Proven Practices for Network Device Management

advertisement
Data Center Management Solutions
Proven Practices for Network Device Management
“We know we have huge
advantages with the
Avocent products. We
have found that the
organization, ease of use
and security have been
excellent. The Avocent
solution gives us per rack
information allowing us
to streamline response,
reduce our mean time
to repair and meet both
internal and external
audit requirements.”
– Bob Perini, Data Center
Manager, PSCU Financial
Services
First Things First: We really do understand how challenging
your job is. It’s not pandering. We know how complex your job can
be. And more often, than not, the stresses you face are due to fastchanging business demands that don’t match up to the wide and
varied technologies you have in your data center. Legacy devices,
quick fix add-ons, forgotten methodologies–they all add up to a
rich environment for angst. In this brief paper, we’ll address some
of the best practices we’ve observed our customers implementing
with the Avocent Corporation network infrastructure management
technology. Our goal is for you to take away some useful insights on
how to best work toward meeting your end goals.
The State of Your Dilemmas: Issues Faced in Network Management
Challenge 1: Access
It’s the nature of the beast. Your devices and end
users are all over the place, but you must have
ready access to all of them. Especially when there
is an issue affecting productivity. But, how do you
find the exact device in question? How do you
make sure you have the correct access rights?
How do you maintain the end-user experience
even when back racking devices?
array of devices make it incredibly difficult to
troubleshoot issues. That can create unwelcome
increases in resolution time, cost and risk.
Challenge 2: Security
Your network infrastructure is the much
embattled first layer of defense in the security
battle. Every new variable thrown at it creates a
“must not”. Access and logging strategies must
not affect your compliance levels with the
Sarbanes-Oxley Act (SOX), the Gramm-LeachBliley Act (GLBA), the Health Insurance Portability
and Accountability Act (HIPAA) and state-specific
mandates. Server sprawl must not weaken access
policies. Logging issues must not hinder
compliance with internal security mandates.
The Best Ways to Deal:
Secure remote access to console
devices with Avocent
Challenge 3: Log Sprawl
Logs, logs everywhere … but none of them are
consolidated. Data logs dispersed across a wide
Challenge 4: All the Other Worries
New device discovery. Dependable access in all
situations and network states. Not affecting
end-user productivity. Even the increase costs of
proprietary serial connections.
The Avocent network infrastructure
management solutions give IT professionals and
network operations center (NOC) personnel a
dynamic conduit for secure, remote data center
management including BIOS-level, consolidated
access for remote control, equipment
monitoring and diagnosing and troubleshooting.
Without getting into specific device names,
our wide selection of console server and
digital extender products address each of the
challenges listed above.
Proven Practices for Network Device Management
1) Access Issues Solved
Enable complete access, regardless of network state.
With Avocent network infrastructure management technology,
you can count on dual gigabit Ethernet ports for redundant
connectivity, an internal modem for dial-up that provides
connectivity in out-of-band situations and two 32-bit card bus
slots for alternate remote connectivity options.
Data Center Management Solutions
“The Avocent management application gives us
essential help in maintaining control over all
servers.”
– Andre Kocher, Systems administrator,
PostFinance
Know exactly where everything is.
Previously you had to know every device’s IP address and system
name. With Avocent, you can plug them all in to an Avocent
console server, and you are given the system name and IP address.
And, anytime a new device is added, it is added.
3) Log Sprawl Worries Solved
Tap the configurable serial pin capabilities.
Stop having to make your own cables to connect to a laptop or
some other device. Avocent technology includes Cisco® and Sun®
pin-outs, eliminating the need for crossover serial adapters.
Consolidate logs for faster troubleshooting.
Stop having to scan through multiple logs in multiple locations.
Avocent technology creates a single log for network admins to
access, with audit trails to each individual device.
Improve MTTR through collaborative port sharing.
Only Avocent technology enables secure, access-controlled port
sharing. The lead can enable interactive sessions with the boot and
bios of the device. Idle sessions can be killed easily.
See every message sent to each port.
The Avocent logging technology provides a history of all messages
that have been sent out to each console port. Those logs can then
be sent to a syslog server for easy application.
2) Security Concerns Solved
Predefine levels of access: online and via modem.
Avocent technology allows for three predefined, custom levels of
access. When modem access is used, there are added security
features such as call back or caller-ID awareness.
Enable easier management through consolidated
authentication.
Integrating to authentication servers is tremendously helpful.
They simplify password management by allowing you to easily
apply rights and privileges to individual devices or groups of
devices. Avocent works with virtually all authentication servers
with failover options including RADIUS, LDAP, Active Directory,
TACACS+, Kerberos and NIS protocols
Protect yourself against malware.
Boost your spyware and spoofing protection. Per-port alert strings
allow you to become the gatekeeper against malicious attacks.
End the threat of log tampering.
The Avocent solution has no vulnerable audit layer. Certificates are
matched directly to the appliance for logging of data, helping you
better maintain SOX and HIPAA compliance.
Augment security by physically separating computers from
end users.
Remove the noise, heat and maintenance away from the end user
while centralizing computers in a secure, environmentally
controlled data center. Additionally, this makes the introduction
of virus-infected files more difficult and eliminates dependence on
user adherence to software policies.
Emerson is a trademark of Emerson Electric Co. ©2010 Emerson Electric Co.
All rights reserved. Printed in USA. 0810-NIIMBP-DS-EN
Ensure easier compliance.
Data logging and data buffering help with compliance to IT
security mandates such as SOX, GLBA, HIPAA and other statespecific initiatives.
4) Other Issues Solved
Make your life easier with auto discovery.
Avocent can make configuration and management of console
servers easier with its auto discovery technology which detects
the host name of a connected target device and updates the
configuration automatically.
Maintain productivity, even when separating computers from
end users.
The Avocent industry-leading digital desktop over IP extender
technology easily deploys over local area networks and supports a
comprehensive range of peripherals including DVI-I video, CD
audio, USB mass storage, keyboard and mouse and other USB
devices.
A Proven Way to Find Out More: We’re
ready to discuss your needs.
If you’d like to learn more about the Avocent industry-leading
network infrastructure management products and solutions,
please call 1-866-277-1924 or email avocentsales@emerson.com.
Download