Data Center Management Solutions Proven Practices for Network Device Management “We know we have huge advantages with the Avocent products. We have found that the organization, ease of use and security have been excellent. The Avocent solution gives us per rack information allowing us to streamline response, reduce our mean time to repair and meet both internal and external audit requirements.” – Bob Perini, Data Center Manager, PSCU Financial Services First Things First: We really do understand how challenging your job is. It’s not pandering. We know how complex your job can be. And more often, than not, the stresses you face are due to fastchanging business demands that don’t match up to the wide and varied technologies you have in your data center. Legacy devices, quick fix add-ons, forgotten methodologies–they all add up to a rich environment for angst. In this brief paper, we’ll address some of the best practices we’ve observed our customers implementing with the Avocent Corporation network infrastructure management technology. Our goal is for you to take away some useful insights on how to best work toward meeting your end goals. The State of Your Dilemmas: Issues Faced in Network Management Challenge 1: Access It’s the nature of the beast. Your devices and end users are all over the place, but you must have ready access to all of them. Especially when there is an issue affecting productivity. But, how do you find the exact device in question? How do you make sure you have the correct access rights? How do you maintain the end-user experience even when back racking devices? array of devices make it incredibly difficult to troubleshoot issues. That can create unwelcome increases in resolution time, cost and risk. Challenge 2: Security Your network infrastructure is the much embattled first layer of defense in the security battle. Every new variable thrown at it creates a “must not”. Access and logging strategies must not affect your compliance levels with the Sarbanes-Oxley Act (SOX), the Gramm-LeachBliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA) and state-specific mandates. Server sprawl must not weaken access policies. Logging issues must not hinder compliance with internal security mandates. The Best Ways to Deal: Secure remote access to console devices with Avocent Challenge 3: Log Sprawl Logs, logs everywhere … but none of them are consolidated. Data logs dispersed across a wide Challenge 4: All the Other Worries New device discovery. Dependable access in all situations and network states. Not affecting end-user productivity. Even the increase costs of proprietary serial connections. The Avocent network infrastructure management solutions give IT professionals and network operations center (NOC) personnel a dynamic conduit for secure, remote data center management including BIOS-level, consolidated access for remote control, equipment monitoring and diagnosing and troubleshooting. Without getting into specific device names, our wide selection of console server and digital extender products address each of the challenges listed above. Proven Practices for Network Device Management 1) Access Issues Solved Enable complete access, regardless of network state. With Avocent network infrastructure management technology, you can count on dual gigabit Ethernet ports for redundant connectivity, an internal modem for dial-up that provides connectivity in out-of-band situations and two 32-bit card bus slots for alternate remote connectivity options. Data Center Management Solutions “The Avocent management application gives us essential help in maintaining control over all servers.” – Andre Kocher, Systems administrator, PostFinance Know exactly where everything is. Previously you had to know every device’s IP address and system name. With Avocent, you can plug them all in to an Avocent console server, and you are given the system name and IP address. And, anytime a new device is added, it is added. 3) Log Sprawl Worries Solved Tap the configurable serial pin capabilities. Stop having to make your own cables to connect to a laptop or some other device. Avocent technology includes Cisco® and Sun® pin-outs, eliminating the need for crossover serial adapters. Consolidate logs for faster troubleshooting. Stop having to scan through multiple logs in multiple locations. Avocent technology creates a single log for network admins to access, with audit trails to each individual device. Improve MTTR through collaborative port sharing. Only Avocent technology enables secure, access-controlled port sharing. The lead can enable interactive sessions with the boot and bios of the device. Idle sessions can be killed easily. See every message sent to each port. The Avocent logging technology provides a history of all messages that have been sent out to each console port. Those logs can then be sent to a syslog server for easy application. 2) Security Concerns Solved Predefine levels of access: online and via modem. Avocent technology allows for three predefined, custom levels of access. When modem access is used, there are added security features such as call back or caller-ID awareness. Enable easier management through consolidated authentication. Integrating to authentication servers is tremendously helpful. They simplify password management by allowing you to easily apply rights and privileges to individual devices or groups of devices. Avocent works with virtually all authentication servers with failover options including RADIUS, LDAP, Active Directory, TACACS+, Kerberos and NIS protocols Protect yourself against malware. Boost your spyware and spoofing protection. Per-port alert strings allow you to become the gatekeeper against malicious attacks. End the threat of log tampering. The Avocent solution has no vulnerable audit layer. Certificates are matched directly to the appliance for logging of data, helping you better maintain SOX and HIPAA compliance. Augment security by physically separating computers from end users. Remove the noise, heat and maintenance away from the end user while centralizing computers in a secure, environmentally controlled data center. Additionally, this makes the introduction of virus-infected files more difficult and eliminates dependence on user adherence to software policies. Emerson is a trademark of Emerson Electric Co. ©2010 Emerson Electric Co. All rights reserved. Printed in USA. 0810-NIIMBP-DS-EN Ensure easier compliance. Data logging and data buffering help with compliance to IT security mandates such as SOX, GLBA, HIPAA and other statespecific initiatives. 4) Other Issues Solved Make your life easier with auto discovery. Avocent can make configuration and management of console servers easier with its auto discovery technology which detects the host name of a connected target device and updates the configuration automatically. Maintain productivity, even when separating computers from end users. The Avocent industry-leading digital desktop over IP extender technology easily deploys over local area networks and supports a comprehensive range of peripherals including DVI-I video, CD audio, USB mass storage, keyboard and mouse and other USB devices. A Proven Way to Find Out More: We’re ready to discuss your needs. If you’d like to learn more about the Avocent industry-leading network infrastructure management products and solutions, please call 1-866-277-1924 or email avocentsales@emerson.com.