Pre-Con Education: CA Unified Infrastructure Management Network Performance Management Capabilities
Martin Kowalewski, Daniel Okine
DevOps: Agile Ops
CA Technologies
CA UIM Product Management
DO5X84E
@CA_IM
@okined
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Please join us for a detailed education session on the new application-aware network performance management capabilities within CA Unified Infrastructure Management. We will explore how CA Unified Infrastructure Management continues to deliver on our vision of agile, unified monitoring that is easy to set up, administer and use. This session will teach you how to install and configure the newest network monitoring functionality, specifically focused around the unification of traffic analysis (with CA Network Flow Analysis), network device performance (with the SNMP collector probe), and application delivery performance (with CA Application Delivery Analysis). These advanced capabilities will help you proactively resolve network issues across your applications and services before user experience suffers. We will also show how you can rapidly add and configure new network devices for monitoring. Using the SNMP collector probe self-certification, you’ll learn how to quickly produce the metrics you need without waiting for vendors to add support for these. In short, this will be a dive into the newest, most advanced network capabilities of CA Unified Infrastructure Management and how they can enable your business to be successful in the application economy.
Martin Kowalewski
Daniel Okine
CA Technologies
CA UIM Product Management
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
MODULE 1 – DESCRIBE CA APPLICATION DELIVERY ANALYSIS (CA ADA)
MODULE 2 – CONFIGURE CA UIM/CA ADA INTEGRATION
MODULE 3 – DESCRIBE CA NETWORK FLOW ANALYSIS (CA NFA)
MODULE 4 – CONFIGURE CA UIM/CA NFA INTEGRATION
MODULE 5 – SELF-CERTIFICATION WITH SNMPCOLLECTOR
1
2
3
4
5
Module 1 –Describe CA Application Delivery Analysis (CA ADA)
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Time Wasted
Why is it so slow?It’s probably the
network!!
I’m not sure if the problem is the
server, network or application. I’m going to escalate
it to all the teams.
It’s probably the network!!
What problem? All the devices are
up and running.
Not today! Today is launch day.
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Quickly Identify the Fault-Domain
Network?
Server?
Application?
Data Center
Remote Site
WAN
Response Times Between the Server Switch and the Client
Response Times Between the Server Switch and Server
Combined Network and Server Response Times That Reflect the End User Experience
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA ADA Overview: Architecture
Network Type
Network Type
Network TypeNetwork Type
LA
NYC
SEA
CHI
HOU
40 Mbps
30 Mbps20 Mbps
12 Mbps
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
User
Infrastructure Server
TCP(80) SYN
Web Transaction
CA ADA Monitor
Server Connection Setup Time
Network Connection Setup Time
TCP(80) ACK
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
User
Infrastructure Server
TCP(80) SYN
Web Transaction
HTTP GET index.html (Data Request A)
Data Response A1
ACK Response A1
Data Response A2
ACK Response A2
CA ADA Monitor
TCP(80) ACK
Server Response Time
Network Round Trip Time
HTTP GET index.html (Data Request B)
Data Transfer Time
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
TCP(80) SYN ACK
User
Infrastructure Server
TCP(80) SYN
Web Transaction
HTTP GET index.html (Data Request A)
Data Response A1
ACK Response A1
Data Response A2
ACK Response A2
CA ADA Monitor
TCP(80) ACK
Server Response Time
Network Round Trip Time
HTTP GET index.html (Data Request B)
Data Transfer Time
Data Response B1
Data Response B1
Data Response B1NoResponse
NoResponse
ACK Response B1
Retransmission Delay
ACK Response B2
Data Response B2
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Response Time Insight
Server Response TimeAmount of time it takes for the server to begin responding to a request.
Data Transfer TimeAmount of time for the server to send, and the network to deliver, the requested data
Retransmission TimeTime spent resending packets due to packet lossNetwork Round Trip TimeAmount of time it takes for a packet to traverse the network in both directionsAverage time for a TCP request to be fulfilled
Server Response
+Data Xfer
+Retrans. Delay
+Network RTT
=
Total Transaction Time Gray line represents observed transactions over given time interval
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Value of End-to-End Monitoring
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Does With Data
Baselines normal performance
Automatically computes thresholds to define degraded & excessive performance
Classifies relative performance for all monitored networks, servers, & applications
Launches appropriate, automated investigations when performance degrades
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Classifying Relative Performance
Requires accurate definition of “normal” performance
Requires significant statistical sampling
Requires understanding how performance relates to application interaction by users
Degraded
Excessive
Available/Normal
Unavailable
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 1 Summary
You should now be able to:– Understand how and where CA ADA fits
in the network
– Identify the key metrics that are calculated by CA ADA
– Understand the value end to end monitoring provides
In the next module, you will:– Configure CA ADA/CA UIM integration
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
Where should CA ADA collectors be installed in the network?
Branch NetworkA
In the CloudB
Data CenterC
All of the aboveD
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
What metric identifies the time that it takes for a server to respond to a request for data?
Network Response TimeA
Server Connection TimeB
Server Response TimeC
Data TimeD
Module 2 –Configure CA UIM/CA ADA Integration
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Integration IS:
Shows the evolution of the CA UIM unification strategy
Shows application delivery metrics inside of USM
Support for an operational workflow– Drill to Server – View System metrics, App Probe metrics, and/or App
Delivery metrics from CA ADA
Drill-out capability from each CA ADA chart in context
Support for n CA ADA consoles on a single inventory probe
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA ADA Integration IS NOT:
Provides support for dashboards of Top-N CA ADA KPIs for the entire enterprise
Automatically syncs CA ADA incidents as alarms in CA UIM (Behavior that exists with CAPC/NPC) – SNMP trap integration is the current supported path to get CA ADA
incidents to show up as alarms inside of CA UIM.
Provides support for Single Sign-On between CA UIM and CA ADA
Multi-tenant aware
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
USM
Bus
Discovery NMS/UDM
ADAConsole
MetricsAPI
CA ADA Inventory
Probe
DataWS
InvWS
UI ctd
High-Level Technical Architecture
CA ADA-based views
Drill-out
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
CA ADA 10.4 Install– Master Console with Collection - Install of CA ADA Master Console on a
single vm or physical server, with a 2nd nic available for collection.
– Distributed Deployment - Multi-box with CA ADA console and CA ADA collectors in the environment. All current collectors supported. (Single Port, MTP, Gigastor, etc.)
ADA_Inventory Probe– Local or Remote Probe used to send CA ADA inventory to UDM
CA UIM 8.35(CR) – GA 8.4
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
Install and configure CA ADA 10.4
Install and configure CA UIM 8.35 (CR)
Download and deploy ADA_Inventory probe to either CA ADA Master Console or other robot
Configuration in Admin Console– Add New ADA Console
– Enter name of console and hostname or IP address of CA ADA Master Console
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps (cont’d)
Configure in Admin Console– Add New ADA Console
– Enter name of console and hostname or IP address of CA ADA Master Console
– Choose whether to include only servers with User Defined Apps
– Click Submit, then click Save
Open USM– Select server from inventory that is being monitored by CA ADA
– Click the Advanced tab to see the CA ADA “goodness”
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
It is recommended to only export servers for “user-defined” apps.
To further value, ensure server and app probes are deployed to servers that are also being monitored by CA ADA.
To simplify deployment use a single ADA_Inventory probe for CA ADA deployments with multiple consoles.
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 2 Exercise
In the following lab exercise, you will:– Validate data in CA ADA
– Install and configure ADA_Inventory Probe
– Execute Operational Workflow using application delivery data inside of USM
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Lab Environment
CA NFA Standalone
CA ADA Standalone
Florida - Infrastructure
Arizona - Infrastructure
Data Center Infrastructure
TIXCHANGE-WEB
Netflow
SNMP Polling
CA UIM with SNMPC
R R CA UIM Robot
Switch Router
WAN
Packet Data (SPAN)
R
RTIXCHANGE-APP
TIXCHANGE-DB
R Michigan - Infrastructure
R
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 2 Summary
You should now be able to:– Understand CA UIM/CA ADA integration
architecture and deployment requirements
– Identify if CA ADA is successful collecting data
– Install and configure ADA_Inventory probe
– Execute USM workflow using CA ADA metric data
In the next module, you will:– Describe CA Network Flow Analysis
Module 3 –Describe CA Network Flow Analysis (CA NFA)
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
NetFlow, IPFIX
CA Network Flow Analysis100% visibility into network traffic and behavior
• Visibility into how the network is being used –users, destinations, prioritization
• Single, data center-based collection point
• Accurate historical, real-time and projective capacity account
• Cisco IVT certified for AVC (Application Visibility and Control) enabled devices for rich accounting, classification and reporting of applications
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Network Flow Analysis – Benefits
Reduce WAN Costs• Visibility into utilization levels in order to optimize network capacity• Make sure bandwidth is not the root cause for performance issues before investing in costly
upgrades
Detect, isolate and resolve network problems faster
• Reduces false positives and wasted efforts through patented anomaly detection that dynamically adapts the network profile to ensure detection accuracy.
• Gain an enterprise-wide view of infrastructure availability and performance, and, when needed, drill down to flow components for detailed analysis and guided workflows that enable faster problem remediation.
Understand, predict and meet changing network capacity demands
• Reality-based capacity planning with access to 13 months of enterprise-wide historical data.• Intelligent, fact-based decisions regarding capacity investments and resource optimization to
address and anticipate evolving technical and business requirements.
Align to business priorities
• Cisco NBAR2 support enables rich application accounting, classification and reporting to enhance visibility into applications running on the network.
• With enhanced visibility - Intelligently prioritize, control, route, load-balance and optimize application traffic to maximize user experience, optimize bandwidth and reduce costs.
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IP-Flow Technology Support
Flexible NetFlow
Sflow
Jflow
Cflowd
NetFlow v5
NetFlow v9
IPFIX
NetStream
34
Application AwarenessCisco Application Visibility and Control (AVC)
Pervasive App Visibility Business Policy-based Rules Comprehensive Reporting
• No additional hardware
• Rich data collection using NetFlow v9/IPFIX
• Easy to integrate into many reporting tools
• No need for complex IP and port ACLs
• See inside HTTP flows to identify specific Cloud applications
• Better use of costly bandwidth
• Per-branch and per-application level reporting
VISIBILITY TO 1000+ APPS SMART CAPACITY PLANNINGNO PROBES
PrivateCloud
Branch DC/Headquarters
WANNetFlow v9
Enterprise Edge
AVC
AVC
CSR
Proliferation
of Devices
Users/Machines
60% of IT Professionals Cite Performance as Key Challenge for Cloud
ISR
ASR
AVC
AVC
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
AVC Operation – Performance Collection and Exporting
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Cisco AVC
With Cisco AVC, customers can…– Discover network traffic with application-level insight with deep
packet visibility into web traffic
– Analyze and report on application usage
– Classify and manage application sessions (including web browsing, multimedia streaming, and peer-to-peer applications)
– Build reporting for capacity planning and compliance
– Enforce quality-of-service (QoS) policies and service guarantees for latency-sensitive applications (such as voice over IP [VoIP] and interactive gaming)
– Implement fair-use policies and manage network congestion by optimizing application-level traffic
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture 2-Tier
Router configenablesNetFlow NetFlow Datagrams:
1 Minute
• Records Raw flows in Harvester Archive• Creates 1 minute data files containing top
protocols/hosts/Conversations/ToS per interface • New devices are Polled for SNMP information
• Pulls data from the Harvester as needed• Web GUI for reporting and Administration
Long term storage of 15 minute bucket:•Protocol data for the past 13 months•Interface summary data for the past 13 months•ToS summary data for the past 13 months•Top protocols for the top ToS values for the past 13 months•Host and conversation data for the past two months•Top hosts and conversations for the top ToS values for the past 2 months
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture 3-Tier
Router configenablesNetFlow NetFlow Datagrams:
1 Minute
• Collects up to 9 Million flows per minute• Records Raw flows in Harvester Archive• Creates 1 minute data files containing top
protocols/hosts/Conversations/ToS per interface • New devices are Polled for SNMP information
• Pulls data from the Harvester every 15 minutes • Web GUI for reporting and Administration• Manages interfaces stored on the DSA
Long term storage of 15 minute bucket:•Protocol data for the past 13 months•Interface summary data for the past 13 months•ToS summary data for the past 13 months•Top protocols for the top ToS values for the past 13 months•Host and conversation data for the past two months•Top hosts and conversations for the top ToS values for the past 2 months
39 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Architecture – Multi-Platform Harvester
40 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Stacked Protocol Trend
Applications
broken out by
NBAR2
Classification….
41 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Network CongestionWe see a large amount of Windows Media saturating the interface
42 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
QoS Validation
This also corresponds to a large amount of “Real Time” queued traffic
Which is comprised of Windows Media
43 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Root Cause: Non-Business Critical Traffic
Which is caused by streaming games from NBA.com
44 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deeper Network Flow Details When Needed
Drill-down to raw data with flow forensics
Delay between router and client
Server Response
Client Experience
• Report on all of the flow data that is collected in your environment & analyze every protocol, host, and conversation on your network
• Browse raw flow data & drill down to jump to detailed information about any of the fields in a data packet for any monitored interface
45 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Patented Anomaly Detection
Visibility into network use – users, destinations, prioritization
Single collection point
Accurate historical, real-time and projective capacity account
Cisco IVT certified for AVC (Application Visibility and Control) enabled devices
Proactively detect security risks that impact performance
46 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 3 Summary
You should now be able to:– Understand the benefits of CA Network Flow
Analysis
– Understand the technologies supported by CA Network Flow Analysis
– Understand the deployment architecture of CA Network Flow Analysis
In the next module, you will:– Configure NFA/UIM Integration
47 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
What are the key benefits of CA Network Flow Analysis?
Reduce WAN CostsA
Detect, isolate and resolve network problems fasterB
Align to business prioritiesC
All of the AboveD
48 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
What Flow Technology is NOT supported by CA NFA?
IPFIXA
Cisco NetflowB
Cisco AVCC
TraceflowD
49 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Class Question
What is the recommend deployment architecture for new installs?
Two-TierA
One-TierB
Three-TierC
Three-BeerD
Module 4 –Configure CA UIM/CA NFA Integration
51 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA NFA Integration IS:
Unified view of SNMP and Netflow data inside of CA UIM– Interface Details – SNMP Interface Rate, Errors, Discards with NFA
Stacked Protocol, Top Hosts and Conversions
– Advanced Tab – SNMP Interface Rate, CBQoS Volume, CBQoS Drops, NFA Stacked ToS, Tops Hosts per ToS, Top Conversions per ToS
Upgrade path for existing CA UIM Flow Probe users to leverage the features of the current full CA NFA solution
Single sign-on drill-out capability from each CA NFA chart in context to CA NFA Console for additional diagnostic detail
Multi-tenant aware
52 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What CA NFA Integration IS NOT:
Provides support for dashboards of Top-N NFA KPIs for the entire enterprise
Sync’s CA NFA events as alarms in CA UIM (similar to current functionality of CAPC/NPC)– SNMP trap integration is the current supported path to get CA NFA
events/analysis traps to show up as alarms inside of CA UIM
53 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
USM
Bus
Discovery NMS/UDM
NFAW
MetricsAPI
SNMP_collectNFA
Inventory Probe
DataWS
InvWS
UI ctd ctd
Technical Architecture
snmp_c-based views
Nfa-based views
**Drill-out
SNMP Profile transfer agent
Pulls from UDM
54 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
CA NFA Install
• Standalone - Single box with both harvester and console installed on a single vm or physical server(Windows 2012 R2 Only)
• Distributed - Multi-box with harvester(s) and console installed on separate VMs or physical servers• Windows 2012 R2 For Console• Windows 2012 R2 or Redhat 6.7 for Harvester
NFA_Inventory Probe • Local or Remote Probe used to send NFA inventory to UDM for reconciliation with SNMPCollector
NQ_Services Probe • If Multi-tenancy is required
CA UIM 8.2+ with SNMP Collector 2.1+
• Recommended CA UIM 8.4 with SNMPCollector 3.2
55 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
Install and configure CA NFA 9.3.3
Install and configure CA UIM 8.35 (CR)
Download and deploy NFA_Inventory probe to either CA NFA Console or any other robot
Download and deploy SNMPCollector
Download and deploy NQ_Services probe to same hub with UGS (if multi-tenancy is required)
56 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps (cont’d)
Configure in Admin Console– Click Add New NFA Console
– Enter name of console and hostname or IP address of NFA Console
– Click Submit
– Click Save
Open USM– Select router from inventory
– Click Interface Details
– Select interface to see the CA NFA “goodness”
57 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
Ensure that SNMPCollector is monitoring the same network devices sending flow data
Leverage SNMPCollector for utilization alarms and use CA NFA to understand what is driving the utilization
NFA Export IP address (configured on the Router) and SNMPC Polled IP should be the same. It is recommended to be the loopback interface or management IP of the device.
Collocate NFA_Inventory probe with the CA NFA Console
58 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 4 Exercise
In the following lab exercise, you will:– Validate data in CA NFA
– Install and configure NFA_Inventory probe
– Install and configure SNMPCollector probe
– Execute Operational Workflow using CA Network Flow Analysis data inside of USM
59 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Lab Environment
CA NFA Standalone
CA ADA Standalone
Florida - Infrastructure
Arizona - Infrastructure
Data Center Infrastructure
TIXCHANGE-WEB
Netflow
SNMP Polling
CA UIM with SNMPC
R R CA UIM Robot
Switch Router
WAN
Packet Data (SPAN)
R
RTIXCHANGE-APP
TIXCHANGE-DB
R Michigan - Infrastructure
R
60 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 4 Summary
You should now be able to:– Understand CA UIM/CA NFA integration architecture
and deployment requirements
– Identify if CA NFA is successful collecting data
– Install and configure NFA_Inventory probe
– Install and configure SNMPCollector probe
– Execute USM operational workflow using CA NFA/SNMPC Data
In the next module, you will:– Leverage Self Certification with SNMPCollector
Module 5 –Self-Certification With SNMPCollector
62 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What SNMPC Self Certification IS:
Create new vendor certification for new device support– Associate SNMP OIDs with existing metric in an existing metric family
Create new custom monitors– Associate SNMP OIDs with existing metric in an existing metric family
Create and modify custom vendor certifications
Create Expressions for custom vendor certifications
Modify existing expressions in custom vendor certifications
63 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What SNMPC Self Certification IS NOT:
Redefine an existing metric in an existing Metric Family
Add new metric to and existing Metric Family
Define and create a new Metric Family
Automatically deploy a new custom vendor cert to multiple SNMPCollector probe instances
64 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
High Level Architecture for Self Certification
65 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Requirements
CA UIM 8.2+ installed
UMP 8.2+ installed
At least one installed instance of SNMP Collector 2.1+
– SNMPCollector must be on a secondary hub
– SNMPCollector must be within the same domain as UMP
66 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deployment Steps
Install and configure CA UIM 8.2 or later.
Download and deploy SNMPCollector per documentation, if not already deployed
Download and deploy Self Cert portlet to the UMP hub
Configure
– Create a Self Certification portlet page
– Add the Self Certification portlet to the created page
67 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Production
Names attribute must always be assigned for all custom vendor certification
Description should be assigned
Expressions must be validated using test
Tabular OIDs must be added from a single table to maintain integrity of indexing
68 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Best Practices for Product (cont’d)
Scalar OIDs can be picked from multiple MIBs
New custom vendor certs should be saved to running SNMPC instance
69 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 5 Exercise
In the following lab exercise, you will:– Add a new MIB File into MIB repository
– Load MIB file into MIB Browser
– Use Search feature to find a specific OID
– Browse and select OIDs to monitor
– Manually enter OID to monitor
– Create a vendor cert for an existing MF
– Deploy and validate a vendor cert
70 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Module 5 Summary
You should now be able to:– Load and manage MIB files in MIB repository
– Create custom vendor certification
– Deploy and start using custom vendor cert
71 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
72 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO5T26T Tech Talk: Self-Certify New Devices with the CA Unified
Infrastructure Management SNMP Collector 11/18/2015 at 3:00 pm
DO5X127SVision and Roadmap: Application-Aware Network
Monitoring Solutions for UIM 11/18/2015 at 4:30 pm
DO5T25T
Tech Talk: Leverage the Combined Power of CA Unified
Infrastructure Management, CA Network Flow Analysis
and CA Application Delivery Analysis
11/19/2015 at 12:15 pm
73 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
CA UIM and CA APM IntegrationArea #5
ANPM
Area #5
CA UIM for MSPs
Area #5
CA UIM for Networking
Area #5
74 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15