Managing Large-Scale Deployments of Perle Products

Ad-Hoc Management

As information networks grow in size and businesses expect greater uptime and performance from their network backbone, there is an increased need to proactively monitor activity, notify when or before problems occur and provide alerting to administrators. To ensure this, it is imperative that the network administrator move from a reactive approach to network management to one that is proactive.

Ad-Hoc Management

Most networks begin small. And in those small networks, it is often the work of a small group of trusting individuals to complete the network build and administration tasks. Formalized mechanisms of change control often don’t exist in the smallest of networks as the cost of administrative overhead required to support them does not outweigh their benefits.

As most companies grow their business and correspondingly grow their networks, the number of configuration items grows geometrically with the size of the networks. Businesses must retreat from ad-hoc management to some mechanism of configuration control to ensure network stability. The FCAPS standards model can outline the necessary management tasks.

FCAPS

PerleVIEW Device Management System is an Enterprise-grade, multi-user, Windows server-based centralized management package that simplifies the configuration, administration, monitoring, and troubleshooting of Perle products in medium to large-scale deployments. PerleVIEW follows the ISO Telecommunications Management Network model and framework (FCAPS) for managing a network. This framework is identified by the following elements.

  • Fault management
  • Configuration
  • Administration
  • Performance management
  • Security management

Fault Management

Network and Element Management Systems provide fault management through its interaction with the managed devices. When a fault or event occurs, the managed device will send an event-alert via a standard protocol-based SNMP trap. This trap is logged by the management system and depending on the severity, triggers an event notification which may generate a manual or automatic activity. This may require an operator to respond to the alarm and acknowledge it or have this notification automatically sent out to individuals. This is generally done via pre-stored email or SMS addresses.

Using Twitter Twitter

As Twitter has become an important staple for mobile communications, some systems such as PerleVIEW enable administrators to set-up Twitter feeds for these notifications. After creating a Twitter user account for this purpose, PerleVIEW can, through its Twitter API, issue tweets to followers of this account on behalf of the Twitter account. This offers additional flexibility to the enterprise and assurance that the notification will be received.

Interaction with other SNMP systems

The benefit of the SNMP protocol is in its extensibility. As the protocol and framework are device-independent as well as NMS-independent, this allows for the interconnection of all SNMP-capable devices of any vendor into a single domain of management. Some organizations with already established SNMP based systems may have the need to receive copies of the alerts received from the network. PerleVIEW can be configured so that these same alerts are relayed to the enterprise’s core SNMP NMS system. This way the NMS may continue to manage the entire network and at the same time take advantage of the specific features and functions that are best served by PerleVIEW.

Pro-active Monitoring

Relying solely on receiving alerts from the remote entities to monitor device health is not full-proof, as the network device could in fact be powered off and never be able to send an alert. To recognizing this type of failure, the network management system issues pro-active SNMP probes on a periodic basis. These probes interrogate the health of the target system, acquiring all of the latest status and information. If the managed device is down or inaccessible, the management system will know immediately.

Configuration Management

Effective configuration management ensures that devices contain the right configuration based on policy. It also provides a mechanism for rapid return to operations of faulted devices, as an effective configuration management tool will store each device’s configuration in a separate searchable repository. In today’s environment of stringent compliance regulations, only through effective configuration compliance will a network pass an auditor’s review.

As with all managed network components, various parameters can be set. By managing these elements individually in a large-scale deployment scenario, errors can occur where some devices have a parameter set incorrectly. This can lead to inconsistencies in the performance of Ethernet to fiber links.

By incorporating a centralized management system, where all of the network administrators and operators can access, these variations are virtually limited.

PerleVIEW provides a number of capabilities that enable the network administrators to have control over their fiber links;

Easy Navigation Easily find your target device in the navigation pane. Navigate the entire device collection by name, IP subnet, device type, hardware type, health status or even your own custom group
Configuration Management Configuration backup, firmware and change management is provided to maintain and control the configuration and software levels of the devices that are deployed
Automatic Device Discovery PerleVIEW can automatically discover and identify devices attached to the network. Discovery filters enable you to limit discovery to specific network segments, domain name, specific IP address or IP address ranges. Discover devices on the ocal network as well as those located across routed networks.
Customizable pro-active monitoring Periodic SNMP probes interrogate the health of all your Perle devices on the network ensuring that you have the most update information on your network devices
Device grouping Set up your own groups of devices that make sense for your own organizational needs. These group names can then be used for user authorization, views and device tasks
Device CLI Scripting Powerful tool for advanced users. Create CLI scripts that can be used for various device activities such as large scale configuration changes.
Backup and Restore The configuration database can be backed up ensuring that configurations can be rapidly restored in the case of a disaster event.
Device Firmware Version Control PerleVIEW can do periodic checks for the latest device firmware and PerleVIEW software levels directly from Perle’s web site. Devices that are not at the latest level are easily identified.
Deploy Device firmware Easily perform firmware updates to a large number of devices through simple deploy device firmware tasks. These can be set up as on-demand or scheduled
Audit Trail Log PerleVIEW logs all tasks performed by all PerleVIEW users. This log can be viewed on-line or exported as a .csv file
Reports All device activity, status and information are kept by PerleVIEW in an SQL database. Users can create their own customized reports using standard SQL database tools such as Crystal Report
In-band Connection Tool Specific devices can be managed directly using Telnet, SSH, http or https. PerleVIEW provides the option of a browser-based GUI or a browser-based command line interface (CLI). Unlike other network management platforms, the connection to the evice is made through PerleVIEW and not a redirected client. This enables the client and the managed devices to exist on separate unconnected or firewalled networks.
Single sign-on for in-band connections With pre-configuration, an authenticated user connected to PerleVIEW can connect to any of the devices without re-authenticating again to the device.
Device PING tool Device administrators can initiate standard ICMP PINGs from PerleVIEW to a targeted device. This provides a powerful troubleshooting tool right from your browser without having to know the device’s specific IP address

Administration (Accounting) Management

For large enterprises, a number of groups of individuals with varying responsibilities are involved in the management of the network. PerleVIEW enables effective delegation of management responsibilities by giving administrators granular control over which users can perform specific management operations on specific systems. Roles include:

  • The PerleVIEW Administrator has the responsibility of managing the entire operation of PerleVIEW, the roles of operators that manage specific device groups and what level of control that these users have over the network.
  • A Device Administrator can manage devices as an administrator type user with full read/write configuration capabilities.
  • Device Operators can perform basic functions on the device such as viewing status and the resetting ports and links.
  • A Device Viewer is limited to viewing functions on information that is stored in the PerleVIEW database.

PerleVIEW as an application designed specifically for Windows Servers, integrating with Windows security and authentication mechanisms. Only those users authenticated through Windows security are permitted access to PerleVIEW.

Administrators can also take advantage of utilizing established Microsoft Groups to profile PerleVIEW users and what roles they can have within the system. As an example an enterprise may want to limit the existing “Fiber engineering” Microsoft Group to have a specific role for specific devices. When an authenticated user from that group accesses PerleVIEW, the rights associated with that Windows Group will be assigned to that user.

Any process for configuration management needs to include a process whereby that environment can be audited against its baseline.

Depending on the industry in which you do business, there may be one or more compliance regulations that require auditing to occur. Your ability to show successful compliance to network security regulations and prove your configuration can prevent you from expensive and damaging litigation.

Compliance Regulation Industry
Sarbanes-Oxley Act (SOX) Publicly-traded institutions
Gramm-Leach-Bliley Act (GLBA) Financial institutions and those that handle personal financial information
Payment Card Industry Data Security
Standard (PCI or PCI DSS)
Institutions that accept payment cards
Health Insurance Portability and
Accountability Act (HIPAA)
Medical institutions

All tasks performed on PerleVIEW are stored in an audit trail log which can be viewed on-line or exported as a .csv file for an audit review.

Performance Management

Performance management expands upon simply answering the question, “Why is the network so slow?” It involves pro-actively analyzing a network’s activity and making informed business decisions about expansion before performance becomes critical.

PerleVIEW offers an information collecting task that is used to gather comprehensive details such as port statistics from the target device. The results from these tasks can be reviewed or used in the generation of custom reports from SQL database used by PerleVIEW.

Security Management

Enabling successful security management means segregating the roles and responsibilities of administrators and users, logging their activity, and ensuring the privacy of data on the network.

By relying on the already established Windows Server security infrastructure that has been adopted by the enterprise, PerleVIEW is automatically protected and can capitalize on the change management, Active Directory policy management and strong authentication schemes that already exist.

In addition, data to and from your internet browser can be encrypted via standard SSL and SSH protocols, ensuring complete protection of your online information.

Summary

PerleVIEW is the most complete centralized management package for a managed device installation. This enterprise-grade solution is is based on standardized Windows Server and SQL functionality to ensure security and reliability. Enable your IT organization to focus less on daily maintenance and more on meeting future business needs by choosing Perle for your device networking hardware.

Perle Products Managable by PerleVIEW

Hi!

Have a Question? Chat with a live Product Specialist!

Have a Question?

We can provide more information about our products or arrange for a price quotation.


email-icon Send an Email
contactus-icon Send an Email callus-icon Call Us
×

Send us an Email