience and serves as an indicator of performance degradation caused by retransmissions. Includes NRTT and Retransmission Delay. Layer 3 Protocol The name of the Network Layer protocol (IP, IPv6, or ARP), or an ID number from the Ethertype field in the packet header. Indicates “Ethertype=X” when an IEEE 802 Ethertype value is found. Layer 3 Protocol Number The decimal registry number of a Network Layer protocol, such as 2048 for IPv4. Layer 4 Protocol The name of the Transport Layer protocol, such as TCP. 76 User Guide Understand the Data in the Display Area Layer 4 Protocol Number The decimal registry number of the Transport Layer protocol, such as 6 for TCP. Logical Port, Logical Port Number The logical port and port number on the Multi-Port Collector appliance that is the source of the data in the table. NCT Network Connection Time. The time it takes the client to confirm the server connection acknowledgment. In general, network latency causes delay in connection times. NCT serves as a baseline for carrier latency and comparison to NRTT values. NRTT Network Round-Trip Time. The amount of time it takes for a packet to travel to and from the server and clients on a network, excluding latency from retransmissions. Application and server processing times are excluded from this value. This value is often useful when compared to the NCT value. Retrans Retransmission Delay. The additional delay in the NRTT caused by retransmissions, which are packets that are retransmitted after data loss. The data is expressed as an average across all observations, not the actual retransmission time for each transaction. A delay in client acknowledgment caused by Retransmission Delay increases the NRTT value. This metric does not reveal the impact of losses on the DTT because of TCP congestion. This metric reflects only data loss from the server to the clients, not from clients to the server. SCT Server Connection Time. The amount of time that elapses from when the server receives the initial SYN packet from the client until the server sends the first SYN/ACK. Opening a TCP connection involves exchanging three packets: SYN, SYN/ACK, and ACK. The TCP header has SYN (for synchronize) and ACK (for acknowledge) bits. The first packet has the SYN bit set. The second packet has both bits set. The third packet has only the ACK bit set. This exchange establishes the initial sequence numbers of the connection. SCT and NCT comprise the Connection Setup Time metric. For more information, see the ADA Sessions reports. Server IP Address The IP address of the server computer in the client-server session. Server MAC, Client MAC The unique Media Access Control address that identifies a host. Chapter 3: Analyzing Data 77 Understand the Data in the Display Area Server Name The host name of the server computer in the client-server session (a conversation pair). Server Network Name, Client Network Name The name of a network as it is defined for monitoring in ADA. The “Client” or “Server” designation appears for the paired data views and indicates the direction of data flow between networks. Server Network Subnet, Client Network Subnet The IP address of a network subnet. The “Client” or “Server” designation appears for the paired data views and indicates the direction of data flow between subnets. Server Port The port on the server that sent or received the data. SRT Server Response Time. The amount of time a server takes to respond to a request made by a client. Server speed, application design, and volume of requests affect SRT. TCP Byte Loss Data loss, expressed as a percentage of TCP bytes sent and received. TCP Byte Rate From, TCP Byte Rate To TCP throughput in bits. The data rate in bits per second (bytes per second x 8) between the selected server and clients during the selected time period. TCP Byte Rate Retransmtd Ratio of retransmitted data to total data, percentage of data lost on the monitored network, and loss rate in bits per second. TCP Bytes TCP data volume in bytes. The total number of Application-Layer bytes seen on the network during the selected time period. TCP Bytes From, TCP Bytes To TCP data volume in bytes. Total number of Application-Layer bytes sent from or received by the selected server to clients during the selected time period. TCP Packet Loss Data loss, expressed as a percentage of TCP packets sent and received. TCP Packet Rate TCP throughput in packets. The data rate in packets per second during the selected time period. ADA reports use the term Data Rate. 78 User Guide Understand the Data in the Display Area TCP Packet Rate From, TCP Packet Rate To TCP throughput in packets. The data rate in packets per second from the selected server to clients, or from clients to the server, during the selected time period. TCP Packet Rate Retransmtd Ratio of retransmitted data to total data, percentage of data lost on the monitored network, and loss rate in packets per second. TCP Packets TCP data volume in packets. The total number of packets seen on the network during the selected time period. Includes zero-byte packets, such as TCP acknowledgments. TCP Packets From, TCP Packets To TCP throughput in bits. The data rate, calculated as bytes per second x 8, during the selected time period. ADA reports use the term Data Rate. TCP Retransmtd Bytes The number of TCP bytes that were retransmitted due to data loss. TCP Retransmtd Packets The number of TCP packets that were retransmitted due to data loss. ToS The bit setting for the Type of Service field in the IPv4 header. ToS Description A standard description of the TOS setting, such as “Default Traffic” or “Max throughput.” Transaction Time Time elapsed from the moment a client sends the request (packet-level or transaction-level) to the moment the client receives the last packet in the response. Transaction Time Obs Transaction Time Observations. The number of monitored TCP transactions that occurred during the selected time interval. A good indication of usage levels and a gauge of metric significance. For example, many observations can indicate an event that can affect many users. VLAN The ID number of the Virtual Local Area Network. Chapter 3: Analyzing Data 79 Understand the Data in the Display Area Byte Counts for Networks and Hosts The TCP tab shows activity from the client network perspective. The Traffic tab shows generic network activity, without regard to which conversing host is the client and which the server. If a pair of hosts in the same subnet exchanges data, the byte counts for the same conversation can be different on each tab. On the Traffic tab, byte totals for conversations within the same subnet can appear to be double the totals shown on the TCP tab. The total bytes exchanged between the two hosts are tallied as they exit the network and as they reenter it. Both directions are included in the total, rather than broken out per host. On the TCP tab, which reflects the client perspective, the bytes sent and received by a single host are tallied for the same time period. The result is a total bytes value that is smaller than the total bytes value on the Traffic tab. Add or Remove Columns in a Data Table By default, some data is excluded from the data table on the Traffic and TCP tabs. You can include additional columns of data. Follow these steps: 1. Click Edit Columns. The Edit Columns dialog opens. 2. Select the check boxes for the metrics you want to add to the data table. 3. Clear the check boxes for the metrics you want to remove from the data table. 4. Click Default to restore default column settings. 5. Click Save. Your changes are reflected in the data table after it refreshes. Export Data to a PDF File The charts in analyses can be shared in PDF format, with the following limitations: ■ The data table is not exported. ■ Legends that explain the colors in a chart are not exported. For charts with these legends (specifically, the Line Trend and Stacked Trend chart formats), send the view as a link by email. All filters applied to the current chart are preserved in the exported analysis. 80 User Guide Understand the Data in the Display Area Follow these steps: 1. 2. Display the data you want to export: a. Click a data view in the Analysis pane. b. Apply additional filters or sort the data table by a selected column. Click Export, To PDF. The File Download dialog opens. 3. Select whether to open or save the file. ■ If you click Open, the PDF is saved in a temporary folder and displayed in the Acrobat Reader application. ■ If you click Save, use the Save As dialog to browse to the file save location and click Save. The current chart is exported to a file with a .pdf file extension. A label identifies the data view, the active filters, the time frame of the data, and the time when the PDF was generated. Export Data to a CSV File You can export the data table in an analysis to a spreadsheet in comma-separated values (.csv) format. All filters applied to the data table are preserved in the exported analysis. As a best practice, select a precise segment of data to limit the size of the spreadsheet: ■ Apply hardware filters to the logical ports you defined ■ Apply filters to the data views you selected ■ Select a relatively small time period using the Time Period selector Follow these steps: 1. 2. Display the data you want to export: a. Click a data view in the Analysis pane. b. Apply additional filters or sort the data table by a selected column. Click Export, To CSV. The Export To CSV dialog opens. 3. (Optional) Type the maximum number of data table rows to export in the Export Row Limit field. Or, select No Limit to export all rows in the data table from the selected time period. 4. Click OK. The File Download dialog opens. Chapter 3: Analyzing Data 81 Understand the Data in the Display Area 5. For fastest download times, click Save. Note: We do not recommend the option to open the file. If you select this option when attempting to export a large amount of data, the download can take longer. 6. Enter or browse to the file save location, and click OK. The details you selected are exported to a file with a .csv file extension. The process can take a few minutes to complete, depending on the amount of data available in the database and the row limit you supplied. More information: Use Hardware Filters to Manage Data (see page 21) Use Filters to Customize Data in the Display Area (see page 55) Export Data to a PCAP File You can export the packet-capture data for the current view to a packet-capture file, in PCAP format. The packet-capture file is built from raw capture files and displays packets for all sessions included in the current analysis. The PCAP format is widely used for network trace files and other methods of examining and exchanging packet-level data. PCAP is compatible with WinPcap (Windows) and libpcap (UNIX). Applications that use these application programming interfaces easily read and display PCAP. The nqadmin user and user with rights for the SuperAgent Investigations role can use the Export to PCAP feature. By default, only the Network Engineer and Network Manager roles allow access to this feature. Tips: 82 User Guide ■ PCAP file exports can take a while to complete. The amount of time necessary to open the File Download dialog depends on the amount of data being exported. ■ Narrow the time frame of the analysis to improve the performance of the Export to PCAP feature. A narrower time frame reduces the number of raw capture files that are searched for relevant packets. Use the Time Period selector or the chart time control to zoom in on the time frame of interest. ■ The ability to export to PCAP is not available when the raw capture files containing the data of interest are deleted. Capture files are not retained as long as the metric data in the metrics database. Understand the Data in the Display Area ■ When exporting to PCAP, the "Header Only" option for the "Maximum Bytes per Packet" parameter applies to IP (TCP and UDP) headers. If you are exporting non-IP traffic, selecting the "Header Only" option yields only the Layer 2 MAC headers. Instead, select a byte value, such as 128, to see more of each frame. ■ The PCAP files you export from can be viewed in a protocol analyzer, or packet sniffer, such as the freeware tool Wireshark. Protocol analyzers observe data flows passing across the network and inspect copies of each packet. They display the contents of each field in the packet header in a graphical user interface, where data can be filtered, sorted, and analyzed. ■ A protocol analyzer is a valuable tool for performing troubleshooting tasks or forensic analysis on the data that Multi-Port Collector captures. Use of a protocol analyzer requires an understanding of Ethernet, IP, and Layer 4 protocol packet structures. Follow these steps: 1. 2. Display the data you want to export: a. Click a data view in the Analysis pane. b. Apply additional filters or sort the data table by a selected column. Click Export, To PCAP. The Export To PCAP dialog displays the time range of the packet trace to export. 3. Select the port that received the data that you want to export in the Logical Port field. A list of available logical ports is provided. The number of sessions and the traffic volume in bytes are shown for each available port. These statistics are based on the current filters, such as time frame and view. They are not an indication of the size of the file you want to export. Select only one port for each exported PCAP file. 4. Select the maximum number of bytes to include from each packet in the Maximum Bytes per Packet field. The default option is to include only headers in the PCAP file. 5. Click OK. The Save As dialog opens. 6. Select a location in which to save the exported PCAP file. 7. Click Save. More information: Set Global Application Preferences (see page 33) Time Range Exceeds Raw Packet Retention Time (see page 103) Chapter 3: Analyzing Data 83 Understand the Data in the Display Area Share Data by Email Sending a link to an analysis is often the quickest way to share data. The Email option constructs a URL from an analysis and uses the default mail client to create an email message. Restrictions ■ An email client is required. To use the email feature, install an email client and configure an SMTP server on the computers where users access the web interface. ■ The recipient must have a user account with permission to view the Analysis page. ■ The recipient must click the URL and view the analysis within a few days, before the underlying data is purged from the database. Follow these steps: 1. 2. Display the data you want to export: a. Click a data view in the Analysis pane. b. Apply additional filters or sort the data table by a selected column. Click Email. A blank message opens in your messaging application. The URL appears in the body of the message. The date and time appear in the Subject line. The date and time represent the moment when the email message is generated, not the time frame of the analysis. The time frame of the analysis is shown in the Display area of the Analysis page. 3. Type a recipient address and click Send. The email that is sent to the recipient contains a link to the URL for the analysis. More information: What are Users and Roles? (see page 39) 84 User Guide Chapter 4: Multi-Port Collector Health and Maintenance Multi-Port Collector performs self-monitoring and self-maintenance to keep the system performing at peak levels. In addition, it lets the Administrator perform the following tasks: ■ View system status ■ Customize system maintenance options ■ Stop or restart processes ■ Apply software upgrades to the appliance ■ View system logs for troubleshooting purposes This section contains the following topics: System Status (see page 85) Maintenance Tasks (see page 93) System Setup (see page 100) Machine Settings (see page 101) System Status The System Status page displays the status of all active Multi-Port Collector processes. On this page, you can track capture card and disk performance, file system status, and memory and CPU usage. Both users and Administrators have access to the System Status page. Click System Status in the web interface to see the System Status page. Chapter 4: Multi-Port Collector Health and Maintenance 85 System Status System Information The System Information section provides details about the Multi-Port Collector appliance. Hostname (IP Address) The DNS host name and IP address of the appliance. SuperAgent Management Console The IP address of the SuperAgent management console and a hyperlink to the SuperAgent login page. This information is available only if the appliance is configured as a collection device for SuperAgent. Multi-Port Collector Version The version and build number of the software. Process Information Multi-Port Collector consists of multiple processes, or daemons, that perform tasks related to packet capture, metric calculation, packet inspection, and automatic system maintenance. The Process Information section provides frequently updated status information for the following processes: nqcapd The packet-capture daemon. Its log file name is nqnapacapd.log. Tip: To reset port statistics, restart the nqcapd process. nqmetricd The metric-computation engine, roughly equivalent to the Metric Compute Module on the SuperAgent standard collector. Its log file name is nqMetricReader.log. nqinspectoragentd The inspector daemon, roughly equivalent to the SA Collector service on a standard collector. Its log file name is nqInspectorAgentd.log. nqwatchdog The process that monitors the status of other processes and restarts them if necessary. Its log file name is nqwatchdog.log. nqmaintd The system-maintenance daemon. Its log file name is nqmaintd.log. 86 User Guide System Status sadatatransfermanager The Data Transfer Manager, a process that receives and transfers data from a Cisco Wide-Area Application Services deployment. This process has a status of Stopped when Multi-Port Collector is not configured as a SuperAgent collection device. After you configure the collection device, this process is always running, even if it is not used. The log file name is saDataTransferManager.log. Note: You can also see the status of these processes on the Process Status page at Administration, Processes. More information: Stop or Restart a Process (see page 94) Database Status The Database Status section provides information about the high-performance database on the Multi-Port Collector appliance. The information reported on this page is limited to current database status. The Database Status section shows the name of the local database and its status, which is one of the following: ■ UP ■ DOWN ■ SHUTTING DOWN ■ INITIALIZING A time stamp indicates the recency of the status. More information: Database Status and Usage (see page 96) Chapter 4: Multi-Port Collector Health and Maintenance 87 System Status Capture Card Physical Port Status The Capture Card Physical Port Status section provides information about the traffic flowing through each port and describes each link. Most values are dynamically updated and the browser refreshed every 5 seconds. Physical Port The physical port on the Multi-Port Collector appliance. Type The type of cable used for the connection. Link State The status of the link to this port: connected or not connected. Link Quality The quality of this connection, based on information from the network adapter. Indicates whether the link is down. Link Speed The normal speed of this link. More information: Capture Card Clock Differs from System Clock (see page 103) Capture Card Logical Port Status The Capture Card Logical Port Status section provides information about the status of each logical port and the number of processed and dropped packets. Assign multiple physical ports, or data feeds, to a single logical port definition, for reasons such as: ■ To organize your reporting around primary and failover circuits ■ To monitor more accurately in asymmetrical routing environments Logical Port The logical port, as defined on the Logical Ports page. Each physical port on the capture card is associated with a logical port definition. This association helps you identify data feeds and lets you aggregate sources of data so that they are monitored together. Logical port definitions include a port number, a name, and hardware filter settings that let you determine the traffic that is captured. Logical Name The logical port name. If you do not assign a name to the port, default values are used: Port 0, Port 1, and so on. 88 User Guide System Status State The status of the link to this port: Enabled or Disabled. Status The current port status: Running, Stopped, or Error. If the status is Error, position the mouse pointer over the error icon to display the reason for the error. Packets Processed The number of packets incoming from this logical port that the capture card processed after statistics were reset. Drops The number of packets incoming from this logical port that the capture card dropped and did not process. The number of drops provides an indication of capture card load. Under normal performance conditions, the number of drops should be zero. More information: Configure Logical Ports (see page 19) Capture Card Physical Port Statistics The Capture Card Physical Port Statistics section provides information about the amount of data flowing through each physical port on the Multi-Port Collector appliance. The section also identifies the number of current errors. This information lets you verify mirror port configuration to help ensure that the mirrored session is not overloaded. These statistics are reset to zero when the nqcapd process is started or restarted. Physical Port The physical port through which data flows to Multi-Port Collector. Either All (a total from all channels) or the identifier of a physical port. The number of physical ports depends on the type of capture card in use. Logical Name The name of the logical port associated with this physical port. Packets Received The total number of discrete packets received through this port after statistics were reset. Bytes Received The total number of bytes received through this channel after statistics were reset. Chapter 4: Multi-Port Collector Health and Maintenance 89 System Status CRC/Align Errors The total number of frames with cyclical redundancy check (CRC) errors or alignment errors. Discarded Duplicates The number of packets that the capture card discarded, according to its deduplication logic, because they were duplicates of packets already received. You can enable or disable automatic deduplication on the Application Settings page. Provides an indication of whether the mirror port is appropriately configured. If a large percentage of captured traffic consists of duplicate packets, verify the port mirroring configuration. Receive Rate The number of packets received per second through this channel. More information: Set Global Application Preferences (see page 33) Stop or Restart a Process (see page 94) RAID Status Information The RAID section provides information about disk performance from the RAID arrays on the Multi-Port Collector appliance. Note: RAID information is available only if the Adaptec Storage Manager (arcconf) utility is installed. For more information, see the CA NetQoS Multi-Port Collector Installation Guide. Array The identifier of the RAID array. Indicates whether the information applies to the System array or the Data array. Status The status reported by this array, one of the following: 90 User Guide ■ Optimal: Performing at the highest level ■ Degraded: Not performing at the highest level System Status ■ Failed: Not running; showing an error condition. The error type and the ID and serial number of the affected drive are indicated. ■ Rebuilding: Coming back online. After the RAID controller detects a drive that is rebuilding, the status changes to Optimal. Meanwhile, the array is still running in Degraded state. All metrics are still collected. Note: Even if the data array shows a Failed status for a drive, metric processing is not interrupted, but packet capture investigations cannot be performed. You can change out a failed drive without interrupting metric processing. Type The type of RAID array. Multi-Port Collector RAID arrays are configured as RAID 5. Number of Drives The number of disk drives controlled by this array. Failed Drives An indication of drives that have failed, that indicate an error, or that are rebuilding. Includes drive numbers, ID numbers, and serial numbers. The System Array drives have ID numbers of 1 through 4. Data Array drives have ID numbers of 5 through 16. File Systems The File Systems section provides usage statistics for the file systems on the Multi-Port Collector appliance. File System The name of the file system whose statistics are shown. Size The total capacity, as a number of bytes, of this file system. Used The number of bytes in this file system that are in use. Avail The number of bytes in this file system that are free and available for use. Use% The percentage of file system capacity that is in use. Mounted The mount point of the file system in the operating system directory. Chapter 4: Multi-Port Collector Health and Maintenance 91 System Status Memory The Memory section provides information about memory size, used and free bytes, and buffering statistics. Total Total capacity of either the memory or the swap file, in bytes. Used The percentage of memory capacity that is in use. Free The percentage of memory capacity that is free and available for use. Buffers The number of bytes stored in memory buffers. Cached The number of bytes in the disk cache. CPU The CPU section provides information about CPU usage and performance statistics. Use these statistics to understand Multi-Port Collector performance and load. CPU Indicates to which CPU on the appliance the statistics correspond. One of the following: ■ All: Shows statistics averaged for all processors ■ 0 through 15: The CPU identifier, 0 through 15. The Multi-Port Collector platform has a dual quad core CPU with hyper-threading that appears as 16 CPUs. User The percentage of CPU time used by processes executing at the user level. Nice The percentage of CPU time used by processes executing at the user level with nice priority. The kernel determines priority. System The percentage of CPU usage attributable to the kernel itself. IO Wait The percentage of time that the CPU was idle, but the system had an outstanding disk I/O request. 92 User Guide Maintenance Tasks IRQ The percentage of CPU time spent processing interrupt requests. Soft The percentage of CPU time spent in soft interrupt state. Steal The percentage of CPU time that a virtual CPU is waiting for a real CPU while the hypervisor services another virtual processor. Idle The percentage of time that the CPU was idle, and the system did not have an outstanding disk I/O request. Interrupts/Sec The total number of interrupts received per second by the CPU. Maintenance Tasks Some system maintenance is performed automatically. Other tasks are performed manually, such as restarting a daemon or process. The need to log in to the Multi-Port Collector appliance is minimal, even for database or system maintenance. You can use the web interface to perform the following tasks: ■ Stop and start processes ■ Open system logs and safe them to a file ■ Upgrade software Upgrade Software Administrators can upgrade the Multi-Port Collector software, the operating system, and the TIM software when new releases or patches are available. Product upgrade files are delivered from CA Technical Support. You can upgrade software from the Administration, Upgrade page in the web interface. Upgrading the Multi-Port Collector software and the operating system The CA NetQoS Multi-Port Collector Upgrade Guide contains complete instructions for upgrading Multi-Port Collector and the operating system, CentOS. Upgrading the TIM software The procedure for upgrading TIM is the same as the procedure for installing TIM. For more information, see Install the TIM Software (see page 32). Chapter 4: Multi-Port Collector Health and Maintenance 93 Maintenance Tasks In general, the upgrade process is as follows: 1. Browse to the location where you saved the upgrade file. 2. Select it and click Open. 3. Click Upgrade to start the process. Messages indicate the progress of the patch or upgrade. Do not navigate away from the page until the message indicating completion appears. Stop or Restart a Process Stop or restart the Multi-Port Collector processes when certain error conditions occur, or when you change a systemwide setting. Note: The nqmaintd process can be restarted through the web interface. However, it cannot be stopped or started through the web interface. If the nqmaintd process is stopped, log in to the appliance directly to start it. Follow these steps: 1. Click Administration, Processes in the web interface. The Process Status page opens. The Process column lists the names of the processes. 2. Click a link to start, stop, or restart a process in the Start/Stop column. Tip: To reset port statistics, restart the nqcapd process. More information: Process Information (see page 86) Review System Logs You can view the last 200 lines of logged activity in a log file associated with a Multi-Port Collector process. In addition to logs for the Multi-Port Collector processes, you can view the recent entries in the following logs: SAService.log Contains entries for communications from SuperAgent to Multi-Port Collector, including heartbeats and feed status updates. Also contains entries for requests from APM to Multi-Port Collector for network health information that appears on the Defect Details page in the APM console. 94 User Guide Maintenance Tasks SAInvestigations.log Contains entries that record packet capture investigation requests from SuperAgent. nqsnmptrap.log Contains entries for every condition that triggered an SNMP trap. Follow these steps: 1. Click Administration, System Logs in the web interface. The System Logs page opens. 2. Select a log file from the Log File field. The System Logs page refreshes to show the size of the log you selected. For example: The file nqInspectorAgentd_20110228.log is 300160 bytes in size. 3. Click View. The System Logs page refreshes to show up to the last 200 lines of the log you selected. More information: Process Information (see page 86) Generate a Support File You can generate a Support file that contains troubleshooting information that is useful for CA Technical Support personnel. The Support file compiles all recent logs from all processes and saves the data in compressed tar format (.tgz). Follow these steps: 1. Click Administration, System Logs in the web interface. The System Logs page opens. 2. (Optional) Select "Include metrics database diagnostics" to include additional information generated by a diagnostics utility running on the Multi-Port Collector metrics database. Note: Generating the Support file can take longer when the "Include metrics database diagnostics" option is selected. Select this option only for problems related to the operation of the metrics database, or when instructed to do so by CA Technical Support. Chapter 4: Multi-Port Collector Health and Maintenance 95 Maintenance Tasks 3. Click Generate. The System Logs page refreshes to display the name of the new Support log file. 4. Select the log file from the "Select the support file for download" field. 5. Click Download. The File Download dialog opens. 6. Click Save and navigate to the location in which you want to save the file. Database Status and Usage The statistics on the Database Status page describe database status and usage. Use this information to gauge system usage and to guide you when selecting purge (File Retention) settings on the Application Settings page. The information listed in the Database Usage section is especially useful for determining when to purge older database entries containing metrics from 1-minute monitoring intervals. The Database Status page provides the following information: Database The name of the local databases on the Multi-Port Collector appliance. Status Status of a database: UP, DOWN, SHUTTING DOWN, or INITIALIZING. Start/Stop Links that let you start or stop a database. Stop a database if you shut down or restart the appliance. Date of oldest data The oldest time stamp of the data that is in a database. Date of newest data The most recent time stamp of the data that is in a database. Rows in database The total number of rows in the database that are in use. The maximum number of rows is 12 billion. If the maximum threshold is exceeded, the nightly maintenance routine prunes it to less than 12 billion. Rows for past day The number of database rows that were used during the past 24 hours. Rows for past 7 days The number of database rows that were used during the past week. 96 User Guide Maintenance Tasks Tips: ■ The Database Usage section provides a range of dates to show when the oldest and most recent data was inserted, and several database row counts. This information helps you gauge how quickly data is accumulating. Based on this information, you can adjust the number of days that information is kept in the database. ■ To reduce the number of rows added to the database, adjust the filters that are applied to each logical port. For example, instead of using the default filter that captures all protocol traffic, you can capture only TCP packets. ■ The status of the database is automatically updated every 60 seconds. The row counts are updated only when the page loads when you navigate to the Database Status page or when you refresh the browser. ■ Users who do not have the Administrator product permission can review database status on the System Status page. All Multi-Port Collector users can access the System Status page. More information: Use Hardware Filters to Manage Data (see page 21) Set Global Application Preferences (see page 33) System Status (see page 85) Command Line Syntax (see page 123) Purge Data from the Database During normal operation, Multi-Port Collector performs routine maintenance on the database and file systems. Routine maintenance includes purging data and files of various types. Typically, raw packet capture files are retained for six hours before being purged. Files containing performance metrics from 1-minute reporting intervals are retained for one week before being purged. You can perform a manual purge of the Multi-Port Collector database for reasons such as the following: ■ The Database Status page reveals a problem. ■ Statistics on the System Status page indicate that file systems are nearly full. ■ You receive an mpcDiskUsage SNMP trap indicating that disk usage exceeds a threshold. Important: Purged data is permanently removed from the database. You cannot recover purged data. Chapter 4: Multi-Port Collector Health and Maintenance 97 Maintenance Tasks Follow these steps: 1. Click Administration, Purge Data in the web interface. The Purge Data page opens. 2. Select "Purge all data and metric database tables" to remove all data and database tables. This option stops the processes that collect data. No new data is collected until you restart the processes. When you select this option, all other options on the page are unavailable. 3. Select at least one of the following options to remove only selected data. Processes continue to run and new data is still collected. Purge one-minute session metrics Removes the 1-minute session metrics from the metrics database. Purge raw capture files Removes packet capture files. These files are continually generated during ordinary monitoring and are used to derive performance statistics. The default is 6. Purge packet capture investigations Removes files created for packet capture investigations. Investigation files are stored separately from raw capture files. The default is 90. Purge log files Removes log files created by Multi-Port Collector. 4. Select the time frame for removing the data you selected in step 3. Purge across all dates Removes data of the selected type, regardless of the time frame. Purge prior to this date (UTC) Removes data collected before the date you specify. Note: Data is stored in Coordinated Universal Time (UTC). This option removes data that was collected before midnight UTC. When you view data using the local time, it may seem as though some data still exists for the previous day. 98 User Guide 5. Click OK. 6. Restart the processes that were stopped if you purged all data as described in step 2. Maintenance Tasks More information: Set Global Application Preferences (see page 33) Create SNMP Traps (see page 35) System Status (see page 85) Database Status (see page 87) Log In to the Appliance Typically, it is not necessary to log in to the Multi-Port Collector appliance after you install the hardware and software. Most administrative tasks can be performed from the web interface. However, you access the server directly for the following tasks: Start the maintenance daemon (nqmaintd) if it is stopped The daemon is required to start or restart other processes. The daemon cannot be started or stopped from the web interface. Shut down or restart the appliance A shutdown or reboot is not required, even for an upgrade. However, to take the computer offline, use the login procedure and commands to shut it down correctly. The local database on the appliance can become corrupted when the appliance is shut down in the middle of a load or merge operation. Stop the database before you shut down the appliance. Log in to the appliance directly using the attached keyboard and monitor. You can also log in from a remote system using a secure shell (SSH) client such as PuTTY, which runs on Windows. Follow these steps: 1. Press Alt+F2 on the initial screen. The Linux login screen opens. 2. Log in with the following credentials: ■ User name: netqos ■ Password: The password you created when you installed the Multi-Port Collector software. The Linux command line interface opens. 3. Run the necessary command. Chapter 4: Multi-Port Collector Health and Maintenance 99 System Setup More information: Database Status (see page 87) Command Line Syntax (see page 123) System Setup The System Setup page identifies components that are installed on the Multi-Port Collector appliance, such as prerequisite packages and software. Often, the name of the component is a hyperlink to more information. Machine Settings The build number and a link to the Machine Settings page. Here you can review your network setup, set the time zone, and shut down or restart the appliance. Multi-Port Collector The build number and a link to the Administration page. Here you can configure data collection, system settings, and authentication, and perform maintenance. Multi-Port Collector Prerequisites The build number of the most recently downloaded prerequisites package. System Health The build number and a link to the Appliance Health page on the Customer Experience Manager (CEM) console. Here you can review information about disk and memory usage, logged-in users, and running processes. This item is available only if TIM is installed on the appliance. Third-party The version and build number of TIM third-party applications installed on the appliance. This item is available only if TIM is installed on the appliance. TIM The build number and a link to the TIM Setup page on the CEM console. Here you can stop and start TIM, view status and statistics, and configure Watchdog settings. This item is available only if TIM is installed on the appliance. More information: Support for Transaction Impact Manager (see page 15) Install the TIM Software (see page 32) Machine Settings (see page 101) 100 User Guide Machine Settings Machine Settings The Machine Settings page provides links to the following pages: ■ Network Setup (see page 101) ■ Set Time Zone (see page 102) ■ System Shutdown/Restart (see page 102) Network Setup The Network Setup page identifies the network configuration that was created when you installed the Multi-Port Collector software and enabled network access. For more information, see the CA NetQoS Multi-Port Collector Installation Guide that was shipped with your appliance. You can use the fields on this page to change the network configuration. Select which interface to configure The selection in this field determines the contents of the other fields on this page. Select an interface and click Set before changing the information in the remaining fields. The page refreshes and indicates whether the interface has IPv4 addresses. Automatically obtain IP address settings with DHCP Select this option to use DHCP (Dynamic Host Configuration Protocol) to obtain the IP address of the management NIC. You can provide the DHCP host name of the management NIC. Manual IP Address Settings Select this option to type the IP Address, Subnet Mask, and Default Gateway Address of the management NIC. Note: The IP address of the management NIC must match the IP address assigned to Multi-Port Collector in the SuperAgent management console. Manual DNS Settings Type the IP address of the local DNS server in the "DNS server 1" field. (Optional) Type the IP addresses of secondary DNS servers in the "DNS server 2" and "DNS server 3" fields. Submit Click to preserve your changes to network settings. Chapter 4: Multi-Port Collector Health and Maintenance 101 Machine Settings Choose the Time Zone You can change the time zone of the Multi-Port Collector appliance. Follow these steps: 1. Click System Setup, Machine Settings in the web interface. The Machine Settings page opens. 2. Click Set Time Zone. The Set Time Zone page opens. 3. Select the time zone of the appliance. 4. Click Set Time Zone at the confirmation prompt. A confirmation message appears. Shut Down or Restart the Appliance You can use the web interface to shut down or restart the Multi-Port Collector appliance. Follow these steps: 1. Click System Setup, Machine Settings in the web interface. The Machine Settings page opens. 2. Click System Shutdown/Restart. 3. Click one of the following: Shut down the computer Select this option to turn off the appliance. You must have physical access to the appliance to turn it back on. Restart the computer Select this option to turn off the appliance and then restart it. More information: Log In to the Appliance (see page 99) 102 User Guide Chapter 5: Troubleshooting Capture Card Clock Differs from System Clock Symptom: I see the following message on the System Status page, in the Capture Card Physical Port Status section: "Capture card clock differs from system clock by N seconds." Solution: The capture card has an independent clock that stamps the time of incoming packets. In normal operation, this clock is synchronized with the Multi-Port Collector system clock. The error message appears when there is a discrepancy between the Multi-Port Collector system clock and the clock on the capture card. The discrepancy can occur when, for example, someone manually changes the time of the system clock. Synchronize the clocks using the following methods: ■ Immediately synchronize the clocks. Run the following command from the Linux command line interface on the appliance. This command stops the nqcapd and nqmetricd processes, which disrupts monitoring. The processes are restarted after the clocks are synchronized. sudo /opt/NetQoS/scripts/syncNapatechClock --force ■ Maintain synchronization. Run the Network Time Protocol (NTP) to maintain synchronization between the clocks. You can configure NTP with the Network Settings Utility on the appliance. To open the utility, run the following command from the Linux command line interface: sudo /opt/NetQoS/tui/tui-setup.php In the utility, type the host name or IP address of your NTP server in the NTP Server field. The default is pool.ntp.org. Time Range Exceeds Raw Packet Retention Time Symptom: I received the following warning message when attempting to export data to PCAP format: Time range exceeds raw packet capture retention time. Chapter 5: Troubleshooting 103 Time Range Exceeds Raw Packet Retention Time Solution: The Applications Settings (see page 33) page in the web interface includes a File Retention setting that affects the Export to PCAP (see page 82) feature. The error occurs when the data you want to export is from a time frame that is less than the "Keep raw packet capture files for" setting. Use the System Status page to assess the disk usage for /data in the File Systems section. If you have sufficient free space, increase the value of the "Keep raw packet capture files for" setting. Future PCAP exports will include data from farther in the past. 104 User Guide Appendix A: Best Practices for Deployment This section contains the following topics: Appliance Placement (see page 105) Port Mirroring (see page 105) Port Requirements (see page 108) Packet Deduplication (see page 109) Appliance Placement The Multi-Port Collector appliance requires connectivity to a SPAN or mirror port on each network switch that handles the traffic you want to monitor. Connectivity typically occurs at the access layer. The appliance must be able to see as much of the relevant network traffic as possible. Consider the following: ■ Which applications do you want to monitor? ■ Which servers host these applications? ■ To which switches are these servers connected? ■ From which subnets do users access the monitored applications? If your network or traffic volume is exceptionally large, you can purchase an additional appliance to balance the processing load. Port Mirroring On a network switch, the port mirroring function sends copies of network packets from one port to another switch or port for analysis. Note: The port mirroring function on Cisco switches is named Switched Port Analyzer (SPAN). Mirror the switch ports, where traffic travels to and from the monitored servers, to the ports where Multi-Port Collector is connected. When mirror ports are configured correctly, SuperAgent monitors the flow of application among clients and servers without the use of desktop or server agents. Appendix A: Best Practices for Deployment 105 Port Mirroring Limit the amount of data that Multi-Port Collector sends to SuperAgent and APM. A CA Technical Support representative can help you implement a strategy for data acquisition. But it is helpful to understand the ramifications of the various mirroring options. The following tips outline port-mirroring techniques and filtering options. Identify mission-critical servers and applications Identify the mission-critical applications and servers that you want to monitor. Then, target the switches where you want to set up port mirroring. Review the current VLAN configuration for each switch. If servers of interest are all on the same VLAN, include the VLAN in mirror configuration (or VSPAN in a Cisco environment). Consider mirroring multiple VLANs to capture all the traffic you want to monitor. For each VLAN, consider how many hosts are included and the resulting collection and capture load. Also be aware of the possibility of packet duplication. Connect Multi-Port Collector to the key switches that carry application traffic Select a rack with cable-ready access to all switches that carry data to and from the larger enterprise network. Access-layer switches are the best candidates because they carry the application (TCP) data that SuperAgent monitors. Access switches typically send fewer duplicate packets to Multi-Port Collector. Configure a port on each access switch as a mirror output (destination) port. Verify that the traffic of interest is forwarded to the capture card on the Multi-Port Collector appliance. Consider the application architecture When you mirror data from servers that support a multitier application architecture, Multi-Port Collector sends duplicate packets to SuperAgent. The servers in a multitier architecture send data back and forth among themselves. When a server with mirror port sees a packet in both transmit and receive directions, the packet is sent to the mirror port. Generally, include only front-end servers in the port mirroring configuration. Mirroring the middle-tier servers sends duplicate packets because both transmit and receive packets are spanned. Mirror ports work better with Multi-Port Collector than network taps However, you can connect a Multi-Port Collector port to a standard copper or fiber tap. You can also connect Multi-Port Collector to an aggregating tap in place of a mirror port. For example, use a network tap if mirror ports are already used for another purpose, such as an intrusion detection system (IDS). Purchase a tap that sends the request and the response traffic over the same connection on the tap. Purchase taps that support pass through on failure. If a tap fails without a pass through or fail-closed mechanism, data ceases to flow through the switch. The pass through mechanism helps ensure that data stops flowing toward the monitoring tool but passes through the switch ports. 106 User Guide Port Mirroring Do not oversubscribe the output capacity of the mirrored port In high-traffic situations, you can limit the amount of traffic on the SPAN or mirror port. For example, set an Access Control List (ACL) on the mirror port to forward only the traffic from key servers to Multi-Port Collector. With an ACL, traffic that SuperAgent does not monitor can be discarded before it is sent out the mirror port. Cisco 4500 Series switches support the use of an ACL. If you use an ACL, verify that all TCP traffic is forwarded to Multi-Port Collector. Then add other protocols used by the critical applications you want to monitor. Specify the appropriate ports in the port mirroring statement. Exclude irrelevant traffic SuperAgent measures and analyzes only TCP network traffic. Therefore, sending additional traffic through the mirror port can add unnecessary load to the capture card on Multi-Port Collector. In extreme cases, the unneeded data can cause packet loss. However, Multi-Port Collector analyzes traffic composition and performance metrics from all active protocols on the network. Consider these valuable metrics, which are complementary to the TCP metrics of SuperAgent, when deciding which traffic is irrelevant. Increase buffer depth at the destination port To enable passive monitoring of a mirror port, data is sent out of a single Gigabit interface. Exported data is sourced from many Gigabit interfaces. This many-to-one relationship means that it is possible to overrun the buffer on the destination interface of the switch. The resulting congestion can cause the switch to discard packets. Multi-Port Collector therefore assumes the presence of packet loss, reporting an inaccurate volume and rate count. We recommend exporting mirrored data to a port on the Ethernet module with the largest buffer size per port. You can obtain a list of Cisco 6500 modules and the buffer depth per port on each module from the Cisco website. Use this list, with the show module command, to determine the best locations from which to export traffic. The increased buffer depth decreases the likelihood of packet loss at each switch port, which helps ensure that each packet is counted. Avoid packet duplication Packet duplication occurs when a packet crosses multiple source interfaces. When a VLAN is included in the mirror configuration, all intra-VLAN traffic is duplicated. In cases where packet duplication is likely, consider mirroring individual ports rather than whole VLANS. With this technique, only individual ports or interfaces are used as mirror sources. Only packets destined for selected servers are sent to the mirror port. Use the show command to see a list of all ports included in a VLAN. Another option for avoiding duplication is to mirror only packets traveling in the receive direction. This setup excludes traffic coming from clients into the VLAN. For more information, see Packet Deduplication (see page 109). Appendix A: Best Practices for Deployment 107 Port Requirements Technologies available on Cisco routers can limit the amount of data sent to Multi-Port Collector ■ VSPAN. A SPAN port that uses a VLAN or multiple VLANs as the source. All the ports in the source VLANs are the source ports. If both ingress and egress are configured, packet duplication occurs each time packets are switched on the same VLAN. Use VSPANs to forward relevant traffic to the appropriate SPAN port and remove unnecessary packets. Otherwise, the captured VLAN traffic traverses multiple physical interfaces, which creates duplicate traffic. Do not set up VSPAN sessions on your core switches. Instead, set up VSPAN sessions on your access-layer switches where packets are duplicated as they pass between switches at each layer. ■ VACL. An Access Control List applied to a VLAN. All packets that enter the VLAN are verified against the rules in the list, such as packet type or destination. A VACL limits the amount of data sent over the SPAN port by denying certain types of data. VACLs are supported on Cisco 6500 Series switches. A VACL filters unneeded traffic so that it is not sent to the SPAN port where Multi-Port Collector captures packets. A VACL allows you to filter by protocol. Port Requirements Multi-Port Collector requires several ports to be open to support the following communication paths: 108 User Guide ■ Between SuperAgent and Multi-Port Collector ■ Between Enterprise Manager and Multi-Port Collector, when TIM is installed ■ To allow web interface access for Multi-Port Collector administration Port Direction Description 80 Inbound from SuperAgent and Enterprise Manager ■ HTTP for web interface access ■ Enterprise Manager communications with TIM 80 Outbound to SuperAgent Multi-Port Collector web service requests for configuration data 161 Inbound SNMP MIB queries 162 Outbound SNMP traps 3308 Outbound to SuperAgent Write access to the SuperAgent MySQL database Packet Deduplication Port Direction Description 7878 Inbound TCP flows containing packet digests from WAE devices Note: Needed only if a WAE device is a collector feed. 8080 9995 Inbound from SuperAgent and Enterprise Manager ■ SuperAgent web service requests for data ■ Enterprise Manager requests for network health data that appears on the Defect Details page in the APM console Inbound UDP flows containing packet digests from the GigaStor Connector Note: Needed only if GigaStor is a collector feed. More information: Architecture for SuperAgent Support (see page 12) Support for Transaction Impact Manager (see page 15) Packet Deduplication The term packet duplication refers to reporting on the same traffic multiple times as it passes through interfaces on a switch. Several port mirroring configurations can result in duplication. When a VLAN sends all traffic to the mirror port, duplication occurs because traffic from all ports is forwarded to Multi-Port Collector. The presence of duplicate packets can skew the metrics that are collected. Packet loss statistics are affected because duplicate packets are viewed as retransmissions. As a best practice, configure mirror ports to minimize or eliminate duplicate packets. Multi-Port Collector provides a packet deduplication setting that applies to the capture card and is enabled by default. This setting discards packets deemed to be duplicates of packets already received and processed if they arrive within a few packets of each other. During initial port mirroring configuration, you can temporarily disable the global setting for packet deduplication. Disabling the setting lets you see duplicate packets, which can help you eliminate duplication from mirrored sessions. Appendix A: Best Practices for Deployment 109 Packet Deduplication Deduplication logic applies to all packets received on a given logical port. Therefore, if a duplicate packet from the same VLAN is received on a different logical port, it is not discarded. If you combine two physical ports into a single logical port definition, a duplicate is discarded in the following situations: ■ If it arrives on a physical port within a few packets of the original packet on the other physical port ■ If it arrives on a second switch. Both packets are retained if the two physical ports are not combined into a logical port. More information: Eliminate Duplicate Packets (see page 115) 110 User Guide Appendix B: Integration with SuperAgent Multi-Port Collector supports most of the features that the SuperAgent standard collector supports. Multi-Port Collector also offers unique features such as packet capture, short-term storage, and metric analysis. The following SuperAgent features require Multi-Port Collector support: ■ Collection device-specific incident reporting ■ Support for additional configuration options, contained in initialization files ■ The ability to receive and correlate metrics from other collection devices, such as a WAN Optimization device. This section contains the following topics: Collection Device Incidents (see page 111) Support for Special Initialization (.ini) Files (see page 114) How to Monitor in a WAN-Optimized Environment (see page 118) Collection Device Incidents In the SuperAgent management console, the Administrator can specify whether to create a collection device incident when Multi-Port Collector or a collector feed becomes inactive. An Inactive Collector incident is raised when the management console stops receiving data from a standard collector, a Multi-Port Collector, or a collector feed. All collection device incidents have an Excessive severity. SuperAgent does not create Degraded collection device incidents. Multi-Port Collector also offers its own SNMP trap reporting of collector issues. SNMP traps are sent in response to issues associated with the following: ■ Critical process status ■ Packet capture functionality ■ Disk usage levels ■ RAID array and disk drive failures that can affect Multi-Port Collector The management console considers a collection device to be inactive when SuperAgent stops receiving performance data from that device. For example: ■ The network is down. No data is generated. ■ The collection device is down. Data is present on the mirror port, but the collection device is not active. Appendix B: Integration with SuperAgent 111 Collection Device Incidents ■ A feed assigned to this collection device is inactive. For example, a WAN Optimization device is unavailable. ■ The mirror port connection is lost. Data is generated, but the port is not active. The incident can be created even when some logical ports still send data to SuperAgent. For example, collector feeds assigned to Multi-Port Collector stop sending packet digests, but other ports remain active. Therefore, the incident does not necessarily indicate complete inactivity for Multi-Port Collector. Enable Collection Device Incidents A default Collection Device incident response is assigned to each collection device. The default response has no actions associated with it. You associate an incident response with an action on the Collector Properties page in SuperAgent. The typical SuperAgent work flow is as follows: ■ Create a Collection Device incident response ■ Edit it to add an action, such as an email notification ■ Edit collector properties to select the new incident response The “Availability Monitoring” setting on the Collector Properties page determines whether SuperAgent raises Inactive Collection Device incidents for Multi-Port Collector. The setting is enabled by default on all new collection devices. To prevent SuperAgent from creating Inactive Collection Device incidents, disable availability monitoring on the device. The SuperAgent online help contains guidance for creating incident responses. However, the following overview of the procedure can help you get started. Follow these steps: 1. Click Administration, Policies, Incident Responses in the SuperAgent management console. 2. Click Add Collection Device Response. The Collection Device Incident Response Properties page opens. 3. Type a name for the new incident response, and click OK. The new incident response appears in the Collection Device Incident Responses list. 4. Click the Edit icon for the new response. The Collection Device Incident Response Actions page opens. 5. Click Add Action. The Collection Device Action Types page opens. 6. 112 User Guide Select Send Email or Send SNMP Trap, and then click Next. Collection Device Incidents 7. Complete the required fields, which vary depending on the action you selected. 8. Click OK. A description of the action appears in the Collection Device Incident Response Actions page 9. Enable the incident response: a. Click Administration, Data Collection, Collection Devices in the management console. The Collectors page opens. b. Click the Edit icon for the Multi-Port Collector. The Multi-Port Collector Properties page opens. c. Select the new incident response from the Incident Response field. d. Click OK. The action you specified is performed when an Inactive Collection Device incident is created. Respond to an Inactive Collection Device Incident If you receive an Inactive Collection Device incident, perform one or more of the following: ■ Click the date link on the SuperAgent Incident page to see more information. ■ Review your trap receiver for alerts. Multi-Port Collector sends SNMP traps for multiple issues that can affect collection and capture. ■ Review the System Status page in the Multi-Port Collector web interface. The page lets you assess whether the incident stemmed from: – a hardware or software issue. Review the Process Information table for stopped processes. – a network issue. Review the Capture Card Physical Port Status table for links that are not connected or have gone down. – a collector feed issue. Review the Capture Card Logical Port Status table for feeds that are inactive. An inactive WAN Optimization device or GigaStor is not reported here. – a configuration issue. Review the Capture Card Logical Port Status table for logical ports that have a state of Disabled. Verify whether these ports show packet counts in the "Packets Processed" column. Appendix B: Integration with SuperAgent 113 Support for Special Initialization (.ini) Files – a packet-capture issue. Review the Capture Card Physical Port Statistics table for abnormal error counts and values of "0" in the "Packets" or "Bytes Received" columns. – a RAID drive issue. Review the RAID table for RAID status and failed drives. More information: Create SNMP Traps (see page 35) System Status (see page 85) Stop or Restart a Process (see page 94) Support for Special Initialization (.ini) Files Multi-Port Collector supports scenarios in which additional parameters are required to instruct collection devices to ignore irrelevant data. These parameters are distributed to collection devices by the following supported initialization (.ini) files. DataTransferManager.ini Sets the TCP port number on which the sadatransfermanager process listens for client connections. Do not change this port number. DTMDistributedConsoles.ini.sav Controls which IP addresses receive shared packet digest data. For more information, see the DTMDistributedConsoles.ini.readme file located in the /opt/NetQoS/bin directory on the Multi-Port Collector appliance. LimitDTTParams.ini.sav Controls the Data Transfer Time threshold. LimitServerResponseParams.ini.sav Controls the Server Response Time threshold. RetransPacketDefs.ini.sav Controls software deduplication. saCollectorOptions.ini Contains the default debug trace logging flags used by the nqmetricd service. A CA Technical Support technician can tell you which flags to enable when more logging is required. saLinuxCollectorDirectives.ini Defines the naming formats for log files and the parameters for accessing the local MySQL database. Do not change this information. 114 User Guide Support for Special Initialization (.ini) Files saMetricEngine.ini.sav Controls the size of the Active Sessions report. For more information, see the saMetricEngine.ini.readme file located in the /opt/NetQoS/bin directory on the Multi-Port Collector appliance. Other initialization files are documented in the CA NetQoS SuperAgent Administrator Guide. More information: How to Monitor in a WAN-Optimized Environment (see page 118) Eliminate Duplicate Packets Multiple mirror port configurations can result in packet duplication on a Multi-Port Collector feed. This section discusses the best practices for mirroring TCP traffic to Multi-Port Collector in environments where the typical hardware filtering options do not suffice. Discarded packets in the SuperAgentErrors.log file are not a factor here. The SuperAgent collector discards a packet that does not match the SuperAgent configuration. By contrast, dropped packets can cause problems because SuperAgent does not analyze dropped packets. Note: For information about deduplicating packets for GigaStor, see the CA NetQoS SuperAgent Administrator Guide. When you mirror VLANs to a SuperAgent collection device, SuperAgent receives two copies of each VLAN packet. To correct this duplicate packet situation, you can pass additional configuration parameters to Multi-Port Collector. Use the "sudo" command prefix because superuser permissions are required to modify the files in this directory. Follow these steps: 1. Navigate to the /opt/NetQoS/bin/ directory on the Multi-Port Collector appliance. cd /opt/NetQoS/bin 2. Copy the RetransPacketDefs.ini.save file to remove the .sav extension. sudo cp RetransPacketDefs.ini.sav RetransPacketDefs.ini When the .sav extension is removed, the .ini file is activated during the next collector synchronization or when the nqmetricd process is restarted. Appendix B: Integration with SuperAgent 115 Support for Special Initialization (.ini) Files 3. Add the following lines of code to the RetransPacketDefs.ini file: 50 1000 10 20 30 40 50 60 The first line instructs SuperAgent not to log information about duplicate packets. The standard collector supports this type of logging. Multi-Port Collector does not. The second line indicates how the retransmitted data filtering is applied. The numbers 50 and 1000 instruct SuperAgent to maintain a buffer of 50 packets to look for duplicates. If you reduce this parameter, Multi-Port Collector consumes fewer CPU cycles when looking for duplicates. As a result, Multi-Port Collector performance is improved, but fewer duplicates are found. These default values are recommended. The third line describes the bins of the histogram of duplicates. The standard collector supports the histogram as part of the logging option. Multi-Port Collector does not. 4. Restart the nqmetricd process from the Multi-Port Collector web interface. More information: Stop or Restart a Process (see page 94) Port Mirroring (see page 105) Packet Deduplication (see page 109) Command Line Syntax (see page 123) Filter Out Keep-Alive Messages You can limit the impact of application keep-alive messages on monitoring statistics in reports. Limit Server Response Time (SRT) or Data Transfer Time (DTT) to a maximum value so that unnecessary SRT or DTT observations are ignored. You can set the value to a number of seconds that falls below the keep-alive frequency. If you suspect that an application sends keep-alive messages, look for the inverse relationship between observations and SRT. Also look for SRT averages in the second range instead of the millisecond range. If you verify that the application sends keep-alive messages, you can apply a threshold to the SRT. If your application uses keep-alive messages that result in high DTT, you can apply a similar limit to filter DTT. 116 User Guide Support for Special Initialization (.ini) Files If you are unsure of the keep-alive frequency of a selected application, use 10 seconds as a starting point. In general, a server is unlikely to take more than 10 seconds to start responding to a user request. In most cases, the keep-alive frequency is greater than 10 seconds. Note: You can also apply SRT and DTT filters on the SuperAgent standard collector. For more information, see the CA NetQoS SuperAgent Administrator Guide. Follow these steps: 1. Navigate to the /opt/NetQoS/bin directory on the Multi-Port Collector appliance. cd /opt/NetQoS/bin Note: Root permission is required to modify files in the /opt/NetQoS/bin directory. Therefore, use the "sudo" prefix with all commands described in this procedure. 2. Specify an SRT threshold. a. Copy the LimitServerResponseParams.ini.sav file to remove the .sav extension: sudo cp LimitServerResponseParams.ini.sav LimitServerResponseParams.ini When the .sav extension is removed, the .ini file is activated during the next collector synchronization or when the nqmetricd process is restarted. b. Verify that the new file is writeable: sudo chmod u+w LimitServerResponseParams.ini c. Edit the .ini file to change the SRT threshold for each port you want to filter. For each application, type the port number and the maximum amount of acceptable SRT. Set the maximum SRT to a value that is slightly less than the keep-alive frequency. For example, to ignore Citrix keep-alive messages that occur at a frequency of 60 seconds, enter the following: -port=1494 -max seconds=59 Note: In this example, max seconds is a single parameter name that contains a space. d. 3. Save the file. Specify a DTT threshold for each port you want to filter. a. Copy the LimitDTTParams.ini.sav file to remove the .sav extension: sudo cp LimitSDTTParams.ini.sav LimitDTTParams.ini b. Ensure the new file is writeable: sudo chmod u+w LimitDTTParams.ini 4. c. Edit the .ini file to change the DTT threshold as described in step 2. d. Save the file. Restart the nqmetricd process in the Multi-Port Collector web interface. Appendix B: Integration with SuperAgent 117 How to Monitor in a WAN-Optimized Environment More information: Stop or Restart a Process (see page 94) How to Monitor in a WAN-Optimized Environment SuperAgent integrates with WAN Optimization solutions, such as Cisco® Wide Area Application Services (WAAS), to monitor application performance. In a WAN-optimized environment, application data is not visible to a monitoring system. The data appears to be from the WAAS device and not from the actual hosts. SuperAgent integrates with WAN Optimization devices to gain visibility into how WAN optimization affects individual application response times. Cisco WAAS requires multiple Cisco Wide Area Application Engine (WAE) devices at key points in the network, such as data centers and branch offices. Cisco WAE devices and WAN Optimization devices send performance data to SuperAgent collection devices. This data provides visibility into how WAN optimization affects application response times at segments of the network. Multi-Port Collector receives performance data from a WAN Optimization device as it sends that data over a monitored mirror port. You manually activate WAN Optimization support during Multi-Port Collector configuration. The process is described in the CA NetQoS SuperAgent Administrator Guide. Review the chapter titled “Integrating Data Collection with Cisco WAAS.” SuperAgent Support for Cisco WAAS When SuperAgent is configured for monitoring a Cisco WAAS environment, the WAE devices export FlowAgent data to a CA data source. Cisco WAAS effectively creates three distinct TCP segments for the network. Transaction performance data is collected from each segment and correlated. SuperAgent monitors from multiple collection points for a single optimized application-server-network combination. Therefore, SuperAgent generates a separate set of metrics for each TCP segment and treats each set as a separate application. To provide full visibility into Cisco WAAS effectiveness, SuperAgent reports application performance per segment, as follows: 118 User Guide ■ [Client] segment: The network segment between the clients in a branch location and the WAE device for that branch location ■ [WAN] segment: The network segment between the branch WAE device and the WAE device running in the data center ■ [Server] segment: The network segment between the WAE device and the servers in the data center How to Monitor in a WAN-Optimized Environment Application behavior on all three segments is analogous to that of a three-tier application. The source and destination ports and addresses remain the same throughout the tiers. A new SuperAgent application property monitors the WAN-optimized applications and identifies each segment. SuperAgent reports append a segment identifier to the application name. For example, HTTP application traffic can be identified as three separate items: HTTP [Client], HTTP [WAN], and HTTP [Server]. An additional report, the SuperAgent Optimization page, shows data for optimized transactions. The default view, Client Experience for Optimized Transactions, provides a single performance map of client segments for applications with segmented data. How Multi-Port Collector Integrates with a WAN Optimization Device The sadatatransfermanager process aggregates data on the TCP headers that it receives from WAN Optimization devices. The process is always running, even when not actively transferring or aggregating data. You can stop or restart it. The WAN Optimization device polls the Multi-Port Collector appliance every 5 minutes for a list of servers to monitor. The device sends packet digest files to the appliance. These files contain the TCP headers of all optimized traffic that matches the server list on the WAN Optimization device. The device does not send TCP headers for unoptimized traffic. The appliance performs the following from the packet headers it receives from the WAN Optimization device: ■ Calculates performance metrics for the optimized traffic on the Client and WAN segments. ■ Replaces the Server segment performance data received from the WAN Optimization device with more accurate data that the appliance receives from the mirrored port. ■ Automatically detects application traffic in the port mirror and provides an updated list of servers. SuperAgent propagates this list to all WAN Optimization devices to verify that all servers are monitored. The sadatatransfermanager process listens on port 7878 for incoming packet headers sent by the WAN Optimization device. More information: System Status (see page 85) Stop or Restart a Process (see page 94) Appendix B: Integration with SuperAgent 119 How to Monitor in a WAN-Optimized Environment The SuperAgent Optimization Report Multi-Port Collector processes the contents of packet digests and sends performance metrics to the SuperAgent management console. These metrics are displayed on the Optimization page. The default view on the Optimization page is the Client Experience for Optimized Transactions, a performance map of transaction times and observations. The applications with the longest transaction times (response times) are listed first. The Optimization page does not let you navigate to a Session Analysis in Multi-Port Collector. However, the name of each application is a link to a Components report for that application. This report breaks the transaction time into server response time, network round-trip time, retransmission delay, and data rates and volumes. The Components report page provides links to information about related incidents and availability. Sharing Data from WAN Optimization Devices One SuperAgent management console can typically support all WAN Optimization devices in your environment. However, you can distribute the load when your WAN Optimization deployment requires more collection devices than a management console can support. The following procedure describes how to share the [Client], [WAN], and [Server] segment performance data among several Multi-Port Collectors. Follow these steps: 1. Create a configuration file named DTMDistributedConsoles.ini. 2. Open the .ini file. 3. Type the IP address of the management console that is assigned to Multi-Port Collector. The management console instructs Multi-Port Collector how to find other collection devices to receive the shared data. Note: A sample file is provided, with a .sav extension appended. The sample contains invalid IP addresses to illustrate the proper file format. Locate the sample in the /opt/NetQoS/bin folder. 120 User Guide 4. Separate each IP address on a new line using dotted decimal notation. 5. Copy the DTMDistributedConsoles.ini file to all collection devices. For Multi-Port Collector, copy the file to the /opt/NetQoS/bin folder. How to Monitor in a WAN-Optimized Environment 6. Restart the sadatatransfermanager process. Up to 25 minutes can elapse before WAN-optimized Client segment data is shared between the collection devices. 7. To share data with additional collection devices, repeat steps 2 through 5. Note: More information about sharing data from WAN Optimization devices is available in the CA NetQoS SuperAgent Administrator Guide. See the topic titled "Integrating Data Collection with Cisco WAAS." Appendix B: Integration with SuperAgent 121 Appendix C: Command Line Syntax The default user name and password for the Multi-Port Collector appliance provide superuser access. You can perform the following operations at the Linux command line interface using the “sudo” prefix that identifies a superuser command. sudo /sbin/service nqmaintd status Verifies the status of the maintenance daemon (nqmaintd). sudo /sbin/service nqmaintd restart Restarts the maintenance daemon. Use only if the status message indicates the process is running. sudo /sbin/service nqmaintd start Starts the maintenance daemon. Use only if the status message indicates the process is stopped. sudo /opt/NetQoS/scripts/stopprocs.sh Stops all daemons (processes). sudo /opt/NetQoS/scripts/startprocs.sh Starts all daemons (processes). sudo /sbin/shutdown -h now Stops the appliance immediately. Stop the Multi-Port Collector database before you stop the appliance. sudo reboot Stops and restarts the appliance immediately. Stop the Multi-Port Collector database before you stop the appliance. sudo /opt/NetQoS/scripts/doVerticaCmd.sh -shutdown Stops the Multi-Port Collector database. You can also stop the database from the web interface. sudo /opt/NetQoS/scripts/doVerticaCmd.sh -start Starts the Multi-Port Collector database. sudo /opt/NetQoS/scripts/doVerticaCmd.sh -status Verifies the status of the Multi-Port Collector database. You can also verify the status from the web interface. Appendix C: Command Line Syntax 123 How to Monitor in a WAN-Optimized Environment sudo /opt/NetQoS/tui/tui-setup.php Invokes the Network Settings Utility on the appliance. sudo /opt/NetQoS/scripts/syncNapatechClock --force Immediately synchronizes the clock on the Multi-Port Collector capture card with the system clock. This command temporarily stops the nqcapd and nqmetricd processes, which disrupts monitoring. Both processes are restarted after the clocks are synchronized. More information: Database Status (see page 87) Database Status and Usage (see page 96) Log In to the Appliance (see page 99) Capture Card Clock Differs from System Clock (see page 103) 124 User Guide Appendix D: Regular Expression Syntax For advanced filters, the syntax that is written to the Conditions field automatically conforms to vendor specifications for capture card compatibility. Review the generated expressions, especially the placement of parentheses used to group the expressions, to verify that they are evaluated in the correct order. For example, the following grouping: (A OR B) AND C has a different result than this grouping: A OR (B AND C) You can edit the syntax in the Conditions field. Multi-Port Collector filtering includes packets that match the criteria. Take special care when creating filters that exclude packets from specific hosts or subnets. Discuss any questions you have about expression syntax with CA Technical Support. Example You want to ignore a conversation between Host A (192.168.32.15) and Host B (10.10.21.10). The conversation represents an automatic backup process that runs once per week and skews the baseline each time. You want to report on “all other traffic.” You also want to retain all packets from traffic that travels to hosts other than the excluded pair. So you create a filter that retains the following: ■ all packets where Host A is the source but where the destination does NOT EQUAL Host B, AND ■ all packets where Host B is the source but where the destination does NOT EQUAL Host A, OR ■ all packets with source addresses that do NOT EQUAL the IP address of Host A and Host B (all other traffic) If translated into English, the expression you create reads something like the following: (IP Source Address EQUALS 192.168.32.15 AND IP Destination Address does NOT EQUAL 10.10.21.10) OR (IP Source Address EQUALS 10.10.21.10 AND IP Destination Address does NOT EQUAL 192.168.32.15) OR (IP Source Address does NOT EQUAL 192.168.32.15, 10.10.21.10) Appendix D: Regular Expression Syntax 125 How to Monitor in a WAN-Optimized Environment In the Conditions field, the proper syntax looks like the following: When creating an advanced filter with regular expressions, select "Equals" to insert "==." Select "Not Equals" to insert "!=." More information: Use Regular Expressions for Precise Filtering (see page 25) 126 User Guide Index A access control list (ACL) • 105 administrative password, changing • 18 analysis analysis filters • 55 create • 51 data views • 53 delete • 52 description • 48 duplicate • 52 global filters • 65 predefined • 49 analysis filters apply to data view • 57 change • 63 delete • 64 types • 55 analysis pane • 47 appliance Linux commands • 123 log in • 99 placement • 105 port requirements • 108 shut down or restart • 102 application metrics, defined • 72, 75 architecture Multi-Port Collector and SuperAgent • 12 Multi-Port Collector and TIM • 15 B Boolean operator • 25, 57, 63 byte rate metrics, defined • 72, 80 C capture card logical port status • 88 physical port statistics • 89 physical port status • 88 capture files export to PCAP • 82 investigations • 11, 94 monitor for ADA • 10 purge • 97 chart types bar • 69 line • 69 pie • 70 stacked • 70 summary • 71 Cisco Wide-Area Application Service, monitoring • 10, 118 client metrics, defined • 75 collection device .ini files • 114 configure • 28 incidents • 111 collector feed incidents • 111 port requirements • 108 components, description • 9 configuration, post-installation • 17 connection time observations, defined • 75 CPU usage • 92 CRC errors • 89 CSV, exporting data to • 81 CT Obs, defined • 75 D data table add or remove columns • 80 description • 71 TCP tab • 75 Traffic tab • 72 data transfer time, defined • 75 data views description • 53 filter • 57 database purge data • 97 shut down • 123 status • 96 troubleshooting • 95 default password, changing • 18 deployment, best practices • 105 discarded duplicates • 89 display area charts • 68 data tables • 71 dropped packets • 88 Index 127 DTT • 75 E email, sharing data by • 84 ENRTT • 75 export data in email • 84 to CSV • 81 to PCAP • 82 to PDF • 80 F failed drives • 90 file system usage • 91 filters analysis • 55, 57 global • 65 hardware • 21 keep-alive messages • 116 regular expression syntax • 125 time frame • 55 G GigaStor, port requirements • 108 global filters change • 66 description • 65 remove • 67 global preferences • 33 H hardware filters and packet slicing • 22 and regular expressions • 25 create or change • 23 default filters • 22 description • 21 I incidents enable • 112 inactive • 113 interrupts • 92 K keep-alive messages, filtering • 116 128 User Guide L layer 3 and 4 protocol metrics, defined • 72, 75 Linux commands • 123 log files processes • 86 services • 94 log in to appliance • 99 logical ports and TCP sessions • 31 configure • 19 metrics • 72, 75 status for capture card • 88 view status in SuperAgent • 30 M MAC address metrics, definied • 72 memory usage • 92 MIB file • 35 N NCT • 75 NetQoS Performance Center, and user accounts and roles • 39 network configuration • 101 network metrics, defined • 72, 75, 80 network taps • 105 nqcapd process • 19, 23, 25, 33, 36, 86, 94 nqmaintd process • 33, 86, 94, 99, 123 NRTT • 75 P packet rate metrics, defined • 72 packets deduplication • 109, 115 dropped • 88 packet slicing • 22 processed • 88 password, changing • 18 PCAP, exporting data to • 82 PDF, exporting data to • 80 port mirroring, best practices • 105, 115 port requirements • 108 port statistics, resetting • 94 post-installation tasks • 17 change administrative password • 18 configure collection device • 28 configure global settings • 33 configure logical ports • 19 configure SNMP traps • 35 configure users and roles • 39 create hardware filters • 21 install TIM software • 32 power user • 43 processed packets • 88 processes status • 86 stop or start • 94, 99, 123 purge data • 97 R RAID status • 90 regular expression syntax • 125 restart appliance • 102 retransmission delay, defined • 75 S sadatatransfermanager process • 86, 119 SCT • 75 server metrics, defined • 75 service log files • 94 session analysis, examples of • 14, 48, 55, 65, 68 shut down appliance • 102, 123 SNMP traps change trap behavior • 38 create • 35 nqsnmptrap.log • 94 port requirements • 108 severity levels • 35 software install TIM • 32 SPAN, best practices • 105 SRT • 75 SuperAgent and Multi-Port Collector • 10, 111 architecture • 12 collection device incidents • 111 configure collection device • 28 data in Multi-Port Collector • 14 monitoring WAN-optimized environments • 118 packet-capture investigations • 11, 94 review TCP sessions • 31 verify port status • 30 system logs • 94, 95 system maintenance • 93 System Setup page • 100 System Status page • 85 T TCP metrics, defined • 72, 75 TCP sessions, how monitored • 10 TCP tab add or remove columns • 80 data • 75 filters • 55, 65 time zone, setting • 102 ToS metrics, defined • 72, 75 Traffic tab add or remove columns • 80 data • 72 filters • 55, 65 Transaction Impact Monitor (TIM) and Multi-Port Collector • 15 install software • 32 transaction time metrics, defined • 75 U UDP, port requirements • 108 user accounts and Performance Center • 40 change default information • 40 description • 40 permissions • 43 user permissions • 43 user roles and Performance Center • 42 description • 42 permissions • 43 V VACL • 105 VLAN filters • 21, 22, 23, 58 metrics defined • 72, 75 VSPAN, best practices • 105 W WAN-optimized environments, monitoring • 118 watchdog process • 86 Z zoom in or out • 55 Index 129
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Author : CA Technologies Create Date : 2011:11:03 11:21:56Z Modify Date : 2011:11:03 11:22:42-04:00 Language : EN-US Tagged PDF : Yes XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04 Format : application/pdf Creator : CA Technologies Title : CA NetQoS Multi-Port Collector User Guide Creator Tool : Microsoft® Office Word 2007 Metadata Date : 2011:11:03 11:22:42-04:00 Producer : Microsoft® Office Word 2007 Document ID : uuid:70cb1753-69ed-4ea2-a9b7-36e2cf042f32 Instance ID : uuid:7435f660-561a-4d48-becf-b9d68fe2f911 Page Layout : SinglePage Page Mode : UseOutlines Page Count : 129EXIF Metadata provided by EXIF.tools