Every organization is on the lookout for ways to improve network availability and performance, and reduce their operating expenses. It's not funny to have to drive to a client's premises in the middle of the night without any clue as to what's going on - whether it's for an hour or for a whole day. It's even worse when the client has no or very little knowledge about what just happened because they have no tool to track the problem. Step beyond the default installations and make this tool work for you in the way you want.This book guides you through the whole network monitoring implementation process. It covers all NNMi features and gives you hints to adapt this management software to your specific needs. It also describes how to use built-in features and adapt them in the most efficient way. It stitches the gap between technical personnel and management, covering subjects in both technical and business languages.The book guides you from system sizing, edition, and feature selection to system customization as per your staff needs. If you are about to expand your system and bring external tools for integration with NNMi, this book is a good source to start from. It has descriptions and examples on why and how NNMi can be integrated. It explains what system designers do while sizing an NNMi system and how your system should be installed. You will also find a description on how you should design and implement your network discovery. You will learn how to create maps for your operators, so any network device that causes issues can be tracked fast, and each device position will tell each device's purpose.Incident customization will help you configure which incidents are important for you, instead of receiving the vendor default settings with no clue as to what they mean in your situation. You will learn how to navigate between incidents and maps to reduce troubleshooting time and use your custom created tools within NNMi and become a proactive operator. The least visible but most important task in critical situations is how well you have prepared your system for disasters. This book describes backup, application failover, and clustering techniques with real-world examples. After reading this book, you will be ready to design monitoring and management tools to work along with NNMi in the way you want.Don't work for NNMi - make it work for youNow youhavecompletedthis chapter, you will have a good understandingofwhatroleNNMi plays in network monitoring and how it ... This chapter has described how to monitor a network for problems taking two different approaches: monitoringanbsp;...
|Title||:||HP Network Node Manager 9|
|Publisher||:||Packt Publishing Ltd - 2010-12-01|