D-View 8 Manual v2.00 (Draft) r3
D-View 8 Manual v2.00 (Draft) r3
(Draft_r3)
Information in this document is subject to change without notice. Reproduction of this document in any manner, without
the written permission of the D-Link Corporation, is strictly forbidden.
Trademarks used in this text: D-Link and the D-Link logo are trademarks of the D-Link Corporation; Microsoft and
Windows are registered trademarks of the Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either as the entities claiming the marks and
the names or their products. D-Link Corporation disclaims any proprietary interest in trademarks and trade names other
than its own.
1 Introduction ......................................................................................... 1
1.1. D-Link D-View 8 Network Management Software ........................................... 1
1.2. D-View 8 Features .......................................................................................... 2
1.3. D-View 8 Licenses .......................................................................................... 4
1.4. 90-Day Free Trial ............................................................................................ 5
1.5. D-View 8 Server System Requirements .......................................................... 6
1.6. D-View 8 Remote Probe Requirements .......................................................... 6
1.7. D-View 8 Client Requirements ........................................................................ 6
1.8. Network Environment Models ......................................................................... 7
1.9. Device Groups ................................................................................................ 8
1.10. User Authentication Types ............................................................................. 8
1.11.Prepare Network Devices for Discovery ......................................................... 8
1.12.Start D-View 8 ................................................................................................ 8
2 Installation ........................................................................................... 9
2.1. Requirements ................................................................................................. 9
2.2. Windows Installation ....................................................................................... 9
2.2.1. Standalone Edition Installation .......................................................................................... 9
2.2.2. Cluster Mode Installation (Only Available for Enterprise Edition) .................................... 14
2.2.3. Probe Package Installation .............................................................................................. 28
2.3. Linux Installation ........................................................................................... 30
2.3.1. Standalone Edition Installation ........................................................................................ 30
2.3.2. Cluster Mode Installation (Only Available for Enterprise Edition) .................................... 32
2.3.3 Probe Package Installation ................................................................................................ 51
2.4 Software Upgrade......................................................................................... 54
2.4.1. On Windows .................................................................................................................... 54
2.4.2. On Linux .......................................................................................................................... 56
2.5 Uninstallation .................................................................................................. 57
2.5.1. Uninstall under Windows ................................................................................................. 57
2.5.2. Uninstall under Linux ....................................................................................................... 57
2.6 Software Migration ......................................................................................... 58
2.6.1. D-View 7 and D-View 8 Architecture................................................................................ 58
iii
2.6.2. Install D-View 8 on a New Server .................................................................................... 58
2.6.3. Install D-View 8 on the Original D-View 7 Server ............................................................. 61
2.6.4. Upgrade Remote Probes ................................................................................................. 64
iv
4.4.3. MIBs .............................................................................................................................. 106
4.4.4. Monitor Devices with SNMP .......................................................................................... 106
4.4.5. View Traps and Generate Alarms for Traps .................................................................. 107
4.5. Manage Multiple Networks with Batch Configuration .................................. 108
4.5.1 Create Configuration Templates.................................................................................... 108
4.5.2 Batch Configuration ....................................................................................................... 109
4.5.3. Create Tasks for Batch Configuration ........................................................................... 109
vi
12 Reports........................................................................................... 194
12.1 Generate Scheduled Reports and My Reports ........................................... 194
12.2 Manage Report Templates ......................................................................... 196
12.2.1. Add a Report ................................................................................................................. 198
12.2.2. Modify a Report ............................................................................................................. 199
12.3 View and Remove Reports ......................................................................... 201
13 Users and Security Profiles ........................................................... 202
13.1 Profile Role Types ...................................................................................... 202
13.2 Authentication............................................................................................. 205
13.2.1. Join an AD Server ......................................................................................................... 205
13.2.2. Join a RADIUS Server ................................................................................................... 205
13.3 Add a User Profile ...................................................................................... 208
14 System Settings .............................................................................. 210
14.1 Configure Global Settings ........................................................................... 210
14.2 Scheduling.................................................................................................. 223
14.3 Licenses ..................................................................................................... 225
14.4 View D-View 8 Logs ................................................................................... 230
15 Tools ................................................................................................. 231
15.1 MIB Browser ............................................................................................... 231
15.2 MIB Compiler Tool ...................................................................................... 233
15.3 Perform an ICMP Ping ................................................................................ 235
15.4 Perform an SNMP Test .............................................................................. 236
15.5 Perform a Trace Route Test ....................................................................... 238
15.6 Configure Network Management from CLI.................................................. 239
15.7 Compare Configuration Files ...................................................................... 241
Appendix A: Deployment with Five-server Topology ........................ 242
Structure............................................................................................................. 242
vii
Introduction
1 Introduction
1.1. D-Link D-View 8 Network Management Software
D-View 8 is a comprehensive
management tool for both Ethernet
and wireless Ethernet based on the
server and probe architecture,
supporting troubleshooting,
configuration, performance, and
security of your network. It provides
end-to-end operational management of
IT structure, scalabilityof the system
architecture, and accommodation of
new technology that complements the
management of D-Link and third-party
devices.
Centralized Reporting Highly Flexible and Rich Resource Management Inventory Management
Scalable Deployment
1
Introduction
D-View 8 Features
Real-time network analysis provides insight into network
operation. With instant visibility, you can obtain information on
device statistics, such as critical alarm events, memory
Real-Time Network Analytics
utilization statistics and analysis, response time statistics and
analysis, and CPU utilization statistics as well as bandwidth
utilization.
2
Introduction
NOTE: For the purposes of this manual, the D-View 8 application is referred to as the application. The device on
which the application is installed is referred to as the D-View 8 server.
NOTE: For further information about the latest D-View 8 release, see the D-View 8 application information on the
D-View 8 website (https://dview.dlink.com/).
NOTE: For the latest software updates with new features and bug fixes, visit the D-View 8 website
(https://dview.dlink.com/). Some devices require regular downloads and update of new software and can do
so only through manual update.
3
Introduction
1.3. D-View 8 Licenses
License Types
Target Customer: SMB
1. Nodes: < 5000 (applicable to D-View 8 Version 2.0.0 and
later)
2. D-View 8 server and probe:
• Single server, no support for redundancy.
• Single probe
3. Supports local probe only
DV-800MS-Y1-LIC
DV-800MS-Y2-LIC
Standard
Maintenance DV-800MS-Y3-LIC
(DV-800MS) DV-800MS-Y4-LIC
DV-800MS-Y5-LIC
(Y1=365 days, Y2=730 days, Y3=1095 days, Y4=1460 days,
Y5=1825 days)
4
Introduction
DV-800ME-Y1-LIC
Enterprise DV-800ME-Y2-LIC
Maintenance DV-800ME-Y3-LIC
DV-800ME-Y4-LIC
(DV-800ME)
DV-800ME-Y5-LIC
(Y1=365 days, Y2=730 days, Y3=1095 days, Y4=1460 days,
Y5=1825 days)
Notes:
1. Licensing only allows the upgrade from Standard to Enterprise but not the other
way around.
2. When the maintenance license expires (free for the 1st year of product purchase),
D-View 8 will be limited to 30 nodes without an annual maintenance license;
functions such as Device View, Topology Map, Firmware Management, and
Configuration Management will be restricted to only 30 nodes with full functionality.
Refer to 14.3 Licenses for more information.
3. If you have remote probes in D-View 7, it is strongly recommended that you
upgrade the system to D-View 8 Enterprise so that remote probes can be
upgraded and maintained.
Download the D-View 8 application and test it free for a total of 90 days no matter the version of edition of the
application. The current version of the application is available for download at https://dview.dlink.com/. After the
trial period, you will be prompted to enter your activation information. Refer to 2 Installation for activation
options and procedure.
5
Introduction
6
Introduction
The D-View 8 application manages both D-Link and third-party devices on the network.
Area 1
Area 1
The D-View 8 application is accessed through a web browser. If the IP address cannot be accessed locally,
access to the specific network must first be configured.
7
Introduction
device Xm
browser
8
Installation
2 Installation
The D-View 8 software supports installation on a Linux or Windows operating system. The following section
provides guidance for the installation of the software on both platforms.
To begin the installation process, download the D-View 8 setup application from the D-View 8 website
(https://dview.dlink.com/). It provides setup assistance with wizard to guide you through the installation process.
2.1. Requirements
See the following for further information, “1.5. D-View 8 Server System Requirements”.
3. The License Agreement page displays. Review the terms and click I Agree to continue. Otherwise, click
Back or Cancel to restart the process.
9
Installation
4. The Port Configuration page displays. In the MongoDB Type field, click the drop-down menu and select
Standalone.
5. In the Server IP field, select the local lP address.
6. Click Check to test the service port availability. The green Check Pass! displays to indicate correct
configuration.
7. Click Next to continue.
D-View 8 requires a database such as MongoDB. You can select to install a new database or use an existing
one as explained in the following options.
To access the database, a username and password must be assigned. In the MongoDB Port field,
enter the designated port to access the database.
c. Enter the username and password for database authentication.
d. Click Next to continue the process.
10
Installation
b. Click Next to continue.
If the connection fails, check the settings and enter the related information again.
g. Click Next to continue the process.
Once the installation process is completed, the Setup Wizard page displays.
10. Select Launch D-View 8 and click Finish to open the application interface using the default browser.
11
Installation
If this is the first time that you open the application, more login details will be presented. You can opt to enter an
activation code or use a trial account.
11. In the username and password fields, enter the following default values: admin (username), admin
(password).
The Add License page displays. From this screen, you can set a preferred language (default: English).
For Activation, select a license type to activate, or click Start Trial to activate a trial license.
• Online Activation: enter the license key as provided to activate the application software. The server
must be connected to the Internet for this function to authorize a license.
• Offline Activation: locate the activation file as provided to activate the application software. The function
is available when the server is not connected to the Internet.
• Start Trial: try the application for 90 days. You can download the trial from the D-View 8 website
(https://dview.dlink.com/.)
12. Click Next to continue.
12
Installation
The D-View 8 Wizard page displays. The available configuration options are based on the account privilege:
• D-View 7 Upgrade: Migrate the D-View 7 database and probes to the current application.
• Discovery: Discover available networks and connected devices.
• Monitoring: Create topologies, rack simulations, and dashboard to help monitor the network.
• Alarm: Configure notifications and alarms.
13
Installation
The following shows the structure of D-View 8 application and MongoDB. The structure includes a primary,
secondary, and an arbiter database. The application connects to both the primary and secondary database.
A primary database may be reassigned as the secondary while the secondary may also become the primary.
By default, clients read from the primary database, but a read preference can be configured to allow read
operations on the secondary database.
14
Installation
Building a Cluster
Clusters help support data redundancy and load balancing. Building clusters is outlined in this section.
First, Install MongoDB on 3 Windows servers with the designated roles to support the above mentioned
structure.
Deploy D-View 8 on additional servers and connect the D-View 8 application to the MongoDB cluster.
15
Installation
NOTE: You may opt to install D-View 8 on the primary and secondary database in lieu of additional servers. The
following diagram depicts this three-server deployment topology:
To manage additional devices through Windows servers, you need to add probes in these servers to enable the
connection to the D-View 8 servers with load-balancing managed by NLB.
NOTE: The following example demonstrates the deployment of three-server topology; for deployment example of
five-server topology, refer to Appendix A: Deployment with Five-server Topology.
16
Installation
Preparation for Three-server Deployment
When planning for server cluster deployment, you must first set up 3 Windows servers with the following system
configuration:
⚫ SERVER A
MongoDB
IP Address: 192.168.1.203
⚫ SERVER B
MongoDB
IP Address: 192.168.1.201
⚫ SERVER C
MongoDB
IP Address: 192.168.1.202
17
Installation
5. Click Check to test the setting. If it is configured correctly, a Check Pass! notification displays. If the test fails,
verify the port setting and try again.
6. Click Next to continue and the installation should start.
D-View 8 Installation
D-View 8 can be deployed in three-server or five-server topology as illustrated above.
Use the following procedure to install D-View 8 on multiple servers (e.g. server B & C) and connect them to
the MongoDB cluster.
Installation on server B:
1. Download the D-View 8 Installation package (e.g. D-View 8_1.0.0.70_Installation.exe) from the D-View 8 website.
2. Install the package.
3. In the Port Configuration page, select Replication in the MongoDB Type menu.
4. In the Server IP field, enter the host server’s IP address. As for our example, 192.168.1.201.
5. For port settings, enter the port number required for web access, core communication, and probe
communication: 17300, 17500, and 17600.
18
Installation
6. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
8. The MongoDB Database Configuration page displays. Enter the IP address and port number for the primary,
secondary and arbiter database.
9. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
11. Once the installation completes, click Finish to close the Setup Wizard.
12. The D-View 8 Server can be accessed using a web browser on the server.
19
Installation
Installation on server C:
1. Download the D-View 8 Installation package (e.g. D-View 8_1.0.0.70_Installation.exe).
2. Install the package.
3. In the Port Configuration page, select Replication in the MongoDB Type menu.
4. In the Server IP field, enter the host server’s IP address. As for our example, 192.168.1.202.
5. For port settings, enter the port number required for web access, core communication, and probe
communication: 17300, 17500, and 17600.
6. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
8. The MongoDB Database Configuration page displays. Enter the IP address and port number for the primary,
secondary and arbiter database.
20
Installation
9. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
11. Once the installation completes, click Finish to close the Setup Wizard.
12. The D-View 8 Server can be accessed using a web browser on the server.
Server load balancing is supported on D-View 8. At least two Windows servers on the same subnet will be
required to configure load balancing. For our deployment demonstration of three-server topology, use the
following procedure to set up NLB on D-View 8 servers.
21
Installation
2. Start Network Load Balancing Manager on both servers. Then use the following procedure to configure them
individually.
Configuration on server B
1. In NLB Manager, click Cluster > New to create a new cluster.
2. In the Host field, enter the IP address of server B: 192.168.1.201 and click the Connect button.
3. Click Next to continue. The New Cluster: Host Parameters page displays.
22
Installation
4. Click Next to continue. The New Cluster: Cluster IP Addresses page displays.
5. Click Add to enter a Virtual IP address and subnet mask that will be used as the cluster IP and netmask. Click
OK to continue.
23
Installation
7. Click Next to continue to configure the port rules. The Port Rules page displays.
8. Select the defined port rule and click Edit. The Add/Edit Port Rule page displays.
9. In the Filtering mode section, Select Multiple host for Filtering mode and None for Affinity. Click OK to
continue.
10. An NLB cluster will be created as shown below.
11. Right click on the cluster node and click Add Host To Cluster.
24
Installation
25
Installation
16. Click Finish to close the screen.
17. Open the Network Load Balancing Manager. Now a cluster containing both server B and C was created.
18. And the D-View 8 can be accessed with the Virtual IP.
Configuration on Server C
You can also manage the NLB cluster on the other server (C) by configuring NLB with the Network Load Balancing
Manager.
26
Installation
3. The NLB cluster will also be shown on the other server node (C) of the cluster.
27
Installation
Local Probe: The Local Probe connects to the D-View 8 Core using the same IP address as the core. It is
installed on the D-View 8 server via the D-View 8 Installation package by default.
Remote Probe: The Remote Probe that connects to the D-View 8 Core has a different IP address. It can be
installed using the Probe Installation Package.
Mode
Probes can operate with or without high-availability and load-balancing features offered by NLB. With high
availability, a remote probe connects to the server cluster via a Virtual IP using port 17500, which is the default
port for communicating with the D-View 8 server. Without high availability, a remote probe connects to the D-
View 8 server directly using its physical IP address.
The D-View 8 probe installation can be accomplished through the setup wizard. Prior to starting the process,
it is recommended that you close all applications to allow for the update of related system files without the
need to reboot the system.
1. Download the D-View 8 Probe Setup package from the D-View 8 website and double-click it to start the
wizard. The Probe Setup page displays.
2. Click Next to continue the installation process.
3. The License Agreement page displays. Review the license terms prior to installation. Click I Agree to
continue the process. Click Back to return to the previous menu or Cancel to stop the process.
28
Installation
6. In the Probe Port field, enter the port with authorized access to allow probe communication.
7. Enter the Core Server IP of the core D-View 8 server along with the port number.
8. Click Check to validate the configuration. A Check Pass! message displays if the IP addresses and
ports are configured correctly.Otherwise, restart the configuration process.
The Probe Setup process is completed and a shortcut is generated on the desktop containing the following
29
Installation
DVIEW8_2.0.0.26.deb
2. In the root menu enter the following command to select the downloaded package:
dpkg -i DVIEW8_2.0.0.26.deb
3. At the prompt enter the local IP address:
NOTE: This IP address is for reference only. Please enter the local IP address
of the server.
The D-View 8 application requires a database service (MongoDB) to function. If this is the first time it is being
installed, a new database instance must be created.
4. At the prompt, enter 1 to select the standalone MongoDB installation type.
Once the installation is initialized, the administrator account for the database must be created. This
will continue the process and initialize the built-in data for the D-View 8 instance.
b. At the username prompt, enter the username for the administrator account:
Username: [admin]
c. At the password prompt, enter the admin password. Enter it again for Confirm Password.
Password: [admin]
The installation process continues to install the web, core, and probe services. Once the process is
completed, the services will be activated.
To use an existing database:
a. At the prompt, enter n to detect any existing database instances:
The system detects that you have MongoDB installed, do you want to use it? [y/n]
c. Enter the IP address and port of the MongoDB instance.
30
Installation
Input the existing mongodb port: 27018
NOTE: The IP address and port information is for reference only. Enter the
information for your database configuration.
Username: root
Password: root
5. Once the instance is created or connected, start the application using a web browser.
6. Open a web browser and enter the IP address of the D-View 8 application in the address bar. In the following
figure the IP address is shown for the created instance.
31
Installation
Cluster Architecture
The following shows the structure of D-View 8 application and MongoDB. The structure includes a primary,
secondary, and an arbiter database. In the foundational architecture, the application connects to both the primary
and secondary databases.
32
Installation
A primary database may become a secondary one, while the secondary may also be designated as the
primary. By default, clients read from the primary, but a read preference can be configured to allow read
operations on the secondary database.
Build a Cluster
Clusters help support data redundancy and load balancing. Building clusters is outlined in this section.
First, Install MongoDB on 3 Linux servers with the designated roles to support the above mentioned structure.
Install D-View 8 on additional servers and connect the D-View 8 application to the MongoDB cluster.
Or you may opt to install D-View 8 on the primary and secondary database servers in lieu of additional servers as
the following diagram depicts:
33
Installation
Note: To support high availability and load balancing, please install the MongoDB servers, D-View 8 servers,
and Keepalived in sequence as instructed. And the Keepalived must be enabled on the D-View 8 servers which
can be a cluster of any number of servers depending on your network environment.
To manage additional devices through Linux servers, you need to add probes in these servers and connect them to
the D-View 8 servers with high-availability clustering managed by Keepalived.
34
Installation
Preparation for Three-server Deployment
When planning for server cluster deployment, you must first set up 3 Linux servers with the following system
configuration:
⚫ SERVER A
MongoDB
IP Address: 10.32.123.130
⚫ SERVER B
MongoDB
IP Address: 10.32.123.131
⚫ SERVER C
MongoDB
IP Address: 10.32.123.132
A D-View 8 server includes 3 components: D-View 8 WebAPI, D-View 8 Core, and D-View 8 Probe. Both D-View-
8 WebAPI and D-View 8 Core support load-balancing. We will only show load-balancing with D-View 8 WebAPI in
our example. D-View 8 servers support load-balancing and failover features via the keepalived package in Linux.
In our example, D-View 8 server B and C will be the load balancer and network traffic will be redirected to server
B and C via a virtual IP. And users should be able to connect to the D-View 8 server with the virtual IP from a web
browser.
Note: MongoDB cluster can still work when either the primary or secondary database is malfunctioned. But when
35
Installation
the arbiter is malfunctioned, MongoDB PSA will fail.
5. Change the current directory to the extracted path. Then execute the init_mongo.sh shell
script: ./init_mongo.sh
6. You will need to import the built-in data by entering y in the following question:
Whether you first start MongoDB, first start will import D-View 8 built-in data. [y/n]
Choose to use cluster MongoDB by starting the instance in replication mode:
Are you going to use Cluster MongoDB and start MongoDB in replication mode. [y/n]
root@dview8:/home/dview8/mongodb-linux-x86_64-4.0.0# ./init_mongo.sh
Whether you first start MongoDB, first start will import D-View 8 built-in data.[y/n]
stop mongodb......
about to fork child process, waiting until server is ready for connections.
...
...
Are you going to use Cluster MongoDB and start MongoDB in replication mode.[y/n]
36
Installation
mongodb is running!
stop mongodb......
parameter was supplied, but its value was ignored; majority read concern cannot
be disabled.
about to fork child process, waiting until server is ready for connections.
root@dview8:/home/dview8/mongodb-linux-x86_64-4.0.0#
The database server is ready for connections and will use TCP port 27018 for communication.
Perform the above installation procedure on server B and C as well.
D-View 8 Installation
Note: You can opt to install D-View 8 on the primary and secondary database (server B &C) to reduce the total
number of servers as illustrated in the above three-server topology. Another option is to install D-View 8 on two
additional servers.
To install D-View 8 on multiple servers and connect them to the MongoDB cluster:
1. Log in as a root user.
2. Download the package from the D-View 8 website:
dpkg -i D-View_8_2.0.0.26_Installation.deb
5. At the prompt enter the physical IP address for the local server:
Input the local IP: x.x.x.x (10.32.123.131 for server B as in our example)
7. At the prompt, enter the physical IP address and port of the primary, secondary, and arbiter database.
Before installation...
37
Installation
.
----
Installing...
-----------------------------------------------------------------------------------------------------------------------------------
WebServer_port is free
CoreServer_port is free
Probe_port is free
Now initial set the local IP for D-View 8 (input format similar to: 192.168.131.25),
Local IP address detected may be as follows, Select correct local IP First, Features such as Config Backup/Restore,
10.32.123.131
172.18.0.1
--------------------
Input the local IP:10.32.123.131 #Input the physical IP addresses for the D-VIEW 8 server
input: 10.32.123.131
D-View 8 requires a database service provided by MongoDB 4.0.18. So if you choose 'Install a new MongoDB 4.0.18',
the installation will try to install MongoDB 4.0.18. If you choose 'Use an existing MongoDB 4.0.18', you can
-------------------------------------------------------------------------------------------------------------------
MongoDB cluster contains Primary node, Secondary node and Arbiter node.
input: 10.32.123.131
input: 27018
input: 10.32.123.132
input: 27018
input: 10.32.123.130
input: 27018
39
Installation
Creating built-in data sFlow_mapping_DSCP.
Installation completed.
(D-View8 will use traceroute, so you can input 'apt-get install traceroute' to support)
root@dview8:/home/dview8#
8. Perform the installation procedure for D-View 8 server C but using a different local IP address. For the
above Step 5, input the physical IP address for server C (10.32.123.132):
After the installation, you can access the application’s dashboard by opening a web browser and entering the
assigned IP address and port number (e.g. https://10.32.123.131:17300/ and https://10.32.123.132:17300
from the above example) in the browser’s address field.
40
Installation
2. Install Keepalived:
root@dview8:~#
Note: The DView-8 server uses ports 17300 and 17500 for D-View 8 WebAPI and D-View 8
Core respectively and the port number will be configured in this file.
etc/keepalived/keepalived.conf
router_id LVS_36 #The router_id is the load-balancing identifier, which should be unique.
41
Installation
}
state MASTER # Specify the instance state in standard use: MASTER or BACKUP, has to be capitalized.
interface eth0 # Specify the network interface for the instance to run on
priority 50 # Specify the instance priority for VRRP MASTER router (lower means higher priority), the main node has the
highest priority than other nodes.
10.32.123.133
virtual_server 10.32.123.133 17300 { #Assign service to use the Virtual IP, the D-View 8 WebAPI uses port 17300
lb_algo rr
persistence_timeout 5
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17300
42
Installation
weight 1 #Assign weight to service node
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17300
virtual_server 10.32.123.133 17500 { #Assign service to use the Virtual IP, the D-View 8 Core uses port 17500
lb_algo rr
persistence_timeout 5
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17500
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17500
43
Installation
}
6. Start the Keepalived service and check its status by entering the following:
root@dview8:~# service keepalived start
root@dview8:~# service keepalived status
Aug 20 11:20:45 dview8 Keepalived_healthcheckers[198651]: Activating healthchecker for service [10.32.123.131]:tcp:17500 for VS
[10>
Aug 20 11:20:45 dview8 Keepalived_healthcheckers[198651]: Activating healthchecker for service [10.32.123.132]:tcp:17500 for VS
[10>
Aug 20 11:20:45 dview8 Keepalived_healthcheckers[198651]: Activating BFD healthchecker
Aug 20 11:20:47 dview8 Keepalived_healthcheckers[198651]: TCP connection to [10.32.123.132]:tcp:17500 success.
Aug 20 11:20:49 dview8 Keepalived_vrrp[198652]: (VI_1) Entering MASTER STATE
Aug 20 11:20:49 dview8 Keepalived_healthcheckers[198651]: TCP connection to [10.32.123.132]:tcp:17300 success.
Aug 20 11:20:50 dview8 Keepalived_healthcheckers[198651]: TCP_CHECK on service [10.32.123.131]:tcp:17300 failed.
Aug 20 11:20:50 dview8 Keepalived_healthcheckers[198651]: Removing service [10.32.123.131]:tcp:17300 to VS
[10.32.123.133]:tcp:17300
Aug 20 11:20:50 dview8 Keepalived_healthcheckers[198651]: TCP_CHECK on service [10.32.123.131]:tcp:17500 failed.
Aug 20 11:20:50 dview8 Keepalived_healthcheckers[198651]: Removing service [10.32.123.131]:tcp:17500 to VS
[10.32.123.133]:tcp:17500
lines 1-21/21 (END)
/etc/keepalived/vip_service.sh
#!/bin/bash
if [ $check_ptah -eq 0 ]
exit 1
fi
44
Installation
SNS_VIP=10.32.123.133 #Enter the Virtual IP address
case "$1" in
start)
;;
stop)
;;
*)
exit 1
esac
exit 0
8. Verify that the Virtual IP service is configured with an extra loopback network interface lo:0
RealServer Start OK
45
Installation
root@dview8:/etc/keepalived# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
inet 10.32.123.133/32 brd 10.32.123.133 scope global lo:0 # The loopback network interface
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
3: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
/lib/systemd/system/keepalived.service
[Unit]
After=network-online.target
Wants=network-online.target
[Service]
Type=simple
EnvironmentFile=-/etc/default/keepalived
ExecStartPre=bash /etc/keepalived/vip_service.sh start # Add this line and the following line
[Install]
WantedBy=multi-user.target
Perform the above installation procedure on the designated VRRP backup server (server C). However, the
/etc/keepalived/keepalived.conf should be modified accordingly as the following example file shows:
/etc/keepalived/keepalived.conf
state BACKUP #Here identify the VRRP backup server, has to be capitalized
interface eth0 # Specify the network interface for the instance to run on
priority 100 # specify the instance priority for the VRRP BACKUP router
47
Installation
auth_pass 1111 #Authentication password
virtual_ipaddress { #Identify a VRRP VIP definition block; it can contain multiple addresses without specifying subnetwork masks, but
it must
10.32.123.133
virtual_server 10.32.123.133 17300 { #Assign the service to use the Virtual IP, the D-View 8 WebAPI uses port 17300
lb_algo rr
persistence_timeout 5
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17300
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17300
48
Installation
}
virtual_server 10.32.123.133 17500 { # Assign the service to use the Virtual IP and port #17500, the D-View 8 Core uses port 17500
lb_algo rr
lb_algo rr
persistence_timeout 5
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17500
TCP_CHECK {
connect_timeout 3
retry 1
delay_before_retry 3
connect_port 17500
Also modify /etc/keepalived/vip_service.sh for the VRRP backup server as shown in the above Step 7 using
the assigned Virtual IP address (e.g. 10.32.123.133 as shown in the above example). Perform Step 8 as for the
49
Installation
master server to verify that the Virtual IP service is configured with an extra loopback network interface lo:0.
And modify keepalived.service so that vip_service.sh can start or stop whenever whenever keepalived starts or
stops as shown in the above Step 9.
The installation package also provides scripts for restarting and stopping database services as well as status
checking:
2.0.0.26
You can now verify the D-View 8 installation by entering the Virtual IP address of the server cluster. The
D-View 8 web interface can be accessed with the port 17300 (https://10.32.123.133:17300). The D-View 8 web
interface should be operational even one D-View 8 sever of the cluster is disconnected.
50
Installation
2.3.3 Probe Package Installation
Probes can be installed on a Linux PC. The Linux distribution we are using for demonstration is Ubuntu 20.04.3
LTS. There are two types of Probes:
Local Probe: The Local Probe connects to the D-View 8 Core using the same IP address as the core. It is
installed on the D-View 8 server via the D-View 8 Installation package by default.
Remote Probe: The Remote Probe that connects to the D-View 8 Core has a different IP address. It can be
installed using the Probe Installation Package.
Mode
Probes can operate with or without high-availability and load-balancing features offered by Keepalived. With
high availability, a remote probe connects to the server cluster via a Virtual IP using port 17500, which is the
default port for communicating with the D-View 8 server. Without high availability, a remote probe connects to
the D-View 8 server directly using its physical IP address.
Installation
Download the D-View 8 Probe Installation package from the D-View 8 website. Its file name should be
D-View_8_Probe_Version_Installation.deb.
Before installation...
post installer......
51
Installation
5. Input the physical IP address of the local server and the core server using the Virtual IP and the port
number of the server cluster. For design without HA, enter the physical IP address of local server and the
core server using the physical IP and the port number instead.
probe_port is free
--------------------
172.18.0.1
10.32.123.134
172.17.134.220
--------------------
Now initial set the local IP for D-View 8 Probe, features such as Config Backup/Restore,Firmware Upgrade will work properly.
please confirm that the input IP is valid:(input format similar to: 192.168.131.25)
input: 10.32.123.134
Now please enter D-View8 Core Server IP and Port. Probe connected Core Server successfully, So Probe could work.
please confirm that the input IP is valid:(input format similar to: 192.168.131.25)
Input the CoreServer IP:10.32.123.133 #Input the Virtual IP and port number of the server cluster for HA or a physical IP address of the
server without HA
input: 10.32.123.133
input: 17500
--------------------
Installation completed.
You can verify the installation of the remote probe by opening a web browser and entering the Virtual IP address
(or the physical IP address if HA is not used) of the server cluster with the port: https://10.32.123.133:17300.
Then go to System > Server Management. On the Probe tab, the remote probe should be listed in the table.
The installation package also provides scripts for restart and stop as well as status checking. You can also modify
IP settings using the config.sh script.
dview8@dview8:~$ cd /usr/local/dview8_probe/
dview8@dview8:/usr/local/dview8_probe$ ls -la
Uninstallation
Uninstallation can be accomplished by removing the probe package dview8probe using the dpkg command with
a parameter.
53
Installation
2.4 Software Upgrade
NOTE: Software upgrade is only supported after D-View 8 version 1.0.1.28.
For D-View 8 version before 1.0.1.28, you can only install the new
version after removing the old one.
2.4.1. On Windows
The D-View 8 application is upgraded from time to time to increase the performance and functionality of the
software. Upgrading the software can be done by downloading a newer version of the full installation package.
54
Installation
5. When the Installation Complete page displays, click Next to continue.
7. To verify the current version of the application, open the application by logging in through a browser,
see 3.2 Launch the D-View 8 Web GUI.
8. In the application interface, navigate to System > About to view the Software Version.
55
Installation
2.4.2. On Linux
The D-View 8 application is upgraded from time to time to enhance the performance and functionality of the
software. Upgrading the software can be done by downloading a newer version of the full installation package.
The following shows how to upgrade the application through an installation package.
1. Log in with the su command to have root access.
2. Download the latest D-View 8 upgrade package from the D-View 8 website.
3. Go to the root directory.
4. Locate the package file and unpack it:
dpkg -i -G D-View_8_2.0.0.26_installation.deb
To continue with the update process, the application service must be stopped.
At the prompt, enter y to stop the service.
The system detects that you have MongoDB installed, do you want to use it? [y/n]
The update process continues and once complete, the application can be opened through a web browser. The
dpkg -s dview8
3. Auto upgrade is supported through the remote probe.
56
Installation
2.5 Uninstallation
2.5.1. Uninstall under Windows
Before the application can be uninstalled, close the application before starting the uninstallation process.
NOTE: The screens and instructions may vary depending on the Windows
operating system.
1. To uninstall, click Windows> Start Menu> Programs > D-Link > D-View 8 and locate the Uninstall shortcut.
2. Click on the D-View 8 program shortcut to start the uninstallation process.
3. Follow the instructions as directed by the uninstallation wizard.
57
Installation
2.6 Software Migration
Migrating your D-View 7 to D-View 8 version requires the completion of the following:
• Migrate the D-View 7 to D-View 8 database
• Upgrade the D-View 7 to D-View 8 probes
NOTE: The system does not support the migration from D-View 7 to D-View 8
2.0 and later versions. You need to upgrade your D-View 7 to D-View 8
Version 1.0.3.39 first.
The entire migration process can be performed through the D-View 8 web interface, see System > D-View 7
Upgrade in thedashboard menu.
Before you start, make sure your anti-virus software is disabled throughout the migration process.
NOTE: The D-View 8 and D-View 7 can be installed on different servers. If you
would like to install D-View 8 on a D-View 7 server, refer to Install D-View 8 on
the Original D-View 7 Server.
58
Installation
1. Open the D-View 7 Service Management Tool.
2. In the Services Management tab, click Stop to stop the following D-View 7 services: Windows IIS, Core
Server, License Agent Server, Probe Server, and Probe File Server. However, do not stop the MongoDB
server.
3. Change the D-View 7 server’s IP address so as to use the current server IP address for the new D-View
8 server. For example, if the IP address is 10.0.0.1, change it to 10.0.0.X, where X is a value other than
1. We use the IP address 10.0.0.3 for demonstration on Windows:
11. In the Wizard, click D-View 7 Upgrade to begin the process. This will migrate the D-View 7 database and
probes to the D-View 8 server.
NOTE: The wizard will start by asking you to enter your organization
name, do not skip this step as subsequent Network Discovery will result
in errors when there is no organization information.
The following settings are required to establish a connection to the D-View 7 MongoDB server:
• In the MongoDB Address field, enter the new IP address and port as previously configured, see previous
steps: IP address: 10.0.0.3/ Port: 27017
• If the D-View 7 MongoDB server was installed using the D-View 7 installation wizard, click the
Authentication drop-down menu and select SCRAM-SHA-1 (Mongo 3.x default). Otherwise, select None.
• In the Username field, enter the registered profile with administration access (admin).
• Enter the corresponding password for the registered admin profile.
• In the Authentication database field, enter admin.
NOTE: If the Connection attempt fails, select None under Authentication and
attempt to establish the connection once again.
12. Click Connect to initiate the connection with the D-View 7 MongoDB server.
60
Installation
13. The Migrate D-View 7 Database pop-up screen displays. Click Start to begin the migration. The wizard
provides step-by-step guidance for the process.
14. Click Next to continue, Previous to return to the previous step, or Skip All to automate the process and
compete it.
NOTE: If interruption occurs during the migration process, restart the process by
clicking System > D-View 7 Upgrade.
Once the process is completed, the D-View 7 local probes will be upgraded and replaced; however, you need to
manually upgrade the remote probes (refer to 2.6.4 Upgrade Remote Probes.) Moreover, the data of the
original D-View 7 MongoDB is retained and imported to the D-View 8 database.
61
Installation
2. In the Services Management tab, click Stop to stop the following D-View 7 services: Windows IIS, Core
Server, License Agent Server, Probe Server, and Probe File Server. However, do not stop the MongoDB
server.
6. Click Check to validate the configuration setup. If a connection can be established, the Check Pass! notification
displays. Otherwise, check the settings and run the validation process.
62
Installation
7. Click Next to continue with the installation process and follow the installation wizard to completely setup
thenew server.
8. Once the installation of the D-View 8 server is complete, log into the application interface. See “3.1 Login and
Basic Configurations.“
9. The D-View 8 Wizard panel will be displayed as shown below after you log in.
10. In the Wizard panel, click D-View 7 Upgrade to begin the process. This will migrate the D-View 7 database
and probes to the D-View 8 server.
The following settings are required to establish a connection to the D-View 7 MongoDB server:
• In the MongoDB Address field, enter the IP address and port of the MongoDB server (the localhost):
IP address: 127.0.0.1
Port: 27017
• If the D-View 7 MongoDB server was installed using the D-View 7 installation wizard, click the
Authentication drop- down menu and select SCRAM-SHA-1 (Mongo 3.x default).
11. Click Connect to initiate the connection with the D-View 7 MongoDB server.
63
Installation
12. The Migrate D-View 7 Database pop-up screen displays. Click Start to begin the migration. The wizard
provides step-by-step guidance for the process.
13. Click Next to continue, Previous to return to the previous step, or Skip All to automate the process and
complete it.
Once the process is completed, the D-View 7 local probes will be upgraded and replaced; however, you need to
manually upgrade the remote probes (refer to 2.6.4 Upgrade Remote Probes.) Moreover, the data of the
original D-View 7 MongoDB is retained and imported to the D-View 8 database.
After the upgrade process is completed with the wizard of the web application, perform manual upgrade for all
remote probes.
1. Check the connection status and the IP addresses of the remote probes: go to System > Server
Management and select the Probe tab. The core server and remote probes information can be
obtained from the probe list. Note that the remote probes are displayed in red color to indicate
disconnection with the core server.
64
Installation
2. Install the probe package on the remote probes by double-clicking on the installation file. A warning
message states that it is necessary that you have upgraded the core server to the intended version
before upgrading your remote probes to this same version.
4. The system automatically detects an older version of probe has been installed. Check Upgrade My D-
View 8 Probe and click Next to continue.
The installation will progress and completes. The remote probe should be upgraded to the desired version.
You can now go back to the probe list and check the connection status of the remote probes (System > Server
Management > Probe.)
65
Overview and Basics
NOTE: The D-View 8 supports multiple concurrent users. Two users can make
changes to the same page at the same time. To avoid management
discrepancy, it is recommended that users coordinate management
activities in advance.
https://localhost:17300.
If connecting from a remote computer, enter the IP address of the D-View 8 server into the address field
of the browser. Before connecting to the D-View 8 server, clear browser cache data. The Sign-in page
appears.
66
Overview and Basics
2. In the account type menu, select the account type of the user:
• Local: user account authenticated on a local system.
• RADIUS: user accounts authenticated by the Remote Authentication Dial-In User Service.
By default, the administrator’s username is admin and the default password is also admin.
67
Overview and Basics
4. Click the Sign In button to continue. The D-View 8 Dashboard displays.
For more information on the Dashboard, refer to 3.3 Overview of the Web Dashboard below.
4. Select the probes. A Primary probe will be required to discover and communicate with devices in the
network.
5. Click + Add Discovery Range. The discovery range can be specified with the following methods: IP, IP
Range, Subnet, or Import CSV File. Refer to 4.1 Network Discovery for more information.
6. Click the SNMP field and select Add SNMP Credential. SNMP is the required protocol for device
management.
Please wait while the system is discovering devices in the defined network.
68
Overview and Basics
4
1 2 3
5 6
7
8 9
10
• Help menus can be opened by clicking to obtain additional information relevant to the displayed page.
• Toolbars give quick access to the functions or pages of corresponding menu options.
• Annunciators offer visual notification of system state or alarms.
69
Overview and Basics
NOTE: Menu and toolbar options vary depending on the user role, license type,
and device type.
System Configuration
Item Description
• Organization
▪ Configures the organization’s name, country, time zone, etc.
▪ Upload the organization logo in PNG or JPG file format (less than 2MB file
size)
• Mail Server Settings
▪ Configures mail server settings
• Forward Trap
▪ Configures the trap receiver to send incoming device trap messages
• Forward Syslog
▪ Configures the system log receiver to send device syslog messages
• REST API
Basic Settings ▪ Generating an API key which will be used by other applications to acquire a
token from D-View 8
▪ Third-party applications can use tokens to acquire needed information from
D-View 8
• Credentials
▪ Configures the SNMP protocol types, community name and related
parameters
▪ Configures Windows WMI (Windows Management Instrumentation) and
SSH/Telnet communication credentials
• sFlow Settings
▪ Configures sFlow parameter mapping for different traffic indicators
• System Preferences
▪ Configures the table display settings and theme of D-View 8
• Users
▪ Lists user information: user’s email address, username, login time,
authentication type, etc.
▪ Add, delete, remove users.
• Role Privileges
▪ Lists the types of user role: Organization/ Site/ Network Administrator
User Management roles.
▪ Lists each role’s privileges.
• AD Server
▪ Configures the Windows Active Directory Server’s information.
• RADIUS Server
▪ Configures the RADIUS Server’s information.
▪ Supports Primary and Secondary RADIUS Server configuration
70
Overview and Basics
Item Description
• Configures the “Recurrent Schedule” and “Time-range Schedule”
• Recurrent Schedule List
▪ Allows users to configure recurrent schedules with customized frequency
Scheduling and duration
• Time-range Schedule List
▪ Allows users to configure a specific range of time of a designated
weekday or weekdays
• Monitors the status of D-View Core Server, Web Server and Probe
Server • Checks the real-time report of server’s status, which includes the utilization of
Management CPU, memory, hard drive, and the network traffic
• D-View 8 features three types of logs: User Operation Log, System Log, and
Device Maintenance Log
• User Operation Log:
▪ Records user operational activity via web interface
D-View 8 Log
• System Log:
▪ Keeps the records of D-View 8’s running status of servers and probes
• Device Maintenance Log:
▪ Keeps configuration activity logs for devices
• Support for the following upgrade functions:
D-View 7 Upgrade • Database Migration
• Remote Probe Upgrade
• The About page keeps the following information:
• D-View 8’s edition: Standard or Enterprise
• Brief description for the purchased edition
• Software version
About Page • The latest update time
• The number of supported and used nodes
• System uptime information
• Product license information and activation link
• Remaining days of the maintenance license and the license activation link
Dashboard
Item Description
• By default, there are six tabs based on the device type in the analysis
page:
▪ Overview
▪ Switch
▪ Wireless
Analysis ▪ Host
▪ sFlow
▪ PoE
• Provides an overview of alarm statistics, online/offline status of the devices,
CPU/memory utilization, performance report, device health, etc.
• The information varies according to device type
71
Overview and Basics
Monitoring
Item Description
• Configures network discovery parameters, which include:
▪ Basic Information: the name of the network and site to discover.
▪ Probe Mode: Choose the primary and secondary probe
▪ Discovery Range: Define the range that may include a single IPv4/v6
Network Discovery address, an IPv4/v6 address range, an IPv4/v6 subnet, or import of a IP
range from a file
▪ Schedule: Define the discovery schedule that may include one-time
discovery or recurrent discovery
• Displays discovery jobs’ running status and related information
72
Overview and Basics
• Collects the sFlow data from devices and generates related statistics reports
• The statistics report information includes:
▪ Report based on the source or destination of packets
sFlow Analyzer ▪ Report based on QoS rules
▪ Report based on layer 4 applications
▪ Report based on protocols
• Report based on conversation of two endpoints
Device Group • Allows users to create device groups to simplify management tasks
73
Overview and Basics
Configuration
Item Description
• Allows simultaneous configuration of multiple devices’ parameters at the same
time
• Two sub-features:
• Quick Configuration: a template for each function to apply the settings to
Batch Configuration
multiple devices
• Advanced Configuration: a profile for a specific type of device. The profile
contains configurations of multiple features. Users can apply the profile to
multiple devices of the same type/model.
• Lists all created tasks to show the execution result with messages indicating a
Task Management success or failure. It includes both Current and Historical Tasks. If a failure occurs,
it will also state the reason of failure.
74
Overview and Basics
Item Description
• Displays all alarm information collected from network devices. The alarms
include:
• Active Alarms
Alarms
▪ Lists all unacknowledged network alarms
• Historical Alarms
▪ Lists all acknowledged network alarms
• Displays the trap and system log receiving from devices. The trap log’s
information contains:
▪ Time received
▪ Device system name
▪ Device IP address
▪ SNMP version
▪ Generic type
▪ Trap description
Trap & Syslog ▪ Original message of the trap
• The syslog information contains:
▪ Time received
▪ System name of device generating the log
▪ Device IP address
▪ Syslog severity levels
▪ Syslog messages
▪ The associated alarm for the syslog
▪ The site and network of the device
75
Overview and Basics
Templates
Item Description
• Add a device to be managed by D-View 8 if it’s not in the managed device
list; a useful tool especially for managing third-party devices
• Allows users to customize device’s information as the following:
▪ Model Name
Device Template ▪ Device Type
▪ Vendor Name
▪ Device’s System OID (SOID)
▪ Panel Template
• Allows advanced monitoring and configuration for different device models.
• Create useful information to manage third-party vendors and devices,
which includes:
• Vendor
▪ Vendor name
▪ Vendor OID
• Device Category
Device Support
▪ Category name
▪ Photo of the category
• Device Type
▪ Type name
▪ Device category
▪ Description
• Includes D-Link default device panel templates and customizable panels
• Customizable panel details:
▪ Panel name
▪ Description
▪ Port type: 10G, 5G, 1G,100M, etc.
Panel Template
• Customizable panel diagrams:
▪ Panel logo (PNG/JPG files less than 2 MB in size)
▪ Panel height and width
• Port numbering scheme
• Port layout design
• Provides different monitoring templates for collection of device information
• Multiple monitor templates can be associated with Device Template to
monitor specified devices.
• Customizable categories to identify specific monitoring data source. The
following properties are available for each category:
▪ Category name
▪ Unit (-,°C,%, bits, bps, ms, pps, rpm)
▪ Protocol (WMI, SNMP/ HTTP(S))
Monitor Template ▪ Line chart (not supported, default/supported)
▪ Build type (system / user)
▪ Description
▪ Operation (User: edit, delete, alarmable item definition; System: view)
• Customizable Monitor Template to monitor and collect defined data source
▪ Template name
▪ Category
▪ Vendor name
▪ Monitoring Interval
76
Overview and Basics
▪ Build type
▪ Description
• Operation (User: edit, download, delete; System: download, view)
• Configuration Template: Provides multiple configuration templates to
configure devices
• Multiple configuration templates can be associated with Device
Template to configure devices.
• Customizable Configuration Category to classify different configuration types
▪ Category name
▪ Configuration type: quick or advanced
▪ Template description
Configuration Template
• Customizable Configuration Template to configure specified devices with
the following properties:
▪ Vendor name
▪ Template description
▪ Selected configuration template for engineering view
▪ Protocols (SSH/Telnet or SNMP)
▪ CLI commands list (if selected)
• Programable graphical objects to customize layout and control elements
77
Overview and Basics
Reports
Item Description
Each report type has distinctive configurable parameters such as data source
and data collection time interval. When reports are generated, they can be
exported immediately, saved to My Report, or upgraded to Scheduled Report .
The following types of reports are available:
• Device Reports
• Device Health
• Trap
• Syslog
General Reports • Device Top N
• Wired Interface Reports
• Wired Traffic
• Wired Throughput Top N
• Wireless Reports
• Wireless Client Count
• Wireless Traffic
• Advanced Reports
• Inventory
Scheduled Reports • Reports can be a one-time report or recurrent report. User can assign data
source device(s) and alarm severity levels to be displayed in the reports.
Tools
Item Description
• Retrieves and displays MIB data in readable format
MIB Browser • Provides a graphical interface to read MIB information
• Compiles device MIB files into D-View 8. The MIB Compiler allows users to
compile standard or proprietary MIBs but does not accept malformed MIBs.
MIB Compiler
The compiled MIB file can then be loaded and managed only in the MIB
browser.
ICMP Ping • Checks device operation status and network performance
SNMP Test • Checks device SNMP capabilities using SNMPv1, SNMPv2c or SNMPv3
• Checks the route and measures transmit delay of packets across the network
Trace Route
• Terminal interface for users to connect with the device
Command Line Inter-
• Terminal interface for users to connect with the device
face (CLI)
• Lets user check differences between two configuration files
File Comparison • Differences are highlighted in colors
78
Overview and Basics
3.3.3. Annunciator
The Annunciator is typically located at the top right of the application webpage to notify users of the system
status. The following are the different types of alarms displayed via the annunciator:
User Menu
Item Description
User Profile Displays information about the current user
• D-View 7 Upgrade: migrate D-View 7 database and probes to D-View 8 (only
available to Super Administrator)
• Discovery: discover the network and add devices to the network
Wizard
• Monitoring: create customized topologies, rack display, and customized
dashboards
• Alarm: customize related network alarms and notifications
Network Discovery
Records Displays the record of the discovered networks
Sign out Sign out the current user from the application
79
Overview and Basics
The workspace is designed for complete visibility and control of the entire network.
80
Overview and Basics
you can also modify your account information such as name and email address as well as automatic sign-out
time.
Select the Mail Server Settings tab. The Mail Server Settings page displays.
81
Overview and Basics
2. In the D-View 8 URL field, enter the URL with the correct port for email verification of user accounts, for
example, https://63.216.155.109:59800.
3. Under Mail Server, enter the following information:
Item Description
SMTP Host Enter the address of the SMTP server.
Port Enter the SMTP port of the outgoing email server.
Sender Email
Enter the sender’s email address.
Address
Sender Enter the sender’s name for the outgoing email
Select the encryption method used by the outgoing mail server (optional):
Security Type None or SSL.
Select the character encoding method which converts the sequence of bytes
Encoding Type into characters:UTF8 or ASCII (optional).
Enter the authentication method for use with the server: Anonymous or
SMTP Authentication.
Authentication If SMTP Authentication is selected, enter the following:
• Username: Enter the authorized username to access the server.
• Password: Enter the password.
Save Click Save to save the Mail Server settings.
4. In the Test Mail Server field, enter a valid email to send a test email to verify the above mail server settings.
82
Overview and Basics
5. Click the ON/OFF button to enable or disable the rule.
6. In Source Devices, click Add to select target devices.The Batch Select Devices page displays.
7. From the Device List, select the device(s) to which the notification rule will be applied.
8. Click OK to accept the device selection and return to the previous menu.
83
Overview and Basics
9. Under Trigger Conditions, click the Condition Type drop-down menu to define a condition that generates
notifications.
Item Description
Condition Type
The availability of monitoring conditions varies depending on the selected device
model.
84
Overview and Basics
Select the level of severity that will activate the notification:
All: all severity levels will activate the notification. Or select one of the following
alarm levels:
Critical: error information indicating failure or malfunction.
Alarm Level Warning: error information that may cause future problems
Info: information-only alarm level
Note that there must be an alarm rule with the corresponding severity level for the
notification to take effect.
10. Under Notification Details, select the method to deliver the notification.
Item Description
Notification Method Configure the respective settings for each of the following notification methos.
Web Scrolling
Select whether to enable the sound: Mute or Enable Voice.
Message
• Click the Current Administrator to automatically select the current admin user.
• Click Add to select another user to receive email notifications.
Email You can select criteria (Email, Username, or Role) to search for a user.
• Click OK to accept. Click Cancel to return to the previous screen.
• In the Command Line, enter a script to automate a task or modify device
properties or status on the source devices (Itself) or devices other than the
source devices (Other Devices) when a notification is generated.
• For Other Devices, select the devices to run the script. To execute a script, you
need to provide credentials to log in to the system remotely.
Execute Script • The Acknowledge Alarm after Script Execution parameter can be used to
terminate the repetitive execution of the script. For each execution of the script,
the alarm will be automatically acknowledged. Enter the total Number of
Repetitions (1-100) and Cycle Time (5-1440) minutes. The automatic script
execution will stop when the maximum number of repetitions has been reached
in the defined cycle time.
11. Under the Notification Suspension Period, click Add to select a pre-defined schedule. Or click Add Schedule
to add a new schedule. The schedule prohibits delivery of notifications at the specified time range of a
designated weekday or weekdays for the effective duration of dates.
12. Click Save to accept the notification rule or Cancel to return to the previous screen. For more detailed
instructions, refer to 7.6 Manage Notifications.
85
Organizations and Networks
• Network Discovery
• Manage Wired and Wireless Devices on a Network
• Manage Device Groups
• SNMP Configuration
• Manage Multiple Networks with Batch Configuration
D-View 8 probes are not limited to D-Link products and will communicate with any network device that sup-
ports standard reporting protocols based on SNMP.
Deploying probes on servers for each network segment helps preserve bandwidth, as data is collected by the
probe before being forwarded to the D-View 8 server to be compiled and analyzed. This reduces network
overhead by reducing the number of open connections and the need to have all the devices communicating
directly with the server. Separating network devices into groups also simplifies management.
Probes are also responsible for executing commands received from the application’s administrator on devices
that are connected to the probe. Examples of this would be scheduling a reboot, managing event logs,or making
changes to device configuration.
With network and device discovery, D-View 8 can discover wired devices and wireless devices such as access
points and switches, no matter D-Link devices or third-party devices supporting standard SNMP MIBs.
Network Discovery allows an administrator to monitor and manage active networks configured with the D-
View 8 server. Each network is displayed in the Architecture pane of the Dashboard. The number of
managed devices is also displayed, along with device statistics, alarm statistics and an overview for all
discovered devices.
NOTE: When a Super Admin logs into the D-View 8 application for the first time
with the default username/password, a wizard will appear, please select
Discovery to be guided through the network discovery process, which
requires you to set up an organization first. Network discovery will result in
errors when there is no organization information.
To add a network:
1. Go to Monitoring > Network Discovery.
2. Click + Add Network.
86
Organizations and Networks
Item Description
Basic Information
Network Name Enter a text string to name the new network.
Click the drop-down menu to select an existing site or click New to name
Site Name
this site.
Discover all Select to enable or disable the function to discover all devices that
pingable respond to the ping command automatically. The default is enabled.
devices
Manage Select to enable or disable the automatic management of all SNMP devices. If
SNMP it is not selected, all detected devices via SNMP will be placed under the
devices and Unmanaged category. The default is enabled.
WMI servers
automatically
Probe Mode
Click the drop-down menu to select the standby probe. The Standby probe is a
Standby
backup probe in case the primary probe fails.
87
Organizations and Networks
Item Description
Discovery Range
Add Discovery Range Click the Add Discovery Range button to define a range for network search.
List of the configured range settings. See “Add a Discovery Range” below for
Discovery Range further information.
Click the SNMP field and select the credential version for discovery: SNMP v3,
SNMP v2c, SNMP v1, or Add SNMP Credential. The available credentials are
SNMP Credentials set via the Basic Settings menu (go to System > Basic Settings and click the
Credentials tab; refer to Set Up Credentials.) If you would like to add a new
SNMP credential, click Add SNMP Credential.
Click the WMI field and select the credential for discovery or click Add WMI
Credential. The available credentials are set via the Basic Settings menu (go
WMI Credentials to System > Basic Settings and click the Credentials tab; refer to Set Up
Credentials.) If you would like to add a new WMI credential, click Add WMI
Credential.
Edit Click the Edit button to modify the discovery range.
Delete Click the Delete button to remove the discovery range.
Schedule Information
• One Time: Select this option to specify a date and time or immediately to
initiate the network discovery.
Schedule Type
• Recurrent: Select this option to specify the frequency and effective time frame to
initiate network discovery. Refer to 14.2 Scheduling for more information.
3. Click + Add Network to add a new netowork. To add a discovery range under an exisiting network, select a
network and click Edit.
88
Organizations and Networks
4. Select Probe Mode and click Add Discovery Range or Edit Discovery Range. The Add Discovery Range
or Edit Discovery Range screen displays.
Item Description
Type Click to select the coverage range: IP, IP Range, Subnet, Import CSV File.
Enter a single IP address as the discovery range. Select either IPv4 or IPv6 IP
IP Protocol protocol.
Enter the starting IP and ending IP addresses to define the range.
IP Range • Use Starting IP to express the start of the discovery range.
• Use Ending IP to express the end of the discovery range.
Enter the subnet address in CIDR notation (e.g. 172.17.2.0/24 for IPv4 addressing or
Subnet 2001:db8:abcd:0012::0/64 for IPv6 addressing) to define the discovery range.
Select IPv4 or IPv6 to specify the IP protocol.
Click Select File to select a pre-configured file.
The following shows how the data should be recorded in the CSV file:
1. The import file extension must be “.csv”.
2. Each line must contain no more than one discovery rule.
3. Use a comma “,” to separate the parameters for each discovery rule:
4. The order of SNMP v2 parameters is: Discover IP, SNMP Version, Read-
Only Community, RW Community.
5. The order of SNMP v3 parameters is: Discover IP, SNMP Version,
Username, Mode, Auth Algorithm, Auth Password, Private Algorithm, Private
Password.
6. Parameters can be set to the following values:
▪ Security Level: authNoPriv, noAuthNoPriv, Auth.
▪ Auth Protocol: MD5, SHA
▪ Privacy Protocol: AES, DES.
Import CSV File 7. The “Discovery IP” can be a single IP, an IP range, or a subnet.
8. Use “Start IP - End IP” to express the IP range. The starting IP expression
cannot be greater than the ending IP expression.
9. Use “IP/subnet mask” to express a subnet.
10. The “Import CSV File” method only supports discovery of SNMP V1/V2/V3
devices. The acceptable “SNMP Version” values are “V1, v1, V2, v2, V3, v3”.
11. The number of IP addresses defined in the CSV file must not exceed 5,000.
12. The file size must not exceed 1 MB.
Sample rules:
192.168.1.10,v2,public,private
192.168.1.15-192.168.1.17,v2,public,private
192.168.2.0/24,v2,public,private
192.168.1.1,V3,user,noAuthNoPriv
192.168.1.1-192.168.1.17,V3,user,AuthNoPriv,SHA,password
192.168.1.0/24,v3,user,authPriv,MD5,password,AES,password
Cancel Click Cancel to return to the previous page.
OK Click OK to add the new range.
89
Organizations and Networks
5. Under the Discovery Range section, select an existing range and click the Credentials field.
6. Click Add SNMP Credential or Add WMI Credential to define a new SNMP or WMI credential or select a
pre-defined credential. Refer to Set Up Credentials in 14.1 Configure Global Settings for more information
about WMI and SNMP credentials.
If Add SNMP Credential is selected, the Add SNMP Credential page displays.
If Add WMI Credential is selected, the Add WMI Credential page displays.
Note the added entry will be listed in the Credentials tab (go to System > Basic Settings).
90
Organizations and Networks
2. Select an existing network profile and click Discover to start detecting devices in the network.
The Discovery Results page displays. The list of discovered devices will be shown.
91
Organizations and Networks
2. You can obtain more information about the network discovery profile by clicking Network Information .
It also provides detailed information about probes.
3. Select a network discovery profile and click Delete to delete the selected network or Edit to modify the
network settings. A confirmation page displays for deletion; click OK to delete the profile or Cancel to
return to the previous menu. To edit a discovered network, fill in the information on the Edit Network page.
For detailed instruction, refer to the above 4.1.1 Add Network for Discovery.
92
Organizations and Networks
Note: When the license expires, the Device View page will alert you to limited function and reduced nodes and
encourage you to renew your annual maintenance. To add maintenance licenses, refer to 14.3 Licenses.
Item Description
All, Managed, Unmanaged, Ignored, and Conflicted.
Managed: Displays all devices managed by the D-View 8 server.
Unmanaged: Displays all unmanaged devices. There are several reasons that a
device is classified as Unmanaged:
Management Type - Not being able to communicate with SNMP or WMI.
- Lack of required system parameters such as SOID.
- Exceeding the number of supported nodes.
Ignored: Devices that are excluded from discovery.
Conflicted: Devices that have an IP address conflict.
Status Online (Green), Offline (Red), Unknown (Grey).
93
Organizations and Networks
System Name A unique name that identifies the device.
IP The IP address of the device.
MAC The MAC address of the device.
Device Type The type of the device, e.g., L2/L3 switch, access point, or workstation.
Model Name The device’s model name.
Site Name The defined network site of the device.
Network The defined network of the device.
Vendor Displays the vendor name of the device.
Discovered Time Displays the latest discovered time of the device.
You can click on a column to sort the list by the column name; click it again to reverse the order. You can also
The drop-down menu at the top of the table allows you to refine the list with device type, for example, wireless AP
or controller.
Item Description
All Displays all detected devices.
Displays all devices managed by the D-View 8 server.
Switch-All: click the drop-down menu to list All, sFlow, or PoE-capable switch
devices.
Managed Wireless-Wireless Controller: click the drop-down menu to list the devices grouped by
Wireless Controller, Access Point, SSID, or Wireless Client.
Host-All: click the drop-down menu to list All, Process, or Software-hosting devices.
Other: click to list devices that do not belong to any of the above device categories.
Toolbar Function
Enter a keyword and select the matching property for search .
Search
Unmanage
Click to classify the selected device as unmanaged under the Managed
category.
Manage
Click to classify the selected device as managed under the Unmanaged
category.
Ignore
Click to classify the selected device as ignored. This device will be excluded
from discovery. You can ignore a device under either Managed or Unmanaged
94
Organizations and Networks
category.
Advanced query
Select the criteria to filter the list.
View List Click to view the list either in a list format or a graphical
representation.
3. To view the details of a device, click the device’s System Name link.
95
Organizations and Networks
Note: The device information also provides other tabs for additional information such as alarms and resource
monitoring. The available information depends on the type of the managed device, for example, a wireless AP will
have the Wireless tab showing the SSIDs and channel as well as authentication information.
The following table describes the information available through the Device Information page.
Item Description
Summary
Displays an overview of the device information. You can click Edit to modify the following:
Device
System Name, System Location, and System Contact.
Information
Click Save to accept the updates or Cancel to continue without saving.
Performance
Displays charts for the device’s CPU and memory usage.
Information
Online
Displays the online status of the equipment in the past 24 hours.
(Availability)
Set the SNMP settings for the device. Refer to Set Up SNMP Credentials in System
Settings.
SNMP Protocol Click Reset to discard any setting updates.
Credentials
Click Test to test the settings to verify if they are correct.
Click Save to accept the settings.
SSH/Telnet Enter security settings for SSH or Telnet connection. Refer to Set Up SNMP Credentials in
Credentials System Settings.
Additional Click Edit Additional Information to include further device details: Purchase Date,
Information Keeper, Warranty Expiration, Service Vendor, Service Contact, and Description.
LACP Working
Provides Link Aggregation Control Protocol (LACP) data if LACP is enabled.
Status
Hardware Provides a tabular view of the operational status of the device’s fan, power supply, and
Health temperature.
Click to display the Port List overview page. The following information categories are
available: Monitor, Comparison, and Alarm Settings. The Monitor and Alarm settings can
be set on a per-port basis. You can enable or disable the monitoring status and configure
alarm settings using the on/off switch. Or you can go to the Alarm & Notification >
Monitor & Alarm Settings and select the Wired Traffic category on the Monitor
Settings tab and the Alarm Settings tab. The Monitor Settings can be used to select
Port the ports to be monitored whereas the Alarm Settings allows you to set alarm rules
based on Rx/Tx traffic, error rate, discard rate and bandwidth utilization. The Admin
Status switch allows you to enable or disable each port.
Note: The connectivity information of the device is only available for managed devices
which can send SNMP data to the D-View server with a unique and identifiable SOID.
Click to view a graphical presentation of the CPU and memory utilization, response time,
etc. The information can be shown by Hour, Day, Week, Month, or Quarter (3 months
retention period).
Monitoring Settings: click to enable/disable a specific measurement to monitor.
The following categories are available: 802.1Q VLAN, BaseInfo, CPU Utilization, Device
Monitor Common Information, DHCP Server Status, HTTP Status, LACP, LLDP, Memory
Utilization, Power Status, Private Port, RMON Status, Response Time, SNTP Status, SSH
Status, STP Status, Temperature, Syslog Status, Telnet Status, Trap Status, Safeguard
Status, Syslog Status, and sFlow Profile. Note that the available monitor categories
depend on the device’s capability. Go to Alarm & Notification > Monitor & Alarm
Settings for monitoring status control and Templates > Monitor Template for available
monitor categories and templates. You can create customized monitoring functions for
96
Organizations and Networks
devices; for detailed instructions, refer to 11.1 Generate Device Template. Once you have
added a customized monitoring function to the device, a Customized Monitor tab will
appear next the default System Monitor tab.
Click to view monitoring information in a topological format: Rack View and System as well
as Customized topology. Click the topology name link or go to Monitoring > Topology
Monitor Views
Map to access the topology map view. (Refer to 8.1 View and Manage Network Topology
for more information.)
Click to view the active or historical (either automatically resolved by automatic script or
manually resolved with admin acknowledgement) alarm events. Click Alarm Settings to
Alarm
turn on or off specific alarm rule listed by monitor category as in Alarm & Notification >
Monitor & Alarm Settings > Alarm Settings and view the Trap and Syslog entries.
Click to view the trap messages and system logs. Go to Alarm & Notification > Trap &
Trap & Syslog Syslog to access the Trap & Syslog page to view all trap events and system logs. (Refer
to 7.2 View Traps and Syslog for more information.)
Click to view and configure device service settings and manage firmware and
configuration files. It also provides links to Task Management in Configuration. Note that
the available configuration categories depend on the device’s supported features. To view
all supported configuration features, click the More Settings tab. Go to Configuration >
Batch Configuration > Quick Configuration and Advanced Configuration to view
Management
available settings for both Quick configuration and Advanced Configuration
categories. You can create customized configuration for devices using configuration
templates; go to Templates > Configuration Template. For detailed instructions, refer to
11.5 Generate Configuration Templates and 11.1 Generate Device Templates. You can
also create tasks to be executed immediately by clicking “+ Create Task” from this menu.
Ping Click Ping at the upper right to display the ICMP ping menu.
Save Click Save to Device at the upper right to save the updated settings to the device.
Click Refresh from Device at the upper right to synchronize the device and panel
Refresh
information.
Reboot Click Reboot at the upper right to reboot the device.
Note: You can view the Monitor and Management features supported for each model managed by D-View
via Device Template (go to Templates > Device Template and search for a specific model to display all
monitor and configuration templates configured for this model). However, some of the system-built
templates that have been employed as system-defaults on managed devices are still undergoing the
verification process and may not work correctly; please visit the D-View website
(https://dview.dlink.com/supportedModel) to obtain the latest list of supported models.
2. Select a device from the list and click its System Name.The Device Information page displays.
97
Organizations and Networks
Item Description
System Name The link redirects to the Device Information page.
Model Name Device model name
IP Device IP address
Network The network of the device
Interface Index The number of the port of the device.
Interface Name The name of the port of the device.
Interface MAC The MAC address of the port.
Connected MAC The MAC address of connected port of the other device.
Connected Interface Name The Interface Name of the connected port of the other device.
VLAN ID The VLAN ID to which the port belongs.
VLAN Name The VLAN name to which the port belongs.
VLAN Type The configured VLAN type of the port.
VLAN Port Status The status of the VLAN port: tagged or untagged.
Update Time The last time that the information synced with the device.
2. Click Export to start the export job. The exported file will be saved in the default download folder of your
browser.
98
Organizations and Networks
4.2.5. View and Export a Connection List
You can view the connected devices from the connection point of view with interface-level details. You can also
export the table to a tabular formatted (.csv) file. The export list only lists the information of managed devices.
Item Description
Status The connection status of the link
Alarm Alarms on either of the connected devices of the link.
The device IP addresses of the two ends of the link. You can click on it
Link Name to obtain more information of the link such as the device performance
information and online status of the ports
Device A The device IP address of one end.
Interface A The connected port of the Device A.
Device B The device IP address of the other end.
Interface B The connected port of the Device B.
RX/TX The transport and receiving data.
Utilization The bandwidth utilization in percentage.
Type The connection type
Last Updated The last time that the information synced with the device.
Detection Source The detection protocol.
2. Click Export to start the export job. The exported file will be saved in the default download folder of your
browser.
99
Organizations and Networks
Item Description
Name Enter a name for the group.
Level Click to select the group level (default: Organization).
Organization: Select an organization to add all discovered devices in the
organization.
Site: Click the Range drop-down menu to select a site to add devices in the
designated site.
Network: Click the Range drop-down menu to select a network to add devices in
the designated network.
Description Enter a short description for easy identification.
100
Organizations and Networks
The Group Information page will be shown at the right side of the window.
The Add Device page displays all the devices discovered under a specific level (Organization, Site, or Network).
Click on a device to select it or enter an IP address or model name to search for a device.
101
Organizations and Networks
• Delete: click to remove the device group.
102
Organizations and Networks
4. From the Resource Tree pane, select the site and network to find the desired devices.
5. From the entries in the Device List, select a device to be included in the selected group. Or enter an IP address or
a model name to find the desired devices.
6. Click Save to include the selected devices and return to the previous page.
103
Organizations and Networks
3. Select a device and click Delete Device to remove it.
4. A confirmation message appears. Click Yes to remove the device from the group or No to cancel the deletion.
104
Organizations and Networks
4.4. SNMP Configuration
Network discovery and the device information is accomplished via Simple Network Management Protocol
(SNMP). It allows D-View 8 application to monitor certain parameters of the devices. In addition, an alarm can
be triggered when certain types of traps are sent from devices.
3. Click Add Credential to add SNMP credentials for devices within the network:
For detailed instructions, refer to Set Up Credentials in 14.1 Configure Global Settings
105
Organizations and Networks
To use this tool:
2. Enter the SNMP Parameters in the left pane to access the device agent. The verified SNMP parameters
can be maintained in the above Credentials list.
4.4.3. MIBs
Management Information Base (MIB) is an organized data that facilitates configuration and query of network
devices. The D-View 8 provides a MIB browser to help extract data polled via SNMP. It supports all 3 versions
of SNMP. MIB objects should be displayed after a successful connection.
2. Select the MIB file from the left pane to obtain information of each object or select the network and enter
the SNMP agent IP address to contact with.
1. Go to Templates > Monitor Template. Create a monitor category defining the source data type. Then
create a monitor template with specific OIDs according to the data type defined in the category.
106
Organizations and Networks
2. Go to Templates > Device Template. Then associate a device model with the configured template.
For detailed instructions, refer to 11.1 Generate Device Template and 11.4 Generate Monitor Template.
2. Select a device to open the Device Information page. Then click the Management tab and enable Trap
Status to set the D-View as the trap server.
3. You can then obtain trap information on the Trap& Syslog tab of the Device Information page or by
going to Alarm & Notification > Trap & Syslog.
To manage traps:
1. Go to Alarm & Notification > Trap & Syslog to view all trap events.
2. You can also define a trap OID by adding an OID description in the Trap & Syslog Editor menu below.
Refer to 7.2 View Traps and Syslog and 7.3 Trap Editor.
1. Go to Alarm & Notification > Monitor & Alarm Settings. Then click the Alarm Settings tab.
Scroll down to the Trap section for traps that are available for triggering an alarm. Then click Add to add an
alarm rule to define a trigger condition with the specified trap OID or binding values for a variable.
To forward traps:
1. Go to System > Basic Settings. Then click the Forward Trap tab.
107
Organizations and Networks
4.5. Manage Multiple Networks with Batch Configuration
The D-View 8 allows for batch configuration of devices across networks using a pre-configured schedule. To
start, a configuration template must be created. There are pre-configured templates and customized
templates. You also have the option of two different configuration types – quick configuration for a single
configuration category or advanced configuration for multiple sets of configuration categories when setting
batch configuration.
It lists two build types of configuration categories: System and User. The User type is created by users
whereas system type is created by system and cannot be modified. It also gives a brief description of each
configuration category.
Enter the required information and click Next to continue. For Configuration Type, the Quick
Configuration category will be available for Quick Configuration whereas the Advanced Configuration
will be available for configuration profiles for Advanced Configuration in Batch Configuration.
In the design window, select the layout first with the following options: one-full column, two columns, three
columns, or four columns. Then select the input controls and text fields to be displayed.
108
Organizations and Networks
To create a configuration template:
1. Select the created category in the left pane, then click Add Template at the top right.
2. Enter a Name for the template, choose the Vendor from the drop-down menu, then enter a description
for the template. Also choose the Protocol and CLI command to process the input values if SSH/Telnet
has been selected as the communication protocol.
3. Modify or add more control or input elements to the design or configure the component settings of the
preset configuration items.
You can choose to edit the template once it is created. Or you can preview the final layout of the template,
delete it or download it as a JSON (JavaScript Object Notation) file.
Once a template has been created, devices associated with this template can utilize its configuration as a
base.
3. Select Configuration at the bottom of the Template Information window. Then select Associate
Configuration Template to choose the desired configuration template to associate with.
For more detailed instructions, refer to 11.1 Generate Device Template and 11.5 Generate Configuration
Template.
2. Select either Quick Configuration or Advanced Configuration tab according to the type of the
configuration template.
1. Enter a name and description for the profile, select the device model in the Device Hierarchy field, then
select configuration categories for the device model in the Configuration Feature List. Note that you can
select multiple categories for a profile.
For Quick Configuration, select a configuration category in the left pane. Then create a task to apply the
configuration changes (see below 4.5.3 Create Tasks for Batch Configuration).
For more detailed instructions, refer to 6.1 Create Configuration and Profiles.
109
Organizations and Networks
Enter the following information:
Task Information
Task Name Enter the name for the task.
Task Description Enter a brief description to identify the task.
Configuration Information
Apply the configuration changes for the task. For custom category, the options
Status/Input
depend on the design of the template and selected protocol.
Target Devices
Click to add the device(s) for configuration. Note that only devices that support
this function can be selected. For custom configuration categories, you need to
Add Devices
associate the configuration template to the device template first (go to
Templates > Device Template).
Schedule Information
• One Time: Select this option to specify a date and time or immediately to
initiate the network discovery.
Schedule Type
• Recurrent: Select this option to specify the frequency and effective time frame
to initiate network discovery. Refer to 14.2 Scheduling for more information.
You can click Task Management to open the Task Management page.
For Advanced Configuration, select a profile in the list, then click Create Task + under Operation.
Click Save to create the new task and return to the previous menu.
You can click Task Management to open the Task Management page. Refer to 6.2.1 Current Tasks for details
about tasks.
For more detailed instructions, refer to Apply a Profile to Devices with Task in 6.1 Create Configuration and
Profiles.
110
Monitoring and Reporting
Note: When the license expires, the Dashboard page will alert you to limited function and reduced nodes and
encourage you to renew your annual maintenance. To add maintenance licenses, refer to 14.3 Licenses.
To view the Overview dashboard, log in to the D-View 8 application. The Overview dashboard will be
displayed.
By default, the overview displays the following widgets. To refresh data, click Refresh at the upper right.
Widget Description
Device Statistics The percentage of managed devices that are online.
Architecture The D-View 8 network architecture diagram.
Device Type Statistics The operating status of different types of managed devices.
Alarm Statistics The distribution of alarm severity for managed devices.
You can click on any number or icon on the charts or graphs to be directed to the configuration page.
111
Monitoring and Reporting
5.2. Switch Dashboard
From the Dashboard, click the Switch tab. The Switch Dashboard displays the following widgets. To refresh
data, click Refresh at the upper right.
Widget Description
Alarm Statistics The distribution of alarm severity for managed switches.
Running Status The online status of managed switches.
Temperature The distribution of managed switches based on the specified temperature range:
Statistics 40, 60, 80, or 90 °C.
Top 10 Wired
Throughput (Rx / The top 10 managed switches that currently send and receive the most traffic.
Tx)
Top 10 Memory
The top 10 managed switches with the highest current memory utilization.
Utilization
Top 10 CPU
The top 10 managed switches with the highest CPU utilization.
Utilization
The top 10 managed switches with the longest response time based on a
Top 10 Response
specified time frame: current, last hour, last 24 hours, last 7 days, last 30 days,
Times
or last 90 days.
Widget Description
Alarm Statistics The distribution of alarm severity for managed switches.
Running Status The online status of wireless devices (AC/AP).
AP Summary The distribution of AP device types.
The top 10 wireless devices that send and receive the most traffic in the
Top 10 Wireless
specified time frame: current, last hour, last 24 hours, last 7 days, last 30 days,
Throughput
or last 90 days.
Top 10 Wireless The top 10 wireless devices with the most error packets in the specified time
Error Packets frame: current, last hour, last 24 hours, last 7 days, last 30 days, or last 90 days.
Clients by 802.11
The distribution of 802.11 protocol types used by the clients.
Protocol
Clients by
Authentication The distribution of client authentication type.
Type
Top 10 Devices by
The top 10 wireless devices that generated the most critical alarms.
Critical Alarms
Top 10 SSIDs by
The top 10 SSIDs with the most clients currently connected.
Current Client
Top 10 Response The top 10 wireless devices with the longest response time in the specified time
Times frame: current, last hour, last 24 hours, last 7 days, last 30 days, or last 90 days.
Top 10 APs by
The top 10 APs with the most clients currently connected.
Current Client
112
Monitoring and Reporting
114
Monitoring and Reporting
Item Description
Name Enter a name for the new dashboard.
Level Click to select the network hierarchy level (default: Organization).
Organization Add all discovered devices within the organization.
Site Click the Range drop-down menu to select the devices within the desired site.
Network Click the Range drop-down menu to select the devices within the desired network.
Description Enter a short description to identify the group.
Slide the option to enable or disable (default) the sharing of the dashboard.
Sharing status After enabling the sharing status, other administrators with authorized role in your
organization will be able to view or edit it.
Save Click Save to create the dashboard.
3. On the dashboard for the specified network level, click + (Add) to add a graphical presentation of network
performance indicator to the dashboard.The Add Graphics page displays.
4. In the Select device step, select device(s) for the source data.
Or you can search devices by one of the following properties: System Name, IP, Model Name, Device Category,
or Network Name. Then click Next to continue.
115
Monitoring and Reporting
5. Click on an indicator to define the statistics. The availability of performance indicators depends on the
supported device functions. Also, the report timing for some statistics depends on the polling interval of the
respective monitoring function. To edit monitoring status or interval, go to Alarm & Notification > Monitor &
Alarm Settings > Monitor Settings. You can also adjust monitoring status or interval by accessing the
device information page (go to Monitoring > Device View and select the System Name link to open the
device information page and click the Monitor tab.)
116
Monitoring and Reporting
117
Monitoring and Reporting
Click Edit at the upper right to modify the dashboard or Delete to delete the dashboard. You can also modify a
widget of the dashboard.
The following example uses CPU Utilization Statistics and Analysis widget:
2. Click on the More Settings button. Available options depend on the widget function.
The widget will be updated. The new dashboard can also be applied to the Home page to replace the default
system dashboard. Click Apply to homepage at the upper right.
118
Monitoring and Reporting
The period for statistics generation is based on the scheduled retention period. To view and export reports:
3. From Reports, click General Reports. The default Device Health Reports page displays.
119
Monitoring and Reporting
You will need to configure the settings if a report does not display any data. Refer to the below section for more
information.
4. Click the Export drop-down menu at the top right and select the type of file format for
download: PDF, Excel, or CSV.The report file is downloaded to the default download
folder of your browser.
120
Monitoring and Reporting
Item Description
Display all information.
Show All
Display available information in a chart format.
Show Chart Only
Display available information in a table format.
Show Table Only
Designate the current report as My Report.
Save to My Reports
Upgrade to Scheduled
Designate the current report as Scheduled Report.
Reports
Re-synchronize the report information.
Refresh
Save the information to a file.
Export
Configure the settings for the current report type.
Report Settings
121
Monitoring and Reporting
122
Monitoring and Reporting
5.10. View Firmware Version
You can view the firmware version for all discovered D-Link devices.
4. Under Firmware File, click Select Firmware File to view available firmware sources.
NOTE: Make sure that you confirm the firmware version and its compatibility with the
device before proceeding. Refer to Configuration > File Management for firmware files
that have been uploaded to the D-View 8 server.
5. On the Other Firmware tab, select the appropriate file and click OK to continue. These firmware files have
been uploaded to the D-View 8 server (refer to Configuration > File Management).
6. Alternatively, select the Associate Firmware tab to view firmware that was uploaded specifically for this device
model or to upload firmware from a local directory, then click Upload Firmware.
123
Monitoring and Reporting
7. The Upload Firmware page appears. The Share slide bar can be used to enable or disable sharing this
firmware file with other networks besides the device’s current network. After selecting the firmware, click
Save to upload the file selection or Cancel to delete the upload.
8. From the Firmware Upgrade page, set the Schedule under Schedule Information:
• Schedule Type: One Time
• Execution Time:
• Immediately: start the firmware updating once the upload file is saved.
• Specify a Date: click the Date drop-down menu to select a date and time.
9. From Reboot Type, click Reboot by D-View 8 to enable a restart of the device through the D-View 8
application. By default, the Reboot by D-View 8 option is disabled. A reboot is generally required for the new
firmware to take effect.
10. Click Save to confirm the new upgrade job. Click Cancel to return to the previous menu.
124
Monitoring and Reporting
To view notifications:
1. Log in to the Dashboard, see “3.2. Launching D-View 8 Web GUI”.
2. On the right side of the toolbar, click the Notification icon .The Notification message page displays.
To clear the list, click . (Note that no historical records will be kept.). Click on a notification entry to open the
Alarm Details page to obtain the alarms pertinent to this notification. You can view the notification rules from the
Notification Center (go to Alarm & Notification > Notification Center).
125
Monitoring and Reporting
5.12. Monitor Multiple Networks
The D-View 8 allows for efficient monitoring of devices across networks with system default and customized
monitor functions. To start, a monitor category and template must be created. There are system and user build
monitor templates. You also have a choice among one of three communication protocols: SNMP, WMI or
HTTP(s).
1. Go to Templates > Monitor Template. Then select the Monitor Category tab.
It lists two build types of templates: System and User. The User type is created by users whereas system type
is created by system and cannot be modified.
1. Go to Templates > Monitor Template. Then select the Monitor Category tab.
Item Description
Category Name Enter a name for configuration.
Units Select the measurement unit for configuration.
Protocol Select the protocol for configuration: SNMP, HTTPs, or WMI.
Enable or disable the line chart function for graphical representation of
the monitoring results. Open the Device Information page (go to
Line Chart Monitoring > Device View and click the System Name link of the
selected device) and select Monitor > Customized Monitor to view
the added monitoring results.
Description Enter a brief description for the category.
Data Source
Click Add to define a name with value type for each data type.
Definition
126
Monitoring and Reporting
1. Go to Templates > Monitor Template and select the Monitor Template tab. Select the desired category
from the Monitor Category pane in the left pane. Then Click + Add Monitor Template at the upper right.
Item Description
Template Name Enter a name for the template.
Monitor Category Select the desired category for configuration.
Vendor Name Select the vendor with the vendor OID from the drop-down menu. Or click
New at the right to add a new vendor. For more information about
vendor, refer to Templates > Device Support.
Monitoring Interval Select the polling interval for monitoring: 60, 300, 600, 1800, and 7200.
The default is 60 seconds.
Description Enter a brief description for this template.
Data Source Click Add to define a name with value type for the specific data object
Definition obtained from the monitored devices. The configuration options depend
on the communication protocol used for device monitoring.
Script Enter a script to process the value of the added data source in Groovy.
Click Save to create the monitor template. Once a template is created, you can associate it to a device model.
It can then be configured for monitoring a device with the preset condition, refer to Templates > Device
Template.
1. Go to Alarm & Notification > Monitor & Alarm Settings. Then Select the Monitor Settings tab.
2. Select the monitor category from the left pane. The devices that have been associated with monitoring
templates in this category will be displayed.
127
Monitoring and Reporting
3. Select the devices for configuration and the Edit Interval and Edit Monitoring Status button will be
activated.
You can also enable or disable a monitor function on a per-device basis; go to the Monitoring > Device View
and select the Device Information page by clicking the System Name link of the selected device. Then click
the Monitor tab to access the Monitoring Settings button (refer to 4.2.2 Modify Device Information).
1. Go to Alarm & Notification > Monitor & Alarm Settings. Then select the Alarm Settings tab.
128
Monitoring and Reporting
Different rules require different configurations. However, the following general settings are presented for all alarm
rule types:
• Set profile information: enter a name and description for the alarm rule.
• Set alarm generation conditions: set the threshold value for different levels of severity of the alarm: Info,
Warning, and Critical.
• Set alarm release conditions: set the threshold value for clearing the alarm.
• Add Inhibition Schedule Settings: select a pre-defined schedule. Or click Add Schedule to add a new
schedule. The schedule prohibits delivery of alarms at the specified time range of a designated
weekday or weekdays for the effective duration of dates.
• Select target devices: add devices for configuration.
• Set Action: execute a designated script. The script can be executed on designated device(s) other than
the device configured as the alarm source or on selected D-View 8 servers. Click the respective Device
Command or Server Command tab. For executing commands on device(s), configure the credentials
and method for logging in to the devices.
129
Configuration and Firmware
Note: When the license expires, the Batch Configuration page will alert you to limited function and reduced
nodes and encourage you to renew your annual maintenance. To add maintenance licenses, refer to 14.3
Licenses.
2. From the Configuration Category, select a category or enter a keyword in the search field to search for a
desired configuration category. The system default configuration categories are explained below:
Task Information
Task Name Enter the name to define the task.
Task Description Enter a brief description to identify the task.
Add Task Click to create the defined task.
Refresh Click to refresh the task.
Configuration Information
Status/Input Apply the configuration changes for the job. For customized category, the
options depend on the design of the template and selected protocol.
Target Devices
Add Click to add the device(s) for configuration. Note that only devices that
support this function can be selected. For customized configuration
categories, you need to associate the configuration template to the device
template first. Refer to Templates > Device Template.
Note: You can select multiple devices across different networks. To confine the configuration to
only devices under the same network for better security, use the below Configuration Profile
method.
Schedule Information
Schedule Type • One Time: Select this option to specify a date and time or immediately to
initiate the network discovery.
• Recurrent: Select this option to specify the frequency and effective time
frame to initiate network discovery. Refer to 14.2 Scheduling for more
information.
You can click Task Management to open the Task Management page or Configuration Template to open the
template page. Refer to 6.2.1 Current Tasks for details about tasks.
131
Configuration and Firmware
Add a Configuration Profile
Configuration profiles are designed to allow multiple configuration categories for rapid network deployment.
Unlike the above quick configuration, it can accommodate categories of the Advanced Configuration type.
Once a profile is defined, you can apply it to multiple devices in a network.
1. Go to Configuration > Batch Configuration.
2. Select the Advanced Configuration tab.
132
Configuration and Firmware
After a configuration profile is created, you can modify or delete it with the options under the Operation column.
Item Description
Edit Modify the configuration profile settings.
Share Copy the profile to configure devices of the same model on other networks.
Create Task Create a task for the profile to perform the configuration on selected
devices according to a set schedule. Refer to the following section for
detailed instructions.
Delete Remove the profile from the list.
133
Configuration and Firmware
Apply a Profile to Devices with Task
1. Go to Configuration > Batch Configuration.
2. Select Advanced Configuration.
3. Select a profile, then click + (Create Task) from the Operation column on the right to apply the profile to devices
by creating a task.
134
Configuration and Firmware
1. Go to Configuration > Task Management. Then select the Current Task tab.
The following table displays the properties of the tasks and the functions that you can perform on them:
Item Description
Task Name Displays the defined name of the task.
Target Devices Displays the number of devices that the task will be applied to.
Schedule Type The configured schedule type: one-time or recurrent.
Created By Displays the name of the task creator.
Displays the featured functions or configuration profile name to be executed with the
Function
task.
Time Created Displays the creation date of the task.
Next Execution
Displays the next scheduled start of the task.
Time
Operation
Edit Configuration Click to edit the defined configuration.
Edit Task Click to modify the task settings.
Restart/Pause
Click to activate/deactivate the task.
Task
Show Task
Click to display the event timeline of the task, listed in chronological order.
Record
Delete Task Click to delete the task. You need to pause the task first for deletion.
135
Configuration and Firmware
Go to Configuration > Task Management. Then select the Historical Task tab.
The following table shows the properties of the tasks and the functions you can perform on them:
Item Description
Displays the results of the task: Partially done, Done, or Failed. Click on the link to
Latest Result
open the result details page.
Task Name Displays the defined name of the task.
Target Devices Displays the number of devices that the task will be applied to.
Schedule Type The configured schedule information
Created By Displays the name of the task creator.
Displays the featured functions or configuration profiles to be executed with the
Function
task.
End Time Displays the finishing time of the task.
Time Created Displays the creation date of the task.
Operation
Edit Configuration Click to edit the corresponding configuration file.
Click to modify the task and reschedule the task to be performed again. It will
Re-execute Task
appear in the above Current Task tab for future execution dates.
Review Task Obtain task details including name and type, target devices and task scheduling.
Show Task Record Click to display the event timeline of the task, listed in chronological order.
Delete Task Click to delete the task.
136
Configuration and Firmware
Note: When the license expires, the Firmware Management page will alert you to limited function and reduced
nodes and encourage you to renew your annual maintenance. To add maintenance licenses, refer to Licenses.
2. In the Resource Tree pane, select the desired device model under the designated site(s) and network(s) for
the upgrade task. Or enter a keyword in the Search field to locate the target network or model name. You can
select the Device Group tab if you have created device groups for selected devices.
3. From the discovered or listed devices, select device(s) for firmware upgrade.
Item Description
Status Displays the online/offline status of the device.
System Name Displays the system name of the device.
IP Displays the IP address of the device.
Firmware Version Displays the device’s firmware version.
Model Name Displays the model name of the device.
Displays the result of the last firmware upgrade or the scheduled firmware
Upgrade Result
upgrade.
Site/Network Displays the site and network where the device resides.
Operation
Click to modify the firmware upgrade task. You may need to stop the
Edit
firmware upgrade task first to edit it.
Stop Click to stop the task.
Reboot Device Click to reboot the device after the firmware upgrade.
137
Configuration and Firmware
5. The Firmware Upgrade page displays.
6. Click Select Firmware File to select a firmware file for the specified devices.
7. The Select Firmware File page displays. Select the Associated Firmware tab to upload firmware from
your local file system. Or select a firmware file stored in the server from the Other Firmware tab.
Item Description
Displays the device(s) selected for the task. You can click Delete to remove the
Selected Device
selected devices.
Schedule Information
Schedule Type Firmware upgrade is a one-time event.
Execution Time Define the execution time, immediately or a specific date and time.
138
Configuration and Firmware
Click to enable or disable (default) device reboot after firmware upgrade. A
Reboot Type
reboot is typically required for the new firmware to take effect.
9. Click Save to create the firmware upgrade task. Click Cancel to return to the previous screen.
The Upgrade Result column will record the results of the firmware upgrade task.
139
Configuration and Firmware
Note: When the license expires, the Configuration Management page will alert you to limited function and
reduced nodes and encourage you to renew your annual maintenance. To add maintenance licenses, refer to
Licenses.
An existing configuration template or an uploaded new one can be used to compare the device’s configuration
settings. If there is any difference between the selected template and the existing configuration settings, an
alarm can be triggered.
3. Enable Restore Configuration to restore the device’s configuration with the specified file when the
140
Configuration and Firmware
device’s current settings show any difference. A configuration file for comparison and restoration must
be selected.
4. For the selected devices, click Upload File in the File field to upload the configuration file for comparison.
5. The Upload File page displays. Click Select File to browse for a configuration file for comparison.
6. Click Set as Baseline if you would like to set this file as the baselined configuration for distinguishability or
tracking between other configuration files.
7. Click Save to define the baseline file. Click Cancel to return to the previous screen. The uploaded files will be
listed in File Management and will be available for configuration restoration.
141
Configuration and Firmware
10. You can also edit or stop a task. Under Operation, click the Edit or Stop on the right.
3. Select a device with a pre-defined baseline file or the most recent backup version and click Restore to
configure the task.
NOTE: Files that will be used for restoration can be selected by clicking the
Select button under the Restore File column. You can also upload
additional configuration files and assign a baseline file on the Select
Restoration File page.
In the Select Restoration File page, you can perform the following on
restoration files:
• Upload file
• Download file
• Set as baseline configuration
• Show file content
3. On the Restore page, under Schedule Information, select the scheduling method to perform the task:
• Schedule Type: Click to define the frequency of the task, a single event or recurring task. For a recurring
task, specify a pre-defined schedule or add a new schedule by specifying the repetition frequency (daily,
weekly, monthly, or discrete dates) and effective duration. Refer to 14.2 Scheduling for more information.
• Execution Time: For a single event, define the execution, immediately or a specific date and time.
4. Click Save to create the restore task. Click Cancel to return to the previous
screen.
5. You can also edit or stop a restore task. Under Operation, click Edit or Stop on the right.
The task is created and the restore task will be recorded in the Restore Result column along with other information such
as system name, IP address, firmware version, and device model as well as device category.
142
Configuration and Firmware
The following section provides descriptions of the functions in File Management and the operations that
you can perform in File Management.
The following table describes the functions in the File Management page.
Item Description
Search Enter a keyword to search for a file name, site, or network.
Delete Select an entry and click Delete to remove it.
File Comparison Select two configuration files to compare. Both files must be text based. You may
also go to Tools > File Comparison to access this function.
Refresh Refresh the table.
Advanced Query Filter by File Name, File Type, Upload Time, Status, Site, Network, Uploaded by, or
Model Name.
Click to add or remove columns from the File Management table.
The following column properties are available: File Name, Baselined, File Type, Site,
Column Selector Fie Size, Status, Description, Model Name, Network, Related Devices, and Upload
Time.
Select All to enable all column options.
Click Apply to confirm the new header selection.
Operation
Edit Click to edit the file listing.
Download Click to export the file to a local system.
Delete Click to remove the listing.
143
Configuration and Firmware
1. Click the Upload File at the top right.
File Information
Select File Click to browse and define a configuration or firmware template.
Click the drop-down menu to select the type of file: Firmware File or Configuration
File Type
File.
Designate the file as a baseline template. This is only available for the
Set as Baseline
configuration file type.
Enable this option to allow the uploaded file to be shared with other networks.
Share
This is only available for the firmware file type.
Description Enter a short description to help identify this file.
Corresponding Device
Site Select a corresponding site.
Caution:
When updating firmware, make sure the firmware is correct for the selected device. Employing the right firmware
to the selected devices is essential for successful upload. The wrong firmware may cause damage to devices.
144
Configuration and Firmware
• Export a firmware file
• Remove a firmware file
3. Click Select File to browse and select the target file for upload.
4. From File Type, select Firmware File for the uploaded file type.
5. Enable the Share option to share the uploaded firmware with other networks.
6. In the Description field, enter a brief description for the file.
7. Click the Site drop-down menu to select a site where the device model belongs to.
8. Click the Network drop-down menu to select a network under the selected site.
9. Click the Model Name drop-down menu to select a model to apply the firmware.
10. Click Save to create a firmware file entry or Cancel to return to the previous menu.
145
Configuration and Firmware
Modify a Firmware File Entry
To modify an existing firmware file entry:
1. Go to Configuration > File Management.
2. From the File Management page, select an existing entry from the list, then click Edit under Operation.
3. The File Information page displays. From this page you can modify the file information.
146
Configuration and Firmware
Export a Firmware File
To export an existing firmware file:
2. From the File Management page, select an existing entry from the list, then click Download.
The file will be downloaded to the default download folder of your browser. A successful download notification
will be displayed once the file is exported to your local system.
A confirmation prompt will be displayed. Click Yes to delete or No to cancel the operation.
147
Configuration and Firmware
148
Configuration and Firmware
3. Click Select File to browse and select the file for upload.
4. From File Type, select Configuration File for the uploaded file type.
5. Click Set as Baseline to set the uploaded configuration as the baseline file for file comparison or default
restore file.
6. In the Description field, enter a brief description for the file.
7. Click the Site drop-down menu to select a site for the devices.
8. Click the Network drop-down menu to select a network under the selected site.
9. Click the Model Name drop-down menu to select a model to apply the configuration.
10. Click the Device drop-down menu to select a device to apply the configuration.
11. Click Save to create a configuration file entry or Cancel to return to the previous menu.
149
Configuration and Firmware
2. From the File Management page, select an existing entry from the list, then click Edit.
3. The File Information page displays. From this page you can modify file information.
150
Configuration and Firmware
4. Click Set as Baseline to designate this file as a baseline to be used as the default configuration for
restoration.
5. Enter a description to identify the entry.
6. Modify the corresponding device information:
• Site
• Network
• Model Name
• Device
7. Click Save to apply the changes or Cancel to return to the previous menu.
2. From the File Management page, select the desired entry from the list, then click Download.
The file is downloaded to the default download folder of your browser. A successful download message will be
displayed once the file is exported to the local system.
151
Configuration and Firmware
Remove a Configuration File
To remove a configuration file:
1. Go to Configuration > File Management.
2. From the File Management page, select the desired entry with the configuration file type, then click Delete
File.
3. A confirmation prompt will be displayed for the deletion. Click Yes to delete or No to cancel the operation.
152
Alarm and Notification
Item Description
Active Alarms Displays a list of the currently active alarm events.
Historical Alarms Displays a list of alarm events already been acknowledged or been stopped.
Critical Indicates a critical (highest) severity level for the alarm (red).
Warning Indicates a warning (middle) severity level for the alarm (yellow).
Info Indicates an informative (lowest) level for the alarm (blue).
Search Enter a keyword to filter the list by System Name, IP, or Latest Message.
Select an alarm event and click Acknowledge to move the alarm entry to Historical
Acknowledge
Alarms. Note that this will not disable the alarm setting.
153
Alarm and Notification
Note: You need to configure the D-View as Trap Server and Syslog Server for the managed devices so that logs
and traps can be collected by the system (go to Monitoring > Device View and select the System Name link of
a device to open its Device Information page. Then click the Management tab to find the Trap and Syslog status
switch.) From the Device Information page, you can also view trap events and syslog messages generated from
the selected device by clicking the Trap & Syslog tab.
You can perform the following operations on the Trap or Syslog list:
Item Description
Search Enter a keyword to filter the Trap or Syslog Editor list.
For SNMP traps, you can modify the value description of a binding variable
with the matching value (refer to the below Trap Editor section). For Syslog,
Edit
you can modify the syslog description that describes a corresponding
syslog keyword (refer to the below Syslog Editor section).
Advanced Query Select the criteria to filter the events or logs.
Refresh Click to refresh the table listing.
For Traps, click Edit to modify the OID description and binding variables.
Edit
For Syslog, click Edit to modify the Syslog Description.
Delete Click Delete to delete a Syslog or OID Description.
The translated message is based on the message from the original trap events. You can modify the translation
between a trap OID and OID description as well as the translation between binding variable value and value
description for OIDs with binding variables by clicking Edit under Operation. Note the modification here will
also be saved on the Trap Editor page (go to Alarm & Notification > Trap & Syslog Editor > Trap Editor.)
You can also configure alarm rules based on selected trap event with matched trap OID or binding values. Refer
to 7.5 Monitor and Alarms for more information.
154
Alarm and Notification
The syslog contains the following severity levels from the highest to the lowest.
Severity Description
Emergency Indicates that the device is failing to operate normally.
Alert Indicates that immediate investigation is needed.
Critical Indicates that the device is in critical condition.
Error Indicates that an error has been found on the device.
Warning Indicates a warning condition of the device’s operation.
Notice Indicates a normal but significant condition that needs an operator’s attention.
Indicates a specific condition that is not erroneous but needs to be recorded for
Informational
reference or troubleshooting purposes.
Debug Indicates messages for debugging purposes.
You can easily spot a particular log message when interpreting syslog reports by setting a syslog description
with associated syslog keywords. Refer to the below 12 Reports and 7.4 Syslog Editor for more information.
155
Alarm and Notification
To add a trap or binding variable OID, click Add OID Description. Then enter an OID with a description for both
types of OID. For binding variable OIDs, enter variable values with matching descriptions. The entry determines
how a trap should be interpreted.
To edit an entry, select it and click Edit . The translated message in the Trap list should reflect the
changes. You can generate trap reports using the provided report template and the OID description will be the
highlighted text to signify trap events. Refer to 12.2.1 Add a Report for more information.
156
Alarm and Notification
7.4. Syslog Editor
The syslog is used to log device data. It allows you to analyze and help troubleshoot problems in time.
Furthermore, you can add a syslog description to help you visualize particular log messages. To generate a
Syslog report with the effect provided by Syslog Editor, go to Reports > General Reports and select the Syslog
category under Device Reports. (Refer to 12.2 Manage Report Templates for more information.) To view logs of
all managed devices, go to Alarm & Notification >Trap & Syslog > Syslog.
2. Click the Syslog Editor tab. You can perform the following operations on the list of Syslog Description:
Item Description
Enter a keyword to search for a log description entry using syslog description
Search
or syslog keyword.
Add a syslog description representing selected log keywords to be displayed as
Add Syslog
highlight text to signify a condition or operation from log messages. Refer to
Description
12.2.1 Add a Report for more information.
Delete Syslog
Click to delete a syslog description entry.
Description
Refresh Click to refresh the table listing.
Advanced Query Click to start an advanced search job. Enter the criteria to filter the table.
Edit Click Edit to modify a syslog description.
Delete Click to delete a syslog description.
You can also configure alarm rules based on the severity of Syslog. In addition, you can set the system to alert
you that certain types of messages with matching content have been logged. Refer to 7.5 Monitor and Alarms for
more information.
157
Alarm and Notification
7.5. Monitor and Alarms
7.5.1 Alarm Settings
You can manage monitor and alarm settings and configure conditions to trigger alarms. Alarms can be triggered
by CPU or memory utilization and a wide range of system metrics. They can be configured by users or by the
system as the defaults.
The following system-built categories of device status can be configured for an alarm:
Category Item Description
Wired Traffic Alert based on Tx/Tx traffic, error rate, discard rate, and
bandwidth utilization
158
Alarm and Notification
Power Status Alert based on power status
Private Port Alert based on the port details of D-Link switches using the
private MIB.
SIM Traffic Alert based on the upload and download traffic on the SIM
card
Wireless Access Alert based on the number of standalone AP, managed AP,
Points (number) total AP, or rogue AP
From the Alarm Settings menu, you can set rules for different monitor categories or traffic and message types such
as Trap, Syslog, and sFlow.
159
Alarm and Notification
1. Go to Alarm & Notification > Monitor & Alarm Settings. Then select the Alarm Settings tab.
2. From the left pane, select a system-defined monitor category (or a customized monitor category) for
configuration.
3. Click +Add to configure a rule.
Different rules require different configurations that may involve traffic rate or utilization percentage as well as
traffic direction. The following general settings are presented for all alarm rule types:
• Set profile information: enter a name and description for the alarm rule.
• Set alarm generation conditions: set the threshold value for different levels of severity for the alarm:
Info, Warning, and Critical. The parameters for settings the threshold value depend on the monitored
condition types.
• Set alarm release conditions: set the threshold value for clearing the alarm.
• Set target device/source: set the devices and device interfaces (for the Wired Traffic monitoring
condition) to be monitored.
• Set alarm criteria (only applicable to the sFlow alarm category): set criteria (e.g. application, DSCP
value, IP address, or protocol) along with sFlow interfaces and direction to be monitored.
• Add Inhibition Schedule Settings: select a pre-defined schedule or click Add Schedule to add a new
schedule. The Schedule prohibits delivery of alarms at the specified time range of a designated
weekday or weekdays for the effective duration of dates.
• Set Actions (optional): execute a script. The script can be executed on designated device(s) other than
the device configured as the alarm source or on the selected D-View 8 servers. Click Add actions at
the upper right and click the respective Device or Server Command tab. To execute commands on
device(s), configure the credentials and method for logging in to the devices.
Click Next or OK to continue the rule configuration. Then click Save to create the rule and exit the screen.
Note: After an alarm has been configured for the selected devices, you can activate the alarm on a per-device or
per-port basis (for the Wired Traffic monitoring condition) . Go to Monitoring > Device View and click the
160
Alarm and Notification
System Name link to go to the Device Information page. Then select the Port or Alarm tab to access the port
list or alarm settings page. For Port list, you can turn on or off the Alarm Switch for each port. For Alarm settings,
turn on or off a specific alarm type.
Select a device or multiple devices and adjust the monitoring interval by clicking Edit Interval. Depending on the
monitored condition, you may edit monitor status or port numbers if they are applicable.
Select a device or multiple devices, click Batch Select Port and enter the port range (e.g. 1,3-8,10), and click
Apply. Then click Edit Monitoring Status to enable or disable monitoring on the designated ports.
To stop monitoring:
Select a device or multiple devices and adjust the monitoring status by clicking Edit Monitoring Status. Then
click ON or OFF to enable or disable monitoring.
Note: Stopping a monitoring condition will cause the associated alarms to be disabled automatically.
161
Alarm and Notification
The
The Notification Center page displays.
The list contains the following information on rule and display control:
Item Description
Search Enter a keyword to search for a specific notification name.
Click to customize a ringtone to sound when a notification is triggered.
Sound
Different alarm levels can be configure with different built-in ringtones.
Add Notification Rule Click to define a notification rule.
Delete Notification Rule Click to remove the notification rule.
Refresh Click to refresh the table.
Click to configure an advanced search job. Select the criteria to filter the list:
Advanced Query
Name, On/Off status, Trigger Conditions, or Notification Method.
Name The name of the notification rule.
On/OFF Enable or disable the notification.
Devices The number of devices to which the rule applies.
The monitored condition type (i.e. monitor, trap, syslog, or wired traffic) to
Trigger Conditions
trigger a notification.
The method of notification for the rule (i.e. web scrolling message, email, or
Notification Method
execute script).
The number of notification recipients. Click on it to display user profile as the
Receiver
recipient of the notification.
Description A description of the rule.
162
Alarm and Notification
The Notification Management Details page displays.
2. Under Basic Information, enter a name and description to define the rule.
3. Click ON/OFF switch to enable or disable the rule.
4. In Source Devices, click Add to select target devices.The Batch Select Devices page displays.
163
Alarm and Notification
Item Description
Condition Type
The monitor categories vary depending on the selected device model.
• CPU Utilization
• DHCP Server Status
• Device Common Information
• Fan
• HTTP Status
• LACP
• LLDP
• Memory Utilization
• Power Status
• Private Port
Monitor • RMON Status
• Response Time
• SNTP Status
• SSH Status
• STP Status
• Safeguard Status
• Syslog Status
• Telnet Status
• Temperature
• Trap Status
• Authenticated Clients
• Wireless Traffic
• Wireless Error Packets
Select the corresponding severity level to generate a notification for the configured
alarms based on Trap:
• All: all severity level of alarms will generate a notification.
Trap
• Critical: critical level of alarms will generate a notification.
• Warning: warning level of alarms will generate a notification.
• Info: informational level of alarms will generate a notification.
Select the corresponding severity level to generate a notification for configured
alarms based on Syslog:
• All: all severity level of alarms will generate a notification.
Syslog
• Critical: critical level of alarms will generate a notification.
• Warning: warning level of alarms will generate a notification.
• Info: informational level of alarms will generate a notification.
Select the corresponding severity level to generate a notification for configured
alarms based on Wired Traffic:
• All: all severity level of alarms will generate a notification.
• Critical: critical level of alarms will generate a notification.
• Warning: warning level of alarms will generate a notification.
• Info: informational level of alarms will generate a notification.
Wired Traffic
For Wired Traffic, select the ports that will be monitored for notification rules.
Note that the monitored ports must also be the ports configured in the corresponding
alarm rules for the notification to take effect.
Note that there must be an alarm set with the corresponding severity level for the
notification to take effect.
164
Alarm and Notification
7. Under Notification Details, select the Notification Method.
Item Description
Notification Method
Notifications will appear as toast messages when you are logged in to the D-
Web Scrolling
View 8 web application.
Message
Select the Screen Scrolling Setting for the alert: Mute sound or Enable Voice.
Select this option to receive notifications by email. See below steps to add
Email
notification receiving administrators.
In the Command Line, enter the script to execute.
Notes:
1. Lines begin with a '#' will be considered as comments and will not be
considered as commands.
2. Use '%' before and after the word to label it as a variable. Example: %IP%.
3. The variables' value can be set in the 'Device Attribute' table.
4. Each line must contain no more than one CLI command.
5. Avoid endless CLI commands to prevent deadlock operation. Example:
ping 10.0.0.1.
6. Avoid CLI commands that may require special inputs to exit to prevent
deadlock operation. Example: show ports.
Sample script:
config ssh authmode password enable
config ssh server contimeout 120
Execute script enable SSH
Sample script with variables:
config fdb aging_time %TimeoutSeconds%
Sample comments:
# this is a comment
You can choose to execute a script the source devices (Itself) or devices other
than the source devices (Other Devices) when a notification is generated.
To execute a script, config the username and password and protocol to log in
to the selected devices to which the script will apply.
• The Acknowledge Alarm after Script Execution parameter can be used to
terminate the repetitive execution of the script. For each execution of the
script, the alarm will be automatically acknowledged. Enter the total Number
of Repetitions (1-100) and Cycle Time (5-1440) minutes. The automatic
script execution will stop when the maximum number of repetitions has been
reached in the defined cycle time.
8. Under the Notification Receiving Administrator, click Add to specify users who will receive
notifications.
9. The Select User page displays. Select administrators to receive notifications from the list or enter criteria
(email, username, or user role) to search for a user.
10. Click OK to add users to the rule or Cancel to return to the previous page.
11. Under Notification Suspension Period, click Add Schedule to add a new schedule or select a pre-defined
schedule whereby notification rule will be inactive. You can add a schedule for a specified time range of a
designated weekday or weekdays for the effective duration of dates.
12. Click Save to accept the notification rule. Click Cancel to return to the previous screen.
After a notification rule is created, you can edit or delete it with the edit and delete functions under Operation.
165
Network Architecture
8 Network Architecture
You can view network architecture through hierarchical maps. The following topics are covered in this section:
Note: When the license expires, the Topology Map page will alert you to limited function and reduced nodes and
encourage you to renew your annual maintenance. To add maintenance licenses, refer to 14.3 Licenses.
2. Click Select Topology to select the network diagram. The System Topology is built automatically whereas
the Customized Topology is created by users.
Control Bar The following is a description of the control bar icons from left to right.
Zoom in
Zoom out
Focus on central node
166
Network Architecture
Zoom fit
Help menu provides the following operation guidance:
Topological Legend: the state/status, device type, and bandwidth representation
explanation
Help
Link Operation: select a link to edit or delete
Batch Select Nodes: select multiple nodes
3. From the Topology Map, select a device. When selected, the device will be highlighted.
4. Click on a device to display the device’s information page in Link Edit mode ( ).
`
5. The Information page provides the following information:
• Device Information: Name, Status, Network, IP Address, MAC Address, Type of the device, and Model
Name.
• Recent 3 Active Alarms
• Performance: CPU utilization, availability, and memory utilization
• Related Devices: Connected devices’ information
• Related Topology: Other topology from connected devices
• To modify device information, click the Device Name link to open the Device Information page.
6. To view details for a link, click on a link to display the Link Information page in Link Edit mode ( ).
167
Network Architecture
168
Network Architecture
2. Click Create Customized Topology at the upper right. The Create Customized Topology page displays.
3. Select the Topology Level to choose devices from: Organization, Site, or Network.
Automatic (default): select a device and set the number of hops to generate the topology.
5. For manual, select device(s) to be included in the topology architecture. Or you can search for specific
device(s) by entering a keyword in the search field.
169
Network Architecture
6. Click Next to proceed.
7. Click the Hops of central device drop-down menu to define the number of hops or devices (2 to 10) of a
single link from the central device down to add additional devices in the diagram. This is only available if the
Automatic method is selected above.
8. Click Next to continue or click Previous to return to the previous menu.The Topology Information page
displays.
11. In Data source of links, select either Synchronization with system or User-defined to specify whether the
data will be dynamically updated with the system. The user-defined type will not update dynamically with the
system when there is any topological change with the nodes and links in the system.
12. Select the type of layout for the map: Star, Tree, Circular, or Grid.
13. Enable or disable sharing of the topology with other administrators so they may also view or modify it.
14. Enable or disable the Auto button to control the selection mode of the central device for display as the central
device in the topology. ON indicates the system will specify the central device automatically. (The system will
select the device having the greatest number of links as the central device.) If OFF is selected, choose a central
device manually.
15. Select a central device if you disable the above Auto option.
16. Click Save to create the topology map. Click Previous to return to the previous menu.
You can modify the information of a customized topology or delete a customized topology. Click Select Topology at
the upper left, select Customized Topology, select the desired topology, then click Edit or Delete .
170
Rack Groups and Devices
5. The group rack page appears. Click Add Rack to add more racks to the group.The Add Rack page displays.
171
Rack Groups and Devices
9. Click Save to create the rack or click Cancel to return to the previous menu. The Create Rack page displays.
172
Rack Groups and Devices
The Rack Group page also offers controls for different views of the rack display:
173
Rack Groups and Devices
4. To edit the group settings, click Edit in the Group List column.
5. To delete the group, click on the Delete button in the Group List column. A confirmation pop-up displays.
6. Click Yes to confirm.
NOTE: Deleting a rack group will delete all racks in the rack group at the same time.
Likewise, you can modify the racks of a rack group. Refer to the below section.
174
Rack Groups and Devices
View and Modify a Rack
You can modify and delete an existing rack(s) from a group.
1. Go to Monitoring > Rack View to display the Group List page. Select an existing group to view the racks of
the group.
2. At the top right of a rack display, click Edit Rack to modify the rack information.
You can also click Delete to remove the rack from the group. A confirmation pop-up displays.
NOTE: Deleting a rack will delete all devices in the rack at the same time.
175
Rack Groups and Devices
Place a Device on a Rack
You can view and change the location of a device on a rack simply by dragging and dropping it to a new slot on
the rack. To view an existing device:
3. From the rack view, click on a device. The View and Delete icons appear.
5. Mouse over any of the connected (green) ports to view port details.
176
Rack Groups and Devices
6. Click on the IP address to open the device management interface through one of the following
protocols: HTTP, HTTPS, Telnet, or SSH.
7. Click on the System Name to open the device’s information page.
For more information on the Device Information page, refer to 4.2.2 Modify Device Information.
177
sFlow
10 sFlow Monitoring
sFlow is only supported in the Enterprise version. The sFlow monitoring technology is designed for high-speed
switched networks to aid in network usage visibility. The sFlow agent sends data to D-View 8 and it enables
network administrators to monitor and analyze traffic effectively in the following areas:
• Detailed real-time bandwidth usage with respect to applications, protocols, and source and destination
addresses
• Traffic flow for all ports
• Issues and abnormal traffic
• Traffic identified as a potential security threat
• Performance optimization information
• Billing and accounting
The sFlow function provides continuous monitoring as well as network performance reporting.
2. Select a desired device by clicking on the System Name link. The Device Information page displays.
Click the Management tab to view the device’s sFlow settings.
178
sFlow
5. In the sFlow section, click sFlow Analyzer Server Settings. The sFlow Analyzer Server Settings are
displayed in the window.
6. Click +Add Analyzer Server to display the Add Analyzer Server page.
Item Description
Server ID Click the indicator to assign an ID to the entry (1 – 4).
Enter the analyzer name for the device to send the sFlow data to. In general,
Owner this setting points to the D-View 8 probe server.
Enter the collector timeout (1 ~ 2000000) value that will keep the collector
Timeout settings valid. Alternatively, click Infinite to disable the timeout setting.
Address Type Click the drop-down menu to define the IPv4 or IPv6 address type.
Collector
Enter the collector IP address for data collection. In general, this setting points to
IPv4/IPv6
the D-View 8 probe server IP address.
Address
Collector Port Enter the port number of the above collector address (1-65535).
179
sFlow
Max Datagram
Enter the maximum datagram size for the data packet in bytes (300 – 1400).
Size
Cancel Click Cancel to return to the previous menu without saving the settings.
OK Click OK to create the sFlow setting.
7. Click sFlow Flow Sampler Settings to configure the flow packet sampling method.
8. Click +Add Flow Sampler Port. The Add Flow Sampler Port page displays.
Item Description
Enter the port number on the device
Port
designated to send out sFlow data.
Enter an instance number for each
Instance
sampling port.
Click the drop-down menu to select a
Receiver ID pre-configured analyzer server, see
the previous step.
Select either inbound or outbound
Mode
traffic.
Rate (RX/TX) Enter the sampling rate (0-65536).
Enter the maximum number of bytes
(18- 256) to be copied from a
Max Header Size
sampled packet to an sFlow
datagram.
Click Cancel to return to the previous
Cancel
menu without saving the settings.
OK Click OK to create sampler setting.
Note: The settings vary depending on the sFlow
support capabilities.
10. Click sFlow Counter Poller Settings to configure the counter sampling method.
11. Click +Add Counter Poller Port at the upper right. The Add Counter Poller Port page displays.
180
sFlow
Item Description
Port Enter the port number on the device designated to send counter samples
Polling Interval Click to set the interval for counter polling (0~120) for the time interval between
counter poller samples.
Server ID Click the drop-down menu to select a pre-configured analyzer server, see the
previous step.
Cancel Click Cancel to return to the previous menu without saving the settings.
OK Click OK to create the counter poller port setting.
12. Click Apply at the upper right in the sFlow section to accept the new sFlow configuration.
181
sFlow
5. Under the sFlow section, configured analyzer servers are listed. For each configured server, you can
perform the following:
Edit: allows you to modify the existing settings.
Delete: removes the entry from the list.
The sFlow Flow Sampler Settings and Counter Poller Settings can also be configured by clicking the respective
tab.
182
sFlow
10.3. Configure sFlow in Supported Devices
D-View 8 makes it easy for you to configure and manage devices that support sFlow.
2. In the left pane, click the Click Here to Add link to add and configure a device for sFlow.
2. Click the sFlow category and click +Add Template at the upper right. The Template Settings page
displays.
183
sFlow
From the template settings, you can configure a template to include features such as device layout and basic
components such as labels, input fields, buttons, radio buttons, text areas, toggle switches and tables for
configuration input control.
Click Cancel to discard the changes and Save to add the template to the library. You can click Preview to view
the configuration menu layout.
Once the sFlow configuration template is created, you need to associate it to a related device template to con figure
the sFlow parameters (Go to Templates > Device Template). Refer to the below 11.1 Generate Device Template.
184
sFlow
Once configured, the sFlow function will start monitoring and analyzing the network from the collected data using
packet sampling or counter sampling.
The sFlow Analyzer overview displays. Click a tab to view the related sFlow statistics in one of the following
categories:
• Source
• Destination
• QoS
• Application
• Protocol
• Conversation
3. Click the Advanced Query at the top right to set filter conditions to display information limited to a time
range or any of the following conditions:
• Specify the counter sampling interval.
• Select the direction of packet passing a port: Ingress, Egress, or Ingress and Egress.
• Slide the Resolve DNS or Resolve User to enable or disable the option.
• Select the device identifier type: IP or MAC address to be displayed in the report.
• Select the time range for data displayed.
185
sFlow
• Click Search to start the query or Clear to reset the settings.
186
sFlow
2. Select the corresponding tab to display related sFlow data in that category.
3. At the top right, click the Export menu and select from the following file types to export the displayed data.
187
Templates
11 Templates
Templates are designed for quick setup of device monitoring and configuration tasks and to ensure consistent
configuration among devices of the desired model. In addition to monitoring and configuration tasks, they are
also efficient for device provisioning.
1. Go to Templates > Device Template. Then Click Add Device Template in the upper right corner.
Item Description
Model Name Enter the desired model for configuration
Select the device type from the drop-down menu. Or click New at the
Device Type right to add a new device type. For more information about device type,
go to Templates > Device Support.
Select the vendor with the vendor OID from the drop-down menu. Or click
Vendor Name New at the right to add a new vendor. For more information about
vendor, go to Templates > Device Support.
Enter the device’s system OID. You can also click Search at the right to
SOID find the specific device SOID using device IP and other SNMP
connection parameters.
Hardware
Enter the hardware version of the device
Version
Extended
Use this menu to add more properties to the device.
Information
If you would like to associate a panel template, monitor template or configuration template to the device template,
use the following procedure:
Click Associate Panel Template to associate a panel template to the model. You can customize a panel
template to add to the system. For more information about panel template, refer to the below section 11.3
Generate Panel Template.
Click Associate Monitor Template to add a monitor template to the model. You can customize a monitor
category and template to add to the system. For more information about monitor template, refer to the below
section 11.4 Generate Monitor Template. Once a monitoring template is associated with a model, you can control
its monitoring status or edit the polling interval. Refer to the above section 7.5.2 Monitor Settings.
Click the Configuration tab to add a configuration template to the model. You can customize a configuration
category and template to add to the system. For more information about configuration template, refer to the below
section 11.5 Generate Configuration Template. Once a configuration template is associated with a model, it can
then be used for batch configuration. Refer to 6.1.Create Configuration and Profiles and 4.5.2 Batch
Configuration.
Note: some of the system-built templates that have been employed as system-defaults on managed devices are
still undergoing the verification process and may not work correctly; please visit the D-View website
(https://dview.dlink.com/supportedModel) to obtain the latest list of supported models.
188
Templates
11.2 Manage Device Vendor and Device Type
Vendors and device types are key device properties. They are used for many configuration items and search
criteria.
1. Go to Templates > Device Support > Vendor. Then click + Add Vendor in the upper right corner.
1. Go to Templates > Device Support > Device Type. Then click + Add Device Type in the upper right
corner.
You can also modify or delete a vendor or device type after it is created. Select the Edit or Delete button under
the Operation column.
189
Templates
11.3 Generate Panel Templates
Panel templates are used for displaying the front panel which might include the ports and connectors as well as
the vendor logo for easy identification.
1. Go to Templates > Panel Template. Then click Add Template at the top right.
Item Description
Template Name Enter a name for the template.
Description Enter a brief description for the template.
Upload a picture as the logo image for the panel. Note the file must be in
Vendor Logo
JPG or PNG with size less than 2 MB.
Panel Height Select the panel height:1 or 2 U.
Select the width of the panel: full, 2/3 or customized width (an decimal
Panel Width
between 0 and 1)
Port Numbering
Select the rule for numbering the ports: vertical or horizontal.
Rule
Port Starting
Enter the start number for the ports.
Number
Port Start ifIndex Enter the start number for port’s interface index.
To add ports to the panel, select Select Ports from the Draw a box to drop-down menu. Then select the specific
port appearance and drag and drop it on the designated port.
To label a port, click on a port and enter a name for Port Name.
To rearrange the ports, select Group/Ungroup from the Draw a box to drop-down menu. Then circle the ports to
group them together as a unit. Repeat this step to arrange the ports of the front panel.
Click Save to create the port layout for the panel template.
190
Templates
11.4 Generate Monitor Templates
Monitor templates are useful for configuring monitoring functions. You need to add a monitor category first before
creating a monitor template. To add a monitor category:
1. Go to Templates > Monitor Template. Then select the Monitor Category tab.
Item Description
Category Name Enter a name for configuration.
Units Select the unit for configuration.
Protocol Select the protocol for configuration: SNMP, HTTPs, or WMI.
Enable or disable the line chart function which will display the monitoring
results in graphic representation. Open the Device Information page (go
Line Chart to Monitoring > Device View and click the System Name link of a
desired device) and select Monitor > Customized Monitor to view the
added monitoring results.
Description Enter a brief description for the category.
Data Source
Click Add to define a name with value type for each data type.
Definition
1. Go to Templates > Monitor Template and select the Monitor Template tab. Select the desired category
from the Monitor Category pane at the left. Then Click Add Monitor Template in the upper right corner.
Item Description
Template
Enter a name for the template.
Name
Monitor
Select the desired category for configuration.
Category
Select the vendor with the vendor OID from the drop-down menu. Or click
Vendor Name New at the right to add a new vendor. For more information about vendor,
refer to Templates > Device Support.
Monitoring Select the polling interval for monitoring: 60, 300, 600, 1800, and 7200.
Interval The default is 60 seconds.
Description Enter a brief description for this template.
Data Source Click Add to define a name with value type for the specific data object
Definition obtained from the monitored devices.
Enter a script to process the value of the added data source for the
Script
monitor template in Groovy.
Click Save to create the monitor template. Once a template is created, you can associate it to a device model. It
can then be configured for monitoring a device with the preset system metrics, go to Templates > Device
Template and Alarm & Notification > Monitor & Alarm Settings. You can also enable or disable a monitor
function on a per-device basis; go to Monitoring > Device View and select the Device Information page via the
System Name link. Then click the Monitor tab then click the Monitoring Settings button. (Refer to 4.2.2 Modify
Device Information).
191
Templates
11.5 Generate Configuration Templates
Configuration templates are useful for consistent device configuration management. You need to add a
configuration category first before creating a configuration template.
1. Go to Templates > Configuration Template. Then select the Configuration Category tab.
Item Description
Category Name Enter a name for configuration.
Description Enter a brief description to help identify the category.
Select either Quick or Advanced Configuration. The Quick Configuration
type will be displayed as a category for Quick Configuration in Batch
Configuration (go to Configuration > Batch Configuration and select
Configuration
the Quick configuration tab). The Advanced Configuration will only be
Type
available for configuration profiles for Advanced Configuration in
Batch Configuration (go to Configuration > Batch Configuration
and select the Advanced Configuration tab).
4. Click Next to continue. The template design page for the configuration category appears. First, choose the
desired column layout for the template category. Then choose the control/input elements from the Basic
Components pane.
1. Go to Templates > Configuration Template. Then select the Configuration Template tab.
2. Select the desired category from the Configuration Category pane at the left. Then Click Add Template at
the upper right.
Item Description
Name Enter a name for the template.
Configuration
Select the desired category for configuration.
Category
Vendor Select the vendor with the vendor OID from the drop-down menu.
Protocol Select the protocol used for configuration: SSH/Telnet or SNMP.
Description Enter a brief description for this template.
Enter the CLI command to configure the device if using SSH/Telnet.
Observe the following when writing CLI command:
1. Lines begin with a '#' will be considered as comments and will not be
considered as commands.
2. Use '%' before and after the word to label it as a variable, for example,
%IP%.
3. The value of the variables can be set in the 'Name' field in the
CLI Component Settings.
Command
4. Each line must contain no more than one CLI command.
5. Avoid endless CLI commands to prevent deadlock operation. Example:
ping 10.0.0.1.
6. Avoid CLI commands that may require special inputs to interrupt the
operation. Example: show ports.
Sample script:
config ssh authmode password enable
192
Templates
config ssh server contimeout 120
enable SSH
Sample script with variables:
config fdb aging_time %TimeoutSeconds%
Sample comments:
# this is a comment
The template design page at the bottom allows you to configure the
Engineering
component settings of the preset configuration layout and items. You can
View
also add more control or input elements to the design.
Click Save to create the configuration template. Once a template is created, you can associate it to a device model.
It can then be used for configuration changes and settings, go to Configuration > Batch Configuration. For more
information, refer to Add a Configuration Task and 4.5.2 Batch Configuration. You can also adjust the settings of
the configuration on a per-device basis; go to Monitoring > Device View and select the Device Information page
via the System Name link of a desired model. Then click the Management tab then click the More Settings button.
(Refer to 4.2.2 Modify Device Information.)
193
Reports
12 Reports
Reports are available as either built-in templates or customized ones. They can be generated once only or
repeatedly according to a recurrence pattern.
In order to create a scheduled report, an existing report must be present. See the below Add a Report section
for further information.
2. Select a specific category from the reports list: Device Reports, Wired Interface Reports, Wireless Reports,
or Advanced Reports.
194
Reports
NOTE: A maximum of 500 reports per user can be created to maintain optimal system
performance. When the maximum is reached, older reports will be deleted.
For recurrent schedule, select a pre-defined schedule from the Schedule list or click Add Schedule to define a
new schedule by selecting the frequency and effective duration to create reports:
Specific Days: Executes the report task a single time or multiple times for a single day at a specified
date(s)/time(s). Choose times for a day and specify dates.
Daily: Executes the report task at a specified time or different times of the day. Choose daily interval between
executions: 1 to execute the task every day, 2 to execute the task every other day, and so on.
Weekly: Executes the report task at a specified time or different times of a designated weekday or weekdays.
Choose weekly interval between executions: 1 to execute the task on the specified weekday every week, 2 to
execute the job every other week, and so on.
Monthly: Executes the report task at a specified time or different times on designated day or days of the
month. Specify a month or months: Jan to Dec and the days of the month.
5. Click OK to configure the scheduled report or click Cancel to return to the previous menu.
Select Scheduled Reports under the Reports menu to view the added report. If the report is defined as One
Time, it will be listed under the One Time tab. If it is recurrent, click the Recurrent tab to view the report.
If My Reports is selected, the Save to My Reports page displays. For My Reports, enter a name and
description to save it as My Reports.
To view the My Reports listing, select Reports > My Reports.
195
Reports
The following table shows the menu of the default templates along with the types of reports available.
196
Reports
A saved snapshot of the selected report
My Reports Customized Reports
from General Reports.
The following demonstrates how to generate a Syslog report using the provided template:
2. Select devices from the device list. Note that the managed devices must have D-View configured as a Syslog
Server for D-View to collect logs (go to Monitoring > Device View and select the System Name link to open the
Device Information page. Then click the Management tab to find the Trap and Syslog status switch).
3. Configure duration by clicking the drop-down menu to determine the timespan of the report: last hour, last 6/12/24
hours, today, yesterday, last 7 days, this week, last week, last 30 days, this month, last month, or customized. For
customized, select the Start/End date and time.
4. Click Save to display the generated report. Or click Reset to clear setting entered.
5. The buttons next to Syslog Reports control the representation of the report: show chart or table or both
6. The Add Syslog Description button at the top right can be configured to represent a selected syslog message
using descriptive text in the chart along with the number of occurrence and severity level. Hoover over a defined
syslog description to display related information.
7. To add a syslog description, click Add Syslog Description. Enter a description that will be displayed as highlight
text associated with matching keywords of the logs to signify a particular logged event. Then click Save. The new
description entry will also be listed in Alarm & Notification > Trap & Syslog Editor > Syslog Editor.
8. The following shows the display of the syslog report using Syslog Description. Note that the larger the text, the
higher the occurrence of the defined system log.
The Trap report also displays highlight text of OID description to signify trap events. Refer to 7.3 Trap Editor for
more information.
197
Reports
Item Description
Scroll through the list to select devices
or use the Search field to filter the list by
System Name, IP, Model Name, Site or
Select Devices
Network. Up to 15 devices can be
selected for a single report in this
category.
Click to select the type of report data:
CPU Utilization, Memory Utilization,
Content Source
Response Time, Fan Speed, or
Temperature.
Time Interval Select the interval for the data: 15 min,
198
Reports
2 hours, 8 hours, or 1 day
Click the drop-down menu to determine
the timespan of the report: last hour,
last 6/12/24 hours, today, yesterday,
Duration
last 7 days, this week, last week, last
30 days, this month, last month, or
customized.
Set the starting date if customized
Start Time
duration is selected.
Set the ending date if customized
End Time
duration is selected.
Note: The configurable settings vary depending on the
type of report.
5. Click Save to create the report or click Reset to clear setting entered.
You can then view the report data in the default format, chart, or table by using the control buttons .
199
Reports
2. Select a specific category from the reports list: Device Reports, Wired Interface Reports, Wireless Reports,
or Advanced Reports.
3. For demonstration, the Device Health category is selected and the existing report also displays.
4. Click Report Settings at the top right. The Report Setting page displays.
5. To modify the current report, re-configure the settings and click Save.
6. To clear all settings, click Reset. The report and the data will be removed from the General Reports
page.
200
Reports
201
Users and Security Profiles
In addition to limiting the ability of users with function rights, you can also assign privileges that restrict access
to a site or network (refer to 13.3 Add a User Profile)
202
Users and Security Profiles
Historical Task Read and Write Read and Write Read and Write Read and Write
Firmware Read and Write Read and Write Read and Write Read and Write
Management
Configuration Management
Backup Read and Write Read and Write Read and Write Read and Write
Restore Read and Write Read and Write Read and Write Read and Write
File Management Read and Write Read and Write Read and Write Read and Write
Alarm & Notification
Alarm
Active Alarms Read and Write Read and Write Read and Write Read and Write
Historical Alarms Read and Write Read and Write Read and Write Read and Write
Trap & Syslog
Trap Read and Write Read and Write Read and Write Read Only
Syslog Read and Write Read and Write Read and Write Read and Write
Trap Editor Read and Write Read and Write Read and Write Read Only
Syslog Editor Read and Write Read and Write Read and Write Read Only
Monitor & Alarm Settings
Alarm Settings Read and Write Read and Write Read and Write Read and Write
Monitor Settings Read and Write Read and Write Read and Write Read and Write
Notification Center Read and Write Read and Write Not Available Not Available
Templates
Device Template Read and Write Read and Write Not Available Not Available
Device Support
Vendor Read and Write Read and Write Not Available Not Available
Device Category Read and Write Read and Write Not Available Not Available
Device Type Read and Write Read and Write Not Available Not Available
Panel Template Read and Write Read and Write Not Available Not Available
Monitor Template
Monitor Category Read and Write Read and Write Not Available Not Available
Monitor Template Read and Write Read and Write Not Available Not Available
Configuration Template
Configuration Read and Write Read and Write Not Available Not Available
Category
Configuration Read and Write Read and Write Not Available Not Available
Template
Reports
General Reports Read and Write Read and Write Read and Write Read and Write
Schedule Reports Read and Write Read and Write Read and Write Read and Write
My Reports Read and Write Read and Write Read and Write Read and Write
Tools
MIB Browser Read and Write Read and Write Read Only Read Only
MIB Compiler Read and Write Read and Write Not Available Not Available
ICMP Ping Read and Write Read and Write Read and Write Read and Write
SNMP Test Read and Write Read and Write Read and Write Read and Write
Trace Route Read and Write Read and Write Read and Write Read and Write
CLI Read and Write Read and Write Read and Write Read and Write
File Comparison Read and Write Read and Write Read and Write Read and Write
System
Basic Settings
Organization Read and Write Read and Write Not Available Not Available
203
Users and Security Profiles
Mail Server Read and Write Read and Write Not Available Not Available
Settings
Forward Trap Read and Write Read and Write Not Available Not Available
Forward Syslog Read and Write Read and Write Not Available Not Available
REST API Read and Write Read and Write Not Available Not Available
Credentials Read and Write Read and Write Not Available Not Available
sFlow Settings Read and Write Read and Write Not Available Not Available
System Read and Write Read and Write Read and Write Read and Write
Preferences
User Management
Users Read and Write Read and Write Read Only Not Available
Role Privileges Read and Write Read and Write Not Available Not Available
AD Server Read and Write Read and Write Not Available Not Available
RADIUS Server Read and Write Read and Write Not Available Not Available
Scheduling Read and Write Read and Write Read Only Read Only
Server Management
Probe Read and Write Read and Write Not Available Not Available
Core Server Read and Write Read and Write Not Available Not Available
Web Server Read and Write Read and Write Not Available Not Available
D-View 8 Logs
User Operation Read Only Read Only Read Only Read Only
Log
System Log Read Only Read Only Read Only Read Only
Device Read Only Read Only Read Only Read Only
Maintenance Log
D-View 7 Read and Write Not Available Not Available Not Available
Upgrade
About Read and Write Read Only Read Only Read Only
204
Users and Security Profiles
13.2 Authentication
User management and access rights are controlled by user profiles and roles. The system provides three
mechanisms for the control of user authentication and privileges and other related policies:
• Local authentication
• RADIUS authentication
• AD authentication
• Domain name
• Domain controller address
4. Click Save to accept the settings or click Cancel to return to the previous screen.
To delete or modify a specific entry, you can use the Search or Advanced Query function to filter the list.
Then click the Edit or Delete button under Operation.
205
Users and Security Profiles
1. Go to System > User Management to display the User Management page.
Item Description
RADIUS Server Enter the server IP address of the remote RADIUS server.
RADIUS Port Enter port number for RADIUS service.
Enter the authentication and encryption key string to communicate with the
RADIUS Secret
RADIUS server.
206
Users and Security Profiles
Enter the authentication scheme used by the RADIUS server:
• PAP: Password Authentication Protocol.
Protocol • CHAP: Challenge Handshake Authentication Protocol.
• MSCHAP: Microsoft Challenge Handshake Authentication Protocol.
• MSCHAP2: Microsoft Challenge Handshake Authentication Protocol
with added mutual authentication between peers.
Delete Click to remove the entry.
Reset Click to clear all settings on the page.
4. Click Save to accept the new entry.
207
Users and Security Profiles
3. Click the icon to browse and upload a JPG / PNG file to use it for the profile image.
4. Enter the following information:
Item Description
Authentication
Select one of the authentication methods: local, RADIUS or AD server.
type
Email Enter the profile email.
Username Enter the username for the profile.
208
Users and Security Profiles
The password must be at least 6 alphanumeric characters consisiting of both
Password numbers and letters. Symbols are also permitted.
Retype
Enter the same password to authenticate.
Password
Role Select the profile’s security role.
Nickname
Enter a descriptive nickname.
(optional)
Location
Enter the location of the profile.
(optional)
Telephone
Enter the phone number of the profile, optional.
(optional)
Description
Enter a description to identify the profile.
(optional)
For each Role type, select an organization, site, or network that the user can
access with read-only or both read and write access rights. A read-only access
right permits an authorized user to obtain information of the assets under a
Privilege network hierarchy. It does not permit modification of configurations. Note that the
Privilege here controls the access to a network or a site whereas the user roles
group together a set of rights to perform system operations. Refer to 13.1 Profile
Role Types.
5. Click Save to create the profile or click Cancel to return to the previous menu.
Once a profile is created, the system will send a verification email to the specified email address for
account verification.
Once a user account is created, you can perform the following to modify its profile:
• Edit: modify the profile information
• Send Activation Email: send an account invitation email with activation link. (This is only available to the
Super Admin role.)
• Activate: activate this user account
• Reset Password: generate a new password for the profile. The new password will be sent to the profile’s
email.
• Disable: deactivate this user account.
• Delete: remove this user account.
209
System Settings
14 System Settings
You can configure global settings to be used for system-wide management and communication in the following
areas:
• Organization
• Mail Server Settings
• Forward Trap
• Forward Syslog
• REST API
• SNMP/WMI/Telnet Credentials
• sFlow Settings
• System Preferences
Item Description
Organization
Enter the name to define the organization.
Name
Customized Select an image to upload, which must be less than 2 MB in JPEG or PNG
Logo format.
Country/Region Select the location of the organization.
Time Zone Select the time zone corresponding to the specified location.
3. Click Save.
210
System Settings
Set Up Mail Server
Setting up a mail server is required for email notifications. To set up mail server information:
1. Go to System > Basic Settings to display the Organization page.
2. Click the Mail Server Settings tab to display the Mail Server Settings.
Item Description
D-View 8 URL The URL will be used for email verification link.
SMTP Host Enter the SMTP server address.
Port Enter the port number of the SMTP server.
Sender Email
Enter the email address of the sender of the outgoing email.
Address
Sender Enter the sender’s name of the outgoing email.
Security Type Select the security protocol for the domain, None or SSL.
Encoding Type Select the type of transfer encoding (UTF8 or ASCII) for SMTP communication.
Select whether the SMTP server requires authentication. And enter the following
Authentication
information if authentication is used.
4. Click Save.
211
System Settings
Once a mail server is configured, test the settings with the Test Mail Server function.
5. In the email address field, enter an email address to which the test email will be sent.
6. Click Send Test Mail.
7. Check the email account if the test email has been received.
8. If the email was not received, correct the mail server settings accordingly.
3. Click Add Destination Host. Then enter the destination host (IPv4 or IPv6 address) and port to define the
trap destination.
4. Click Save.
2. Click the Forward Syslog tab to display the Forward Syslog page.
212
System Settings
3. Click Add Destination Host. Then enter the destination host (IPv4 or IPv6 address) and port to define the
syslog destination.
4. Click Save.
3. Click Add API Key. Then enter a name to identify the API key.
213
System Settings
Set Up Credentials
Set Up SNMP Credentials
The SNMP credentials manages access to SNMP-compatible devices. Storing the credentials is useful for when
the system is scanning network devices in Network Discovery (go to Monitoring > Network Discovery). Refer
to 4.1 Network Discovery for more information about Network Discovery.
2. Click the Credentials tab and select SNMP Credentials from the left pane.
4. Select the SNMP version of the credential: SNMP v1, SNMP v2c, or SNMP v3. By default, D-View 8 uses
SNMP v2c.
214
System Settings
For SNMPv3:
• Enter a name and port for SNMP.
• Enter the timeout period in seconds (default: 4).
• Enter the number of retries (default: 3)
• Enter the number of objects that can return in a single get-next instance (default: 0).
• Enter the number of Get Next operations to be performed on each variable (default: 10).
• Enter the Context Name (optional), which is used as the identifier for a named subset of the object instances.
• Select the Security Level:
• authPriv: authentication and privacy (default).
• authNoPriv: authentication, no privacy.
• noAuthNoPriv: no authentication, no privacy.
• Select the Auth Protocol if authentication is used:
• MD5 (MD5 message-digest algorithm): produces a 128-bit hash value to authenticate users.
• SHA (Secure Hash Algorithm): produces a 160-bit has value to authenticate users.
• Enter the Authentication Password to be used with the Authentication Protocol.
• Select the Privacy Protocol if privacy is used:
• DES (Data Encryption Standard) or AES (Advanced Encryption Standard) for data encryption.
• Enter the Privacy Password to be used with the Privacy Protocol.
• Enter a description to help identify the profile (optional).
6. Enable or disable Sharing Status to share the credentials with other administrators with authorized role.
7. Click Save.
215
System Settings
Windows Management Instrumentation (WMI) is used in Microsoft Windows systems to help retrieve information
on a remote system and it requires appropriate permissions. Storing the credentials is useful when discovering
network devices in Network Discovery (go to Monitoring > Network Discovery).
Username: Enter the username with the Windows system administrator privilege or a user account with
permissions to access WMI data.
Sharing Status: Select whether other administrators with authorized role in the organization can view or modify
this profile.
Note: This function is not applicable in this release and will be fixed in the future release.
216
System Settings
Protocol: select the communication protocol for remote management: SSH or Telnet.
Username/Password: Enter the username and password that will be required to access the server.
Password Prompt: enter the prompt to be displayed at the command line for entering password.
Command Prompt: Enter the prompt to be displayed at the command line for entering command.
Sharing Status: Select whether other administrators with authorized role in your organization can view or modify
this profile.
217
System Settings
Application Mapping
To add an application to be identified properly from the collected data:
1. Go to System > Basic Settings.
2. Click the sFlow Settings tab to display the sFlow Settings page.
3. Click the Application Mapping tab.
4. Click Add Mapping at the upper right. Then enter the application name and its associated port.
218
System Settings
5. In the Protocol/Port Number field, click the drop-down menu to select TCP or UDP and enter port number
for the protocol.
6. In the IP Address field, select All, IP Address, Subnet, or IP Range to specify the address range in the flow
data.
7. Click Save to create the application mapping rule or Cancel to return to the previous menu.
DSCP Mapping
To view defined DSCP (Differentiated Services Code Point) sFlow mapping used for QoS:
1. Go to System > Basic Settings.
2. Click the sFlow Settings tab to display the sFlow Settings page.
3. Click the DSCP Mapping tab to obtain DSCP names and its mapped values.
219
System Settings
IP Alias Mapping
To add an IP address to be identified with the defined name from the collected data::
1. Go to System > Basic Settings.
2. Click the sFlow Settings tab to display the sFlow Settings page.
3. Click the IP Alias Mapping tab to display the IP Alias Mapping page.
To add a MAC address to be identified with the defined name from the collected data:
220
System Settings
5. Enter Alias and MAC address to define the mapping of an alias and a MAC address.
6. Click Save to create the MAC Address mapping rule or Cancel to return to the previous menu.
3. Click the drop-down menu to select the number of single page display (rows) for all tables in D-View 8: 15
(default), 50, 100, or 200.
4. From the table size selector, set the size for all the tables in D-View 8: Large, Middle (default), or Small.
5. Enable the option: Show tips when the table settings are modified so that users will be notified of table setting
changes via toast messages.
221
System Settings
In Theme Settings, select a defined theme to apply to the interface. You can select a dark or light background or
dark side pane with light background.
To reset to the original settings, click the Reset button. All table and theme settings will be restored to the default.
222
System Settings
14.2 Scheduling
The scheduling function helps automate several functions periodically according to a defined recurrent frequency
in the designated time span.
There are two types of scheduling options: Recurrent and Time-Range. The recurrent schedule is use in network
discovery, tasks, configuration backup and restore, and scheduled reports, whereas the time-range schedule is
used in alarm settings and notification rules.
1. Go to System > Scheduling and select the Recurrent Schedule List tab.
2. Click Add Schedule at the upper right. Then enter the following information:
Item Description
Schedule Information
Schedule Name Enter a name for the schedule.
Core Server Time
Select the time zone. (It can already be set in the Organization tab.)
Zone
Description Enter a brief description for the schedule.
Enable sharing to let other administrators with the authorized role to modify or
Sharing Status
view this schedule.
Schedule Settings
Repeats Select the frequency: Daily, Weekly, Monthly, or Specific Days.
Specific Days: Schedule a single time or multiple times at a specified
date(s)/time(s). Selecting multiple times will enable execution of the same task
at different times for each date.
Daily: Schedule a specified time of the day. Then choose daily interval between
executions: 1 to execute the task every day, 2 to execute the task every other
day, and so on.
Recurs Every
Weekly: Schedule a specified time of a designated weekday or weekdays. Then
choose weekly interval between executions: 1 to execute the task every week, 2
to execute the job every other week, and so on.
Monthly: Schedule a specified time on day(s) of the selected month(s): specify a
month or months: Jan to Dec and the days of the month.
Specific Days: Schedule a specified time and date(s).
Select the time (24-hour clock): hh:mm for the schedule. Selecting multiple times
Time
will enable execution of the same task at different times of the same day.
223
System Settings
Duration Select the start and end dates to designate the effective time span.
1. Go to System > Scheduling and select the Time Range Schedule List tab.
2. Click Add Schedule at the upper right. Then enter the following information:
Item Description
Schedule Information
Schedule Name Enter a name for the schedule.
Core Server Time
Select the time zone. (It can already be set in the Organization tab.)
Zone
Description Enter a brief description for the schedule.
Enable sharing to let other administrators with the authorized role to modify or
Sharing Status
view this schedule.
Range
Weekdays Select all weekdays or a specific weekday(s).
Time (range) Select the start and end time (24-hour clock): hh:mm for the schedule.
Duration Select the start and end dates to designate the effective time span.
224
System Settings
14.3 Licenses
System Licenses can be obtained in the About page.
The system will prompt you to activate your product with a valid license after the 3-month trial period.
1. Click the Activation link next to D-View 8 displayed as the product name on the About page. And you will
be directed to the login page to start the product activation process.
2. The Add License screen appears. Choose one of the following methods:
225
System Settings
- Online Activation: Use a license key to activate D-View 8. The server must be connected to the
Internet. Click Next to continue and follow the on-screen procedure to complete the process. This
method allows you to enter a license key obtained from your sales representative.
- Offline Activation: Use an activation file to activate D-View 8. The server does not have to be
connected to the Internet. This method allows you to upload an activation file generated from an
activation tool.
The offline activation requires the use of an activation tool. Double-click on the executable file to start
the program. Select Standard/Enterprise License from the License Type drop-down list. Enter the
License Key (obtained from your sales representative) and the MAC address of the D-View 8 server
for Bound MAC (the license key associates itself with the server’s hardware), then click Browse to
locate the output directory for the activation file. Click Generate to generate an activation.
Item Description
License State Displays active or inactive status of the product license
License Type The Standard or Enterprise license type.
License Key Click to view the license terms purchased.
The number of days before the license expires. This can be
Maintenance Until
an aggregated number of days of all licenses purchased.
The system will prompt you to buy a new maintenance license after the 1st year of product activation.
226
System Settings
To add a maintenance license:
1. Click Add Maintenance license. And you will be directed to the login page to start the license purchasing
process:
2. The Add Annual License screen appears. Choose one of the following methods:
- Online Activation: Use a license key to reactivate D-View 8 with maintenance service. The server
must be connected to the Internet. Click Next to continue and follow the on-screen procedure to
complete the process. This method allows you to enter a license key obtained from your sales
representative.
- Offline Activation: Use an activation file to reactivate D-View 8 with maintenance service. The server
does not have to be connected to the Internet. Click Download the current activation file to download
the activation file to generate a reactivation file.
The offline reactivation requires the use of an activation tool. Double-click on the executable file to start
the program. Select Annual Maintenance License from the License Type drop-down list. Enter the
License Key obtained from your sales representative and click Browse to locate the current AC file
downloaded from the above step. Then click Generate to generate a new activation file.
227
System Settings
Note: When the maintenance license is about to expire, the system will inform you of the soon-to-expired license
30 days before the expiration date.
You can opt to be reminded again 7 days before the expiration date. The system will notify you at the appropriate
time as shown in the following screen. You can then choose to be reminded again 3 days before the expiration
date.
228
System Settings
When the maintenance license expired, the system will alert you and the following pages of the D-View 8 web
application will display alert messages: Dashboard > Analysis, Monitoring > Device View, Monitoring >
Topology Map, Configuration > Bach Configuration, Configuration> Firmware Management, and
Configuration > Configuration Management.
229
System Settings
14.4 View D-View 8 Logs
The D-View 8 Log page displays different types of logs. The User Operation Log tab displays logs related to
management operations and tasks performed by users. The System Log displays logs related to activities related
to system services and probe agents. The Device Maintenance Log displays logs related to operations performed
by users on the managed devices. Logs can be used to analyze device health and troubleshoot network
connectivity as well as exam network security. Note that the D-View 8 logs are different from the device syslog,
which are logs generated by managed devices (go to Alarm & Notification > Trap & Syslog).
Note: You can only view logs pertaining to the activities under your authorized level of network hierarchy.
To view user operation logs, go to System > D-View 8 Log. Click the User Operation Log tab. The log entries
contain the following information:
Item Description
Log Time The timestamp of the user activity.
Terminal Type The device and interface used to connect with the D-View 8 server.
User Username
Operation Object The object/menu category that the user operated on.
Detail The detailed activity of the operation.
To view system logs, go to System > D-View 8 Log. Click the System Log tab. The log entries contain the
following information:
Item Description
Log Time The timestamp of the system activity.
Log Type A brief description of server activity.
Server The affected server and IP address.
Detail The detailed information of the server activity.
To view device maintenance logs, go to System > D-View 8 Log. Click the Device Maintenance Log tab. The
log entries contain the following information:
Item Description
Log Time The timestamp of the device operation activity.
Result The result of the device operation.
Configuration Type The configuration category of the operation.
Function The detailed information of the configuration.
System Name The system name of the device.
Model Name The model name of the device.
IP The IP address of the device.
User The username of the operator.
Site The network site of the device.
Network The network of the device.
You can filter these logs by time or activity. To create a filter, click Advanced Query at the top right. It allows you
to specify the activity with timestamp of the log, function, configuration type, system name, IP address, username,
etc. After the displayed records are refined according to the desired criteria, you can export it as a csv file.
230
Tools
15 Tools
The D-View 8 has added management effectiveness of your network by offering convenient tools.
These tools help troubleshoot network bottlenecks by providing transmission data and responses from
nodes where the packets pass.
•
2. Enter SNMP connection parameters:
• Click the drop-down menu to select the network.
• Select from the list of managed devices or enter a remote SNMP agent address.
3. Click Contact to initiate a connection with a remote SNMP agent.
4. In the MIB tree pane, search for a specific OID by using one of the following methods:
• Click the MIB tree tab, which contains MIB modules and objects in the hierarchical name space structure,
to select a specific object or search for an OID or a node name.
• Click MIB Modules to select a specific MIB module and node entry or use the search function to search
for a MIB module. You can upload and compile your MIB file if it is not in the list (go to Tools > MIB
Compiler).
• Click the drop-down menu to select an SNMP function:
• Get (request) to retrieve a value
• Get Next (request) to retrieve variables sequentially in a table
• Get Bulk (request) to fill the response with up to the max-repetition number defined for Get Next
requests
• Walk to perform a sequence of SNMP Get Next operation
• Table View for tabular objects
• Instance View to display multiple related object instances
• Set to set a value for an OID.
After a successful connection, the details for the objects will be displayed.
6. You can download the MIB data to a folder on your desktop in CSV file format. Click Export CSV to
download.
231
Tools
The SNMP credentials for accessing an OID information can be modified by clicking the SNMP Protocol Preference
Edit button at the top of the result pane.
232
Tools
The compiled MIB module can then be loaded and managed in the MIB browser.
2. On the Compile Page tab, click Upload MIB files to select a file(s) to upload.
3. The Upload MIB files page displays. Click Select Files to upload MIB files or click Select Directory to select
all the files under the selected folder.
233
Tools
Click the name under Module Identify to obtain the detailed results. If a MIB is successfully compiled, it will be
listed under Compiled Modules and can be accessed in the MIB Browser.
234
Tools
2. In the ICMP Ping pane, enter the following information to initiate a ping test:
• Device Hierarchy: click the drop-down menu to select the organization, site, and network.
• Enter the destination’s IP address.
• Enter the number of times (1 to 10) to perform the ping test. The default is 5.
• Enter the packet size (in bytes) for the echo request messages. The default is 32.
3. Click Ping to initiate the test.
235
Tools
2. From the SNMP Parameters column, enter the following information to initiate an SNMP trap test:
Item Description
Click the drop-down menu to define the site and network of the
Device Hierarchy
SNMP parameters.
IP Enter the device’s IP address.
Ping Times Enter the number of times (1 to 10) to perform the ping test.
SNMP Version Select the SNMP version: v1, v2c, or v3.
Enter the number of objects that can return in a single get-
Non-Repeaters (for v3 only)
next instance.
Enter the number of Get Next operations to be performed on each
Max-Repetitions (for v3 only)
variable.
Username (for v3 only) Enter the username for SNMP v3 requirement.
Enter the context name for SNMP v3 if it is used. It defines a named
Context Name (for v3 only)
subset of the object instances in the MIB with access control.
Select whether authentication and privacy will be required and select
the method accordingly. If authentication is used, enter the
Security Level (for v3 only) appropriate authentication parameters: protocol (MD5 or SHA) and
password. If privacy is used, enter the appropriate privacy
parameters (DES or AES) and password.
Read Community (for v1 and
Specify the read community string.
v2c only)
Write Community (for v1 and
Specify the write community string.
v2c only)
Port Enter the Port number of the target device (1 to 65535, default: 161).
Timeout(s) Enter the timeout (1 to 5, default: 4) value in seconds.
SNMP Test Click SNMP Test to initiate the test.
236
Tools
3. Click SNMP Test to initiate the test.
237
Tools
15.5 Perform a Trace Route Test
Trace route test diagnoses the path from one device to another.
2. In the Trace Route pane, enter the following information to initiate a trace route test:
• Device Hierarchy: click the drop-down menu to select the organization, site, and network.
• Select a destination host from the drop-down menu or manually enter the destination device’s IP address.
• Enter the maximum number of routers that a trace route packet can pass (1 to 15).
3. Click Trace to initiate the test.
4. The Route Result displays as follows:
238
Tools
Item Description
Session Name Enter a name to define the CLI connection.
Site Click the drop-down menu to select the desired site.
Network Click the drop-down menu to select the desired network.
IP/Host Name Enter the IP address or host name of the device to connect to.
Protocol Click the drop-down menu to select the access protocol (SSH/Telnet).
Port Enter the port number for the respective service (Telnet or SSH).
Username Enter a username with authority to access the device.
239
Tools
Password Enter the password of the user account.
Cancel Click to Cancel the session entry.
Connect Click Connect to start the session.
5. Click Connect to start the connection. Click Cancel to cancel the connection request.The CLI Connection
will be listed in the Session and open in the connection pane.
6. For each connection setting, you can modify or remove it from the connection list, click on the available
options.
240
Tools
2. Select two configuration files by specifying the device’s site, network and device model to start comparing.
3. The comparison result will be shown with the difference: added text in green, modified text in purple, and
deleted text in red.
4. You can directly modify the file and save it as a new configuration file to upload to the server. Go to
Configuration > File Management for the list of all uploaded configuration and firmware files.
5. The Restore to Device function allows you to schedule a restoration job using the currently displayed file.
Go to Configuration > Configuration Management > Restore for the list of all restoration jobs.
241
Appendix A
Structure
When planning for server cluster deployment, you must first set up 5 Windows servers with the following system
configuration:
⚫ SERVER A
MongoDB
IP Address: 192.168.1.205
⚫ SERVER B
MongoDB
IP Address: 192.168.1.203
⚫ SERVER C
MongoDB
242
Appendix A
IP Address: 192.168.1.204
⚫ SERVER D
D-View 8
IP Address: 192.168.1.201
⚫ SERVER E
D-View 8
IP Address: 192.168.1.202
243
Appendix A
4. Enter the MongoDB port number for server communication.
5. Click Check to test the setting. If it is configured correctly, a Check Pass! notification displays. If the test fails,
verify the port setting and try again.
6. Click Next to continue and the installation should start.
D-View 8 Installation
Use the following procedure to install D-View 8 on additional servers (e.g. server D & E) other than the
database servers and connect them to the MongoDB cluster.
Installation on server D
5. For port settings, enter the port number required for web access, core communication, and probe
communication: 17300, 17500, and 17600.
6. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
verify the port settings and try again.
7. Click Next to continue
244
Appendix A
8. The MongoDB Database Configuration page displays. Enter IP addresses and port number for the database
servers designated with the respective Replica Roles. Click Check to test the settings. If configured correctly, a
Check Pass! notification displays. If the test fails, verify the port settings and try again.
14. Once the installation completes, click Finish to close the Setup Wizard.
15. The D-View 8 Server can be accessed from a web browser on the server.
245
Appendix A
246
Appendix A
Installation on server E
4. For port settings, enter the port number required for web access, core communication, and probe
communication: 17300, 17500, and 17600.
5. Click Check to test the settings. If configured correctly, a Check Pass! notification displays. If the test fails,
verify the port settings and try again.
6. Click Next to continue
9. The MongoDB Database Configuration page displays. Enter IP addresses and port number for the database
servers designated with the respective Replica Roles. Click Check to test the settings. If configured correctly, a
Check Pass! notification displays. If the test fails, verify the port settings and try again.
247
Appendix A
10. After the installation, the D-View 8 Server can be accessed from a web browser on the server.
248
Appendix A
Network Load Balancing Setup on D-View 8 Servers
Server load balancing is supported on D-View 8. At least two Windows servers on the same subnet will be
required to configure load balancing. For our deployment demonstration of five-server topology, use the
following procedure to set up NLB on D-View 8 servers.
2. Start Network Load Balancing Manager on both servers. Then use the following procedure to configure them
individually.
Configuration on server D
249
Appendix A
4. In the Host field, enter the IP address of SERVER D: 192.168.1.201 and click the Connect button.
5. Click Next to continue. The New Cluster: Host Parameters page displays.
6. Click Next to continue. The New Cluster: Cluster IP Addresses page displays.
7. Click Add to enter the cluster IP address.
250
Appendix A
8. Enter a virtual IP and subnet mask that will be used as the Cluster IP and netmask. Then click OK to continue.
251
Appendix A
10. Click Next to continue. The Port Rules page displays.
11. Select the defined port rule and click Edit. The Add/Edit Port Rule page displays.
12. In the Filtering mode section, Select Multiple host for Filtering mode and None for Affinity. Then click OK to
continue.
252
Appendix A
14. Add SERVER E to this cluster: Right-click the cluster node and click Add Host To Cluster.
15. Input the SERVER E’s IP address: 192.168.1.202, then click Connect.
253
Appendix A
254
Appendix A
18. Open the Network Load Balancing Manager. Now a cluster containing both server D and E was created. And
the D-View 8 can be accessed with the cluster IP.
⚫ On SERVER E
255
Appendix A
You can also manage the NLB cluster on server E by configuring NLB with the Network Load Balancing Manager.
256