MG-SOFT Net Inspector V10 - Installation and Configuration

Transcription

MG-SOFT Net Inspector V10 - Installation and Configuration
MG-SOFT Corporation
Net Inspector 2015
Version 10.6
INSTALLATION AND CONFIGURATION
GUIDE
(Document Version: 10.6)
Document published on October 16, 2015
Copyright © 1995-2015 MG-SOFT Corporation
MG-SOFT Net Inspector — Installation and Configuration
Introduction
In order to improve the design or performance characteristics, MG-SOFT reserves
the right to make changes in this document or in the software without notice.
No part of this document may be reproduced or transmitted in any form or by any
means, electronic or mechanical, for any purpose, without the express written
permission of MG-SOFT Corporation. Permission to print one copy is hereby granted
if your only means of access is electronic.
Depending on your license, certain functions described in this document may not be
available in the version of the software that you are currently using.
Screenshots used in this document may slightly differ from those on your display.
MG-SOFT may have patents, patent applications, trademarks, copyrights, or other
intellectual property rights covering subject matter in this document. The furnishing of
this document does not give you any license to these patents, trademarks,
copyrights, or other intellectual property.
Copyright © 1995-2015 MG-SOFT Corporation. All rights reserved.
2
MG-SOFT Net Inspector — Installation and Configuration
Introduction
TABLE OF CONTENTS
1 Introduction........................................................................................................... 5
2 About Net Inspector ............................................................................................. 6
3 Net Inspector Architecture .................................................................................. 8
3.1 Main Components of Net Inspector .............................................................................8
3.2 Different Setup Scenarios .........................................................................................11
3.2.1 Simple Setup – All Components Installed on One Computer ..............................................11
3.2.2 Distributed Setup - Performance Manager and NetFlow Module Installed Remotely .....................11
Adding Additional Performance Manager Polling Engine and NetFlow Module for Linux to the System .... 11
Assigning Performance Manager Polling Engine to Devices .............................................................................. 13
Setting Devices as NetFlow Sources........................................................................................................................ 14
3.3 Linux System Integration Files ..................................................................................17
3.3.1 System (init.d) Startup Files .................................................................................................17
3.3.2 Apache HTTPD Integration File............................................................................................17
3.4 Server TCP and UDP Listening Ports ....................................................................... 17
4 Installing Net Inspector on Windows ................................................................ 19
4.1 Requirements ...........................................................................................................19
4.2 Installing Net Inspector for Windows ......................................................................... 20
5 Installing Net Inspector on Linux ...................................................................... 30
5.1 Requirements ...........................................................................................................30
5.2 Installing Net Inspector on RHEL 5 ........................................................................... 31
5.2.1 Fresh Installation ..................................................................................................................31
5.2.2 Upgrading Existing Installation .............................................................................................35
Upgrading Net Inspector 2010 Version 7.2 ............................................................................................................ 35
Upgrading Net Inspector 2012 Version 8.x ............................................................................................................ 36
Upgrading Net Inspector 2013 Version 9.x ............................................................................................................ 36
Upgrading Net Inspector 2014 Version 10.0.......................................................................................................... 37
5.2.3 Updating Net Inspector 2015 Version 10.5 ..........................................................................37
5.2.4 Installing Java Runtime Environment (JRE) for Linux ..........................................................38
5.2.5 Installing Mozilla Firefox 3.x on RHEL5 ................................................................................40
5.3 Starting and Stopping Net Inspector Server from Command Prompt......................... 42
6 Net Inspector Server Initialization File.............................................................. 43
6.1
6.2
6.3
6.4
Section [connection] ..................................................................................................43
Section [user] ............................................................................................................44
Section [config] .........................................................................................................45
Section [action] .........................................................................................................47
6.4.1 Defining Actions ....................................................................................................................47
6.5
6.6
6.7
6.8
Section [event] ..........................................................................................................52
Section [log] ..............................................................................................................53
Section [snmp notifications].......................................................................................55
Section [snmp agent] ................................................................................................57
7 Net Inspector Server Profiles File ..................................................................... 58
3
MG-SOFT Net Inspector — Installation and Configuration
Introduction
7.1 Section [poll profile] ...................................................................................................58
7.2 Section [snmp access profile]....................................................................................60
8 Net Inspector Performance Manager Initialization File ................................... 62
8.1 Section [database] ....................................................................................................62
8.2 Section [net inspector]...............................................................................................63
8.3 Section [system]........................................................................................................63
9 Net Inspector NetFlow Module Initialization File ............................................. 64
9.1 Section [database] ....................................................................................................64
9.2 Section [netflow_processor] ......................................................................................65
10 Net Inspector NetFlow Module Known Ports File ............................................ 65
11 Net Inspector NetFlow Module Known URLs File ............................................ 67
12 Back Up and Restore Net Inspector Configuration and Database ................. 68
12.1 Back Up Procedure ...................................................................................................68
12.1.1
12.1.2
On Windows ...................................................................................................................69
On Linux .........................................................................................................................69
12.2 Restore Procedure ....................................................................................................70
12.2.1
12.2.2
On Windows ...................................................................................................................70
On Linux .........................................................................................................................70
13 Configuring SNMP Notification Destination on SNMP Agents ....................... 72
4
MG-SOFT Net Inspector — Installation and Configuration
1
Introduction
INTRODUCTION
This guide provides instructions for installing and configuring Net Inspector Server
version 10.x for Windows and Linux operating systems.
All command line commands, filenames, paths and examples in this guide are
formatted with a fixed width font, e.g., port = 5221.
The path to Net Inspector v10.x installation directory in this guide is specified as
//Engine. By default, this is equivalent to C:\Program Files\MG-SOFT\Net
Inspector 10 on Windows and to /usr/local/mg-soft/mgnetinspector path
on Linux operating systems.
This guide also references the Net Inspector workspace directory, where the majority
of files containing the program settings and initialization parameters are located. The
path to the workspace directory is different in Windows and Linux operating systems,
as follows:
In Linux, the workspace directory full path is:
/var/mg-soft/mgnetinspector/workspace/
In Windows, the workspace directory full path depends on the Windows version:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\Workspace
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8.x:
C:\ProgramData\MG-SOFT\Net Inspector\Workspace
The content of this guide is listed in the Table of Contents.
5
MG-SOFT Net Inspector — Installation and Configuration
2
About Net Inspector
ABOUT NET INSPECTOR
MG-SOFT Net Inspector 2015 (version 10.5) is a powerful fault and performance
network management application designed for monitoring the status and performance
of managed devices and managing alarms associated with devices in the supervised
IPv4 and IPv6 networks.
Net Inspector is a client/server application. After installing the software, the server
module automatically discovers and graphically depicts your network by means of icons
representing devices and lines representing connections between devices. Then, the
server, which runs as a service/daemon application, continually monitors network
devices using the standard management protocols (ICMP, SNMP) and triggers alarms
when there is a problem, e.g., if a device or a service (e.g., HTTP, FTP, DNS, SSH, etc.)
stops responding, if an SNMP variable crosses the user-defined threshold value (CPU
load, memory usage, bandwidth usage, etc.), if a monitored process stops running etc.
Besides, the software receives event reports (SNMP Trap or Inform), which are sent to it
by managed devices when important events occur (link is lost, device is rebooted,
chassis temperature is high…). Received SNMP notifications are translated to alarms.
All alarms are stored in an SQL database and dispatched to connected clients.
Net Inspector Client, on the other hand, is an OS independent JavaTM application that
connects to the server and provides a graphical user interface that lets you monitor the
status and performance of managed objects as well as view and manage alarms
(acknowledge, clear, filter, find, etc.). The status of every managed device is indicated
by the color of its icon, while active alarms are chronologically listed in a dedicated
window using different (configurable) colors reflecting different severity levels of
alarms (e.g., red for critical, orange for major, yellow for warning, etc.). This principle
lets you tell at a glance if all systems are functioning as expected, and in case of
problems, quickly concentrate on them by viewing alarm messages that contain
detailed description of the problem.
In addition to fault management, Net Inspector now incorporates also full-featured
performance management functionalities (provided by the integrated MG-SOFT
Performance Manager application), effectively covering both crucial network
management areas. The advantage of the integrated fault and performance
management is that full history of alarms and performance data is available at the
central point, which allows you to see a more realistic picture of the health of the network
and let you bring educated decisions, based on trend reports, regarding its
maintenance. Further advantage is that the integrated system enables you to monitor
virtually any parameter available through SNMP (vendor-specific metrics, vendorspecific traps), and let you deploy distributed polling engines that enable load balancing
and better performance of the management system. Distributed management also
makes the system easily scalable without seriously degrading its performance, so the
management system's capacity can seamlessly grow with your network.
Besides, Net Inspector now incorporates NetFlow and sFlow monitoring, providing
detailed IP traffic statistics, i.e., the applications that generate the most traffic,
endpoints (IP addresses) that receive and generate the most traffic, protocols that are
used most, etc. This information is obtained by collecting, analyzing and aggregating
NetFlow and sFlow packets exported by the network devices. NetFlow/sFlow
monitoring effectively complements the standard SNMP monitoring and together they
6
MG-SOFT Net Inspector — Installation and Configuration
About Net Inspector
offer a valuable insight into the network infrastructure and bandwidth utilization and let
you easily identify the cause of congestions, etc.
Furthermore, Net Inspector also lets you monitor the IP SLA statistics, including HTTP,
FTP, TCP, DNS and VoIP Quality-Of-Service metrics (e.g., MOS, jitter, latency, packet
loss, etc.) on devices implementing the IP SLA functionality (e.g., Cisco routers).
Net Inspector Server is available for MS Windows operating systems (Windows XP,
Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows
Server 2012, Windows 8.x) and for Red Hat Enterprise Linux version 5, 6 and 7. Net
Inspector Client, on the other hand, runs on all operating systems with the Java
Runtime Environment (JRE), version 6.0 (a.k.a. 1.6) or later.
7
MG-SOFT Net Inspector — Installation and Configuration
3
Net Inspector Architecture
NET INSPECTOR ARCHITECTURE
3.1 Main Components of Net Inspector
Net Inspector Server components
1
Distributed modules
Core modules
Performance
Manager Engine
(mgperfmngd)
Net Inspector Server
Fault Manager
(mgniengined)
NetFlow module
(mgnetflowd)
SNMP Trap service
(mgtrapd)
PM presentation
layer using Web
Server and PHP
(MS IIS or Apache)
SNMP Trap
service (mgtrapd)
NetFlow
database
PM
database
Net Inspector Client
(JavaTM application)
NI Micro HTTP server
For Java Web Start
(mghttpd)
NI I/O module
(mgoiserver)
NI services poller
(mgservpoll)
NI event
database
1
Distributed modules may be installed to the same or different computer as NI Server core
modules. Distributed modules are not available in Net Inspector LITE Edition.
Short Description of Net Inspector Components
Net Inspector Server (Fault Manager) – main server module to which Net Inspector
Clients connect. It is a fault management application that listens for SNMP Trap and
Inform notifications messages and triggers and maintains events and alarms and
controls execution of actions on events (sending e-mails, SMS messages, running
commands) through satellite processes (mgmail, mgsms). If used as polling engine
8
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
(e.g., in Net Inspector LITE Edition), it polls devices via ICMP Ping and SNMP to
check their status and collect their current system resource utilization parameters and
network interface statistics.
Net Inspector Performance Manager Engine – perfromance manager module that is
used as the polling engine in Net Inspector WorkGroup and Enterprise Edition. It runs
as a daemon/server application and continually polls devices via ICMP Ping and
SNMP protocols to determine the status (up/down) of managed devices; measure
network latency and packet loss and collect device performance parameters (CPU,
memory, disk usage), status of processes running on managed computers and
network interface statistics. This module supports monitoring the IP SLA metrics on
Cisco routers and can also be configured to monitor arbitrary, vendor-specific SNMP
parameters. In distributed configurations, this module can also receive SNMP Trap
and Inform notification messages and pass them to remote Net Inspector Server.
Additionally, this module itself triggers alarms if polled devices stop responding or if
monitored parameters cross the threshold values (all alarms are passed further to Net
Inspector Server). Performance manager module stores performance related data in
the PM database (PostgreSQL).
In Net Inspector Enterprise Edition, more than one performance manager module can
be employed to enable distributed network management and load balancing.
Net Inspector NetFlow module – NetFlow/sFlow collector and analyzer daemon/service
that receives NetFlow and sFlow packets exported from configured NetFlow sources and
calculates IP traffic statistics identifying the applications that generate the most traffic (in
packets and bytes), endpoints (IP addresses) that receive and send the most data,
protocols that are used most, etc.
SNMP Trap service - MG-SOFT SNMP Trap service that listens on configured ports
(default: UDP 162) for incoming SNMP Trap and SNMP Inform notifications messages
and passes them to Net Inspector Server (in simple setup) or Net Inspector Performance
Manager Engine (in distributed setup), which converts and displays them as alarms.
Web presentation layer for PM and Netflow – a collection of PHP scripts for
presenting the data gathered by Performance Manager Engine and NetFlow module in
PHP-powered Web pages served via the HTTP server (MS IIS or Apache). These
Web pages are viewed in Net Inspector Client (by means of an integrated Java Web
browser).
Net Inspector Micro HTTP server - tiny HTTP server daemon/service that serves the
Web page for launching Net Inspector Client via the Java Web Start method and
provides access to Net Inspector documentation in electronic form.
Net Inspector services poller – a process used for monitoring the status of 19 wellknown network services on managed devices, like HTTP, SMTP, POP3, IMAP, SSH,
FTP, NNTP, …
Net Inspector I/O module – a Net Inspector Server satellite process that provides an
interface for exporting Net Inspector configuration and alarms to third-party
applications via the SOAP (XML-based) protocol.
9
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
Net Inspector database – SQL relational database (e.g., PostgreSQL) that stores
complete event and alarm data history for all managed devices.
Performance Manager and NetFlow database – SQL relational databases (e.g.,
PostgreSQL) that store the data collected by the Performance Manager engine and
NetFlow module, respectively.
Net Inspector services watchdog – a script that regularly checks the status of all Net
Inspector vital services and automatically restarts the services in case any of them is
terminated ungracefully.
Net Inspector Client - pure JavaTM application that connects to Net Inspector Server
and provides a graphical user interface that lets you view and manage alarms on
managed objects, monitor the status and performance of managed objects, as well as
configure the client and certain parameters of the server application. Net Inspector
Client is downloaded to host computers and launched there via the Java Web Start
mechanism (i.e., by clicking the relevant link in the Java Web Start HTML page served
by the Micro HTTP server).
An Example of Net Inspector Configuration Using Three Distributed
Performance Manager Polling Engines
 10
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
3.2 Different Setup Scenarios
3.2.1 Simple Setup – All Components Installed on One Computer
In the simple scenario, all server components are installed and run on the same
computer.
For the step-by-step installation procedure that applies to this scenario, please refer to
Installing Net Inspector on Windows section or Installing Net Inspector on Linux
section, respectively.
Net Inspector Client, on the other hand, can be run either on the same (local)
computer or on remote computers. Net Inspector Client is deployed and lunched using
the Java Web Start method from the computer where Net Inspector Server is installed.
This is achieved by simply clicking the Java Web Start link in the Net Inspector Client
web page hosted by Net Inspector Micro HTTP server.
3.2.2 Distributed Setup - Performance Manager and NetFlow Module Installed
Remotely
MG-SOFT Net Inspector Enterprise Edition supports distributed network management,
meaning that Performance Manager and NetFlow module can be installed and run on
remote computers to enable distributed polling, distributed SNMP notification reception
and distributed NetFlow and sFlow packet collection. This option also enables load
balancing.
The distributed setup scenario involves installing the full Net Inspector package to one
computer and Net Inspector distributed modules (additional Performance Manager and
NetFlow module) to one or more remote computers and connecting those modules to
Net Inspector Server, as described in the following sub-section.
Adding Additional Performance Manager Polling Engine and NetFlow Module
for Linux to the System
1. Install Net Inspector distributed modules on a remote computer (please note down
the computer’s IP address). For detailed installation instructions, please refer to
the section Installing Net Inspector on Linux section, Option 2: Installing Net
Inspector distributed modules.
2. If the new Performance Manager polling engine and NetFlow engine are already
running, stop them by using the following commands:
/etc/init.d/mgperfmngd stop
/etc/init.d/mgnetflowd stop
3. Open the Net Inspector Performance Manager initialization file in a text editor
(e.g., vi, nano, gedit, etc):
/var/mg-soft/mgnetinspector/mgperfmng/pollingengine.ini
 11
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
4. In section [net inspector], set the value of the ipaddress parameter to the
IP address of the Net Inspector Server computer. Set the value of the port
parameter to match the port number on which Net Inspector Server listens to
incoming Performance Manager connections (by default 5223). Leave other
parameters unchanged. The [net inspector] section of the pollingengine.ini
file should look similar to this:
[net inspector]
ipaddress=10.0.3.151
port=5223
5. The distributed modules installation package, installs also MG-SOFT NetFlow
engine together with Performance Manager. The NetFlow engine is configured to
start automatically at system startup and to listen on TCP port 9991 for incoming
NetFlow v5 and v9 and sFlow v5 packets. Make sure to open the TCP port 9991 in
the firewall if applicable (e.g., iptables).
If you do not need the NetFlow/sFlow monitoring, you can disable it. To do this, set the
NetFlow engine startup mode to off for all runlevels and stop the service:
chkconfig mgnetflowd off
/etc/init.d/mgnetflowd stop
6. Start the Performance Manager polling engine and the NetFlow engine by using
the following commands:
/etc/init.d/mgperfmngd start
/etc/init.d/mgnetflowd start
7. Performance Manager polling engine will try to establish a connection with the Net
Inspector Server, as configured above.
8. To verify if the new polling engine has been successfully added to the system, use
the Net Inspector Client and connect it to the Net Inspector Server. Then, choose
the Tools/ Server Settings command. The Server Settings dialog box appears.
Select the Polling Engines option and check if the new polling engine is listed in
the list within the Server Settings dialog box (Figure 1). If yes, you can assign the
new poling engine to one or more managed objects as described in the following
section. If not, please double-check the configuration in the pollingengine.ini
file and the log file (/var/mg-soft/mgnetinspector/log/pollingengine.log).
Make sure also no firewall is blocking the connection between the polling engine
and Net Inspector Server (TCP port 5223 must be open in the firewall on the Net
Inspector Server computer).
 12
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
Figure 1: Viewing the properties of a newly added polling engine
Assigning Performance Manager Polling Engine to Devices
After adding a new Performance Manager polling engine to the system, one needs to
assign it to managed objects in order for the polling engine to start polling those
devices and store collected results to the relevant instance of Performance Manager
database.
1. To assign the new poling engine to one or more managed objects, select the
relevant managed objects in the Net Inspector Client, right-click them and choose
the Tools / Change Polling Engine pop-up command (Figure 2). The Change
Polling Engine dialog box appears. Select the IP address of the new
Performance Manager polling engine from the Polling engine drop-down list in
the Change Polling Engine dialog box and click the OK button.
2. From this moment on, the selected managed objects will be polled by the given
Performance Manager polling engine. To view the polling results (device
performance data), right-click the device in Net Inspector Client and select the
Show Performance Statistics command from the pop-up menu.
 13
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
Figure 2: Changing the polling engine for multiple managed objects
Setting Devices as NetFlow Sources
To enable NetFlow and sFlow monitoring, the source devices (e.g., routers) must first
be configured (using vendor-specific commands) to send (export) NetFlow v5 or v9
packets or sFlow v5 packets to one or more Net Inspector NetFlow modules. For
instructions on how to configure the source device to export NetFlow/sFlow packets to
a specific target, please refer to the documentation that came with your NetFlow/
sFlow-capable device.
In order for a Net Inspector NetFlow module to accept NetFlow and/or sFlow packets
from a specific device and start producing NetFlow reports from them, this device
needs to be set as a NetFlow source in Net Inspector.
Note: A device cannot be set as a NetFlow source if it s being polled by the Net Inspector Server
(built-in polling engine). To be able to set a device is a NetFlow source, it needs to be monitored
(polled) by a Performance Manager polling engine.
1. To set a device as a NetFlow source, right-click its icon in Net Inspector Client and
select the Tools/NetFlow Source pop-up command (Figure 3).
 14
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
Figure 3: Setting a device as the NetFlow source in Net Insepctor Client
2. This command marks the selected device as a NetFlow source in Net Inspector
(Figure 4), meaning that from this “moment on, the Net Inspector NetFlow module
(which runs on the same computer as the Performance Manager polling engine
that is assigned to the given device), will start accepting the NetFlow or sFlow
stream from the given source device (its IP address). The Net Inspector NetFlow
module will analyze and aggregate received NetFlow and sFlow packets, generate
NetFlow traffic statistics and make them accessible via the Net Inspector Client.
Figure 4: The “NF” sign on the icon indicates that device is a NetFlow source
3. To view the NetFlow/sFlow statistics for a given NetFlow source device, right-click
its icon in the Net Inspector Client and choose the Show NetFlow Statistics
command from the pop-up menu (Figure 5).
 15
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
Figure 5: Opening NetFlow reports from a selected NetFlow source
 16
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
3.3 Linux System Integration Files
3.3.1 System (init.d) Startup Files
Service startup files
Description
/etc/init.d/mgnipgd
PostgreSQL service for MG-SOFT Net Inspector
/etc/init.d/mgniengined MG-SOFT Net Inspector Server service
/etc/init.d/mgperfmngd
MG-SOFT Net Inspector Performance service
/etc/init.d/mgnetflowd
MG-SOFT Net Inspector NetFlow service
/etc/init.d/mgtrapd
MG-SOFT SNMP Trap Listening service (mgtrapd package)
/etc/init.d/mgniwatchdogd MG-SOFT Net Inspector Daemon Watchdog service
3.3.2 Apache HTTPD Integration File
Integration files
/etc/httpd/conf.d/mgnetinspector.conf
Comment
Apache HTTPD PHP integration
3.4 Server TCP and UDP Listening Ports
MG-SOFT Net Inspector services listen on several ports that need to be open in the firewall
where Net Inspector Server is running (for example, iptables on Linux or Windows
Firewall on Windows).
MG-SOFT Net Inspector services listen on the following ports by default:
Comment
MG-SOFT Net Inspector Client connection
listening port
2 5223 TCP
mgniengined
all
MG-SOFT Net Inspector distributed modules
connection listening port
3 5225 TCP
localhost mgnipostmaster PostgreSQL database connection listening
port
4 5228 TCP
mghttpd
all
MG-SOFT Micro HTTP server Web-Start port
5 162 UDP
mgtrapd
all
MG-SOFT SNMP Trap daemon listening port
6 9991 UDP
mgnetflowd
all
MG-SOFT Net Inspector NetFlow router flows
listening port
7 8080 TCP
mgoiserver
all
Net Inspector I/O (SOAP) module listening port
In addition, the HTTP port (TCP 80) needs to be open in the firewall to allow displaying
Performance Manager and NetFlow Web pages in remotely connected Net Inspector Clients.
1
Port Protocol Interface
Service
mgniengined
all
5221 TCP
 17
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Architecture
The MG-SOFT Net Inspector services ports are configured in the following configuration files:
Port
1
2
3
4
5
6
7
INI File
INI File Section
Parameter Name
[connection]
port
[connection]
extension_port
pollingengine.ini [net inspector] port
5225 N/A
N/A
N/A
5228 niengine.ini
[httpd]
port
162 niengine.ini
[snmp
port, port1, port2, … portN
notifications]
9991 N/A – configur.
Tools/Manage
Edit Polling Engine/NetFlow Ports
through Client
Polling Engines/Edit
8080 niengine.ini
[connection]
soap_port
5221 niengine.ini
5223 niengine.ini
 18
MG-SOFT Net Inspector — Installation and Configuration
4
Installing Net Inspector on Windows
INSTALLING NET INSPECTOR ON WINDOWS
4.1 Requirements
In order to install and use MG-SOFT Net Inspector 2015 for Windows (version 10.x),
the following software needs to be installed on your computer:



Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7,
1
Windows Server 2012 or Windows 8.x
Java Runtime Environment (JRE) for Windows, version 6.0 (a.k.a. 1.6) or later is
required on all computers that will run Net Inspector Client. JRE can be
downloaded from the following Web page: http://www.java.com/
2
MS Internet Information Services (IIS) , with enabled Web server (WWW services) and
at least the following features:
 Common HTTP features (Directory Browsing, HTTP Errors, Static Content),
 Application Development features (ISAPI Extensions and (Fast)CGI)
Please consult your Windows documentation for instructions on installing IIS.
Figure 6: Example of installing the required IIS components (Windows Server 2008)
1
2
Windows Server operating system is strongly recommended for using the WorkGroup and
Enterprise Edition of Net Inspector
This is not required for installing the LITE Edition of Net Inspector (which does not include
performance management functionalities).
 19
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Additional requirements:

Administrative user privileges are required to successfully install Net Inspector.

IP address(es) of the host(s) running Net Inspector and Performance Manager
applications must not change after the software has been installed.

At least 250 GB free disk space is required for the Net Inspector NetFlow database
if the Net Inspector NetFlow module (installs together with Performance Manager)
is used for actively collecting and analyzing NetFlow and sFlow streams.
4.2 Installing Net Inspector for Windows
Note: This manual describes only those installation steps that are specific to the MG-SOFT Net
Inspector installation procedure.
1. In Windows Explorer open the folder that contains MG-SOFT Net Inspector setup
executable and double-click the setup.exe file to run the installer.
Note: Administrative user privileges are required to install MG-SOFT Net Inspector.
2. MG-SOFT Net Inspector 2015 setup routine first checks if PostgreSQL ODBC driver
is installed on the system. If no matching software can be found, installer displays a
dialog box offering you the option to install the required component (Figure 7).
Note: Net Inspector 2015 for Windows installs and uses the PostgreSQL database. If you are
upgrading from older versions of Net Inspector (i.e., versions 6.x–7.0), old alarms and events
will not be preserved after the upgrade.
Figure 7: The installation requirements screen
 20
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
3. Click the Install button to install the required software component (e.g.,
PostgreSQL ODBC driver). A separate installation wizard is launched. Follow the
installation wizard guidelines accepting the default settings.
4. After successfully installing the required component, MG-SOFT Net Inspector 2015
installer Welcome screen appears (Figure 8). The installer lets you install either all
components of the package or only selected components: i.e., Net Inspector Fault
Manager or Net Inspector Performance Manager (and corresponding databases).
Click the Next button at the bottom of the installation wizard screen to proceed with
the installation and pass from one screen to another.
Figure 8: Net Inspector installer - Welcome screen
5. Net Inspector installer then verifies if all the required MS Internet Information
Services (IIS) components are properly installed on the system. If one or more
required IIS components are missing, the “Required IIS Components Not Installed”
screen is displayed (Figure 9), asking if you want to continue the installation. You
have two options:

If you want to install the entire Net Inspector package (Fault + Performance
Manager) or only Net Inspector Performance Manager component, click the No
button to quit the installer without installing the Net Inspector software. Then,
install the required IIS components and run the Net Inspector setup again.

If you want to install only Net Inspector Fault Manager without the
Performance Manager component or if you are installing Net Inspector LITE
Edition (which does not include Performance Manager), you can proceed with
the installation by clicking the Yes button at the bottom of the “Required IIS
Components Not Installed” screen.
 21
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Figure 9: Net Inspector installer – missing IIS components screen
6. After passing the standard installation steps of accepting the license agreement,
specifying the license key file location, providing the user information, and specifying
the installation destination folder, the “Program Features” screen appears (Figure 10),
where you can select which main components of the package will be installed:
Figure 10: Net Inspector installer – Program Features screen
 22
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows

Typical configuration (Fault and Performance Manager installed on the same host)
To install all components of the package to the same computer, select both
options in the Program Features screen and click the Next button. The installer
continues as described in step 8 below.

Distributed configuration (Fault and Performance Manager installed on different
hosts; one or more Performance Manager polling engines can be installed)
To install only Net Inspector Fault Manager or only Net Inspector Performance
Manager application to the local computer, select the corresponding option in the
Program Features screen and deselect the other option (click the disk drive icon
in front of the application’s name and select the “This feature will not be available”
entry from the drop-down menu). Then, click the Next button.
a) If you have selected to install only Net Inspector Fault Manager, proceed as
described in steps 7-13 (except step 8) below. Please note down the IP
address of the computer to which you are installing Net Inspector Fault
Manager, as you will need to enter it later when installing Performance
Manager. After Net Inspector Fault Manager installation finishes, run the
setup again on a different computer to install the Performance Manager
(including NetFlow module) component.
b) If you have selected to install only Net Inspector Performance Manager, the
“Information About Remote Net Inspector Installation” screen appears (Figure 11).
Into the IP address input line enter the IP address of the computer that runs or
will run Net Inspector Fault Manager. If you specify this address now, the
Performance Manager polling engine you are installing will automatically
connect to the remote Net Inspector server and receive configuration from it. If
you leave the IP address input line empty, you need to specify the relevant IP
address later in the pollingengine.ini file. Click the Next button to
proceed to the “Select Install Mode” screen (Figure 12). After Performance
Manager installation finishes, run the setup again on a different computer to
install Net Inspector Fault Manager.
Figure 11: Net Inspector installer – entering the address of Net Inspector Server
 23
MG-SOFT Net Inspector — Installation and Configuration

Installing Net Inspector on Windows
Installing Net Inspector LITE Edition (includes only Fault Manager)
To install Net Inspector LITE Edition, select the Net Inspector Fault Manager
option in the Program Features screen and deselect the Net Inspector
Performance Manager. Then, click the Next button to install only Net Inspector
Fault Manager as described in steps 7-13 (except step 8) below.
7. Next, the “Select Install Mode” screen is displayed (Figure 12). You can choose
between the Default and Custom installation modes as follows:
 If you want to quickly install the selected software component(s) using the
default settings, select the Default option and click the Next button in the
“Select Install Mode” screen. The “Ready to Install” screen appears (Figure 16).
Proceed as described in steps 12-13 below.

If you want to view or change the settings in each installation step, select the
Custom option and click the Next button in the “Select Install Mode” screen.
Proceed as described in the following steps.
Figure 12: Net Inspector installer – selecting installation mode
8. If you have selected the Custom installation mode in the previous step and Net
Inspector Performance Manager is selected for installation, the “Performance
Manager Server Settings” screen appears next (Figure 13).
 24
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Figure 13: Net Inspector installer – configuring Performance Manager Server settings

Leave the Open HTTP server port (TCP 80) checkbox checked if you want
the installer to open TCP port 80 in Windows Firewall (if applicable). By
default, IIS WWW server listens on this port for incoming HTTP connections.
This port needs to be open to allow accessing the performance management
reports from Net Inspector Clients running on remote computers.

Leave the Add MG-SOFT NetFlow Service (mgNetFlowRcv.exe) to
allowed programs checkbox checked if you want the installer to add the
corresponding exception to the Windows Firewall configuration (if applicable). If
you disable this option, Net Inspector NetFlow module will not be able to
receive NetFlow and sFlow packets sent to it from remote devices.

On Windows Vista and newer operating systems, another checkbox is displayed
that allows you to enable passing outgoing and incoming Ping request and
responses through the Windows Firewall (in Windows versions preceding Vista,
this is allowed by default). It is recommended to leave this option enabled.
Note: Net Inspector Installation Wizard will configure the above enabled exceptions
only in the built-in Windows Firewall. If you use third-party firewall software, you need to
configure the above-described exceptions manually. For details, please check the
documentation that came with the third party firewall software.
9. Click the Next button to proceed to the “Net Inspector Server Settings” screen (Figure 14).
Note: If Net Inspector Fault Manager is not selected for installation, this and the next 4
screens are skipped and the Ready to Install the Program screen appears.
 25
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Figure 14: Net Inspector installer – configuring Net Inspector Server settings

Into the Net Inspector Server communication port input line, enter the TCP
port on which Net Inspector Server will listen to for incoming Net Inspector
Client connections. By default, this port number is 5221.

Into the Net Inspector HTTP Server port input line, enter the TCP port on
which Net Inspector HTTP Server will listen to for incoming HTTP
connections. By default, this port number is 5228.
Note: Net Inspector comes with its own micro HTTP (Web) server program that installs
to the same computer as Net Inspector Server and other components of the package.
Net Inspector HTTP Server serves a Web page that enables launching Net Inspector
Client (locally or remotely) by using the Java Web Start framework. The latter enables
starting Java applications from anywhere in the network by using a Web browser.
Additionally, Net Inspector HTTP Server provides also Web-based access to Net
Inspector documentation in electronic form.

Into the Net Inspector Performance port input line, enter the TCP port on
which Net Inspector Server will listen to for incoming connections from
Performance Manager polling engines. By default, this port number is 5223.

Leave the Open above ports in Windows Firewall checkbox checked if you
want the Installation Wizard to open the above specified TCP ports in Windows
Firewall (if applicable). If you disable this option, remote users will not be able
to connect to Net Inspector Server and Net Inspector HTTP Server.

Leave the Add MG-SOFT SNMP Trap Service (mgwtrap3.exe) to allowed
programs checkbox checked if you want the Installation Wizard to add the
corresponding exception to the Windows Firewall configuration (if applicable). If
you disable this option, Net Inspector will not be able to receive SNMP Trap
and Inform notifications sent to it from remote hosts.
 26
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows

Leave the Add Microsoft SNMP Trap Service (snmptrap.exe) to allowed
programs checkbox checked if you want the Installation Wizard to add the
corresponding exception to the Windows Firewall configuration (if applicable). If
Microsoft SNMP Trap Service is installed and not disabled, MG-SOFT SNMP
Trap Service will bind to it and receive SNMP Trap and Inform notifications
through it and then pass these notifications further to MG-SOFT’s applications
on the given computer. If you disable this option, Net Inspector will not be able
to receive SNMP Trap and Inform notifications sent to it from remote hosts.

On Windows Vista and newer operating systems, another checkbox is
displayed that allows you to enable passing outgoing and incoming ICMP Ping
request and responses through the Windows Firewall (in Windows versions
preceding Vista, this is allowed by default). This exception is required for Net
Inspector Server to be able to poll remote hosts.
Leave the above checkbox(es) checked if you want the Installation Wizard to
add the above specified exceptions to the Windows Firewall configuration (if
applicable). If you disable these options, remote users will not be able to
connect to Net Inspector Server and the latter will not be able to successfully
poll devices and receive SNMP notifications from them.
Note: Net Inspector Installation Wizard will open the relevant ports only in the built-in
Windows Firewall. If you use third-party firewall software, you need to manually
configure the above exceptions in it. For details, please check the documentation that
came with the third party firewall software.
10. Click the Next button to proceed to the “Create Administrator User Account” screen
(Figure 15), which prompts you to enter a password for the built-in Net Inspector
administrative user account:
 The Username filed displays the username of the built-in administrative user
account (admin). The username is displayed read-only and cannot be modified.
 Enter the password into the Password input line and confirm the password
by re-entering it into the Confirm password input line below.
Note: Carefully note the username and password (both are case sensitive!). After installing the
software, you will need to log on to Net Inspector Server using this user account in order to
create other user accounts and perform other administrative tasks.
 27
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Figure 15: Net Inspector installer – setting administrator password
11. Click the Next button to proceed to the “Ready to Install the Program” screen (Figure 16).
Figure 16: Net Inspector installer – Ready to Install screen
12. Click the Install button to install the software according to the settings specified in
previous steps. After copying the required files and setting up necessary registry
entries, the final screen of the Net Inspector Installation Wizard appears (Figure 17).
 28
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Windows
Figure 17: Net Inspector installer – final screen
13. Click the Finish button to end the Net Inspector Installation Wizard. If you check
the Launch MG-SOFT Net Inspector Client checkbox, this operation also
displays the Net Inspector Web Start page in the default Web browser application,
which lets you launch Net Inspector Client by clicking the Start MG-SOFT Net
Inspector Client link (provided that JRE 1.6 or later is installed on your computer)
and connect it to the Server using the File / Connect command.
Note 1: Please refer the Net Inspector Client Getting Started Guide and the Net
Inspector Client Reference Manual for more information on using Net Inspector.
Note 2: If you received a valid license key file after you had installed the software, you need
to copy the license.key file to the Net Inspector’s Bin folder (i.e., C:\Program
Files\MG-SOFT\Net Inspector 10\Bin) and restart the MG-SOFT Net Inspector
Server service in the Services window (Start / Settings / Control Panel / Administrative
Tools / Services).
 29
MG-SOFT Net Inspector — Installation and Configuration
5
Installing Net Inspector on Linux
INSTALLING NET INSPECTOR ON LINUX
5.1 Requirements
In order to install MG-SOFT Net Inspector 2015 for Linux (version 10.x), the following
software needs to be installed on your computer:
1
2
3
Red Hat Enterprise Linux version 5, 6 or 7 for x86 or x86_64 architecture
ODBC driver manager for Linux (unixODBC) version 2.2 or greater
GNU Libtool Dynamic Module Loader (libtool-ltdl) version 1.5 or greater
x
Apache HTTP server (httpd) version 2.0 or greater
x
PHP (php, php-pdo, php-pgsql, php-gd) version 5.1 or greater





Additional software requirements:

Java Runtime Environment (JRE), version 6.0.x (a.k.a. 1.6.x) or newer must be
installed on all computers that will run Net Inspector Client. JRE for various
operating systems can be downloaded from the following Web page:
http://www.java.com/. For detailed instructions for installing JRE 7.0 on RHEL5,
please refer to the Installing Java Runtime Environment (JRE) for Linux section.

Mozilla-Firefox version 3.0.12 or greater is required for viewing Net Inspector
x
Performance Manager and NetFlow reports on Linux . For detailed instructions,
please refer to the Installing Mozilla Firefox 3.x on RHEL5 section.
1
2
3
For detailed instructions on installing Net Inspector 2015 on RHEL6, please refer to the
“Installing Net Inspector on RHEL 6” section of the bundled READ_ME.TXT file.
For detailed instructions on installing Net Inspector 2015 on RHEL7, please refer to the
“Installing Net Inspector on RHEL 7” section of the bundled READ_ME.TXT file.
Net Inspector installation bundle contains both, 32-bit (i386) and 64-bit (x86_64) version of
Net Inspector RPM installation packages. On 64-bit RHEL, install the 64-bit (x86_64)
version Net Inspector. On 32-bit RHEL, install the 32-bit (i386) version Net Inspector.
x
Not required for Net Inspector LITE Edition.
Furthermore, TCP port 5225 on the loopback network interface must be free (it is used
by Net Inspector PostgreSQL database postmaster).
At least 250 GB free disk space on /var/mg-soft/ is required for the Net Inspector
NetFlow database if the Net Inspector NetFlow module is used for actively collecting
and analyzing NetFlow and/or sFlow packets.
Administrative (root) privileges are required to successfully install or update Net Inspector.
The procedure of installing Net Inspector on a Linux operating system includes several steps,
as described in this section. Throughout this guide it is presumed that the contents of the Net
Inspector installation tarball is accessible in the temporary directory /install_niv10. The
entire installation procedure is carried out from this temporary directory. To create the
temporary directory, execute the following command at a command prompt:
mkdir /install_niv10
 30
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
5.2 Installing Net Inspector on RHEL 5
For information on installing Net Inspector 2015 on RHEL 6 and 7, please refer to the
“Installing Net Inspector on RHEL 6” and “Installing Net Inspector on RHEL 7” sections
of the bundled READ_ME.TXT file, respectively.
5.2.1 Fresh Installation
A) Using Yum RPM Installer:
If you have RHN subscription and access to the Internet, use the Yum RPM
installer/updater facility to install the required modules (Apache, PHP, unixODBC,
etc.). To do this, run the following commands with root user privileges in a terminal
window:
1. Install required modules: Apache v2, PHP v5, unixODBC,...:
yum install unixODBC*
yum install libtool-ltdl*
yum install httpd
yum install php
yum install php-pgsql
yum install php-gd
yum install postgresql-libs
*Only these two commands need to be run if installing Net Inspector v10.x LITE Edition
2. Change to temporary directory where Net Inspector v10 RPM packages are (e.g.:
cd /install_niv10) and install MG-SOFT SNMP Trap service:
rpm -Uvh mgtrapd-7.x-x.AAA.rpm
Note: Net Inspector Enterprise Edition supports distributed setup that supports also distributed
SNMP Trap collection. More specifically, remote Net Inspector Performance Manager modules
can be configured to receive SNMP Trap and Inform notification messages and pass them to Net
Inspector Server, which acts as a central station that displays all alarms. In such configuration,
MG-SOFT SNMP Trap service needs to be installed on every computer that runs Net Inspector
distributed modules.
3. Install Net Inspector:
Option 1: Install the complete package of Net Inspector v10.x
rpm -ivh mgNetInspector_2015-10.x-x.AAA.rpm
Where x-x is the version of the software, and AAA is the architecture, i.e., "i386" for 32-bit
systems and "x86_64" for 64-bit Linux systems.
 31
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
Option 2: Install only Net Inspector v10.x distributed modules
(i.e., Net Inspector Performance Manager, NetFlow module and database).
This option may be used if the complete Net Inspector v10.x package is or will be
installed on another computer (see the Distributed Setup section of this manual).
To install only Net Inspector distributed modules, install the “dm” RPM package, as
follows:
rpm -ivh mgNetInspector_dm_2015-10.x-x.AAA.rpm
Where x-x is the version of the software, and AAA is the architecture, i.e., "i386" for 32-bit
systems and "x86_64" for 64-bit Linux systems.
Note: After installing Net Inspector v10 distributed modules, you need to edit the
pollingengine.ini file to connect this Performance Manager polling engine to Net
Inspector Server, as described in this section. See also section Assigning Performance
Manager Polling Engine to Devices and Setting Devices as NetFlow Sources.
Option 3: Install Net Inspector v10.x LITE Edition
(LITE Edition does not include Net Inspector Performance Manager and NetFlow module).
rpm -ivh mgNetInspector_lite_2015-10.x-x.AAA.rpm
Where x-x is the version of the software, and AAA is the architecture, i.e., "i386" for 32-bit
systems and "x86_64" for 64-bit Linux systems.
Note: If iptables firewall is running, Net Inspector installation script automatically opens the
relevant TCP and UDP ports which Net Inspector services listen to.
4. Copy your license.key file to proper directories:
cp license.key /usr/local/mg-soft/mgtrapd/bin
cp license.key /usr/local/mg-soft/mgnetinspector/bin
5. Restart Net Inspector services to read the license key:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_restart_services.sh
6. Once the entire installation process is completed, you can delete the temporary
directory from which you installed the software by issuing the following commands:
cd ..
rm –Rf /install_niv10
After successfully installing Net Inspector, you can launch Net Inspector Client from the
Net Inspector Client Java Web Start page (if JRE 1.6 or later is installed - see the
Installing Java Runtime Environment (JRE) section) and connect it to Net Inspector
 32
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
Server. For detailed instructions, please refer to the Net Inspector Client Getting Started
Guide.
Note: To be able to effectively monitor alarms on managed objects, you need to configure the
SNMP agents on managed devices to send SNMP notifications to Net Inspector Server.
Otherwise, Net Inspector will not receive those notifications and consequently will not display and
notify you about the corresponding alarms.
B) Manually Installing RPM Packages:
Instead of using the Yum updater/installer, you can install the required modules
manually from the RHEL5 DVD medium using the RPM Package Manager. This option
requires no Internet connection. To do this, insert the RHEL5 DVD medium into the
DVD drive, mount the DVD drive (e.g., mount /dev/hdc /media/cdrom) and use
the following commands in a Terminal window to install all the required modules and
MG-SOFT Net Inspector v10.x for Linux (root privileges are needed):
1. Change current directory to directory with i386 RPM modules on RHEL5 DVD:
Note: Versions in RPM file names in the examples below are for RHEL_5.5 i386 Server
DVD. For other RHEL 5 releases, please use the corresponding versions of RPM packages
available in the used release.
cd /media/cdrom/Server
2. Install required modules (Libtool Dynamic Module Loader, ODBC driver manager):
rpm -Uvh libtool-ltdl-1.5.22-7.el5_4.i386.rpm
rpm -Uvh unixODBC-2.2.11-7.1.i386.rpm
Note: If installing Net Inspector v10.x LITE Edition, skip the steps 3-5 below and continue in step
6.
3. Install Apache HTTP server v2.x and dependencies:
rpm
rpm
rpm
rpm
-Uvh
-Uvh
-Uvh
-Uvh
apr-1.2.7-11.el5_3.1.i386.rpm
postgresql-libs-8.1.18-2.el5_4.1.i386.rpm
apr-util-1.2.7-11.el5.i386.rpm
httpd-2.2.3-43.el5.i386.rpm
4. Set the auto startup for httpd service for runlevels 2, 3, 4, 5:
/sbin/chkconfig --level 2345 httpd on
5. Install PHP v5.1 and the required PHP components:
rpm
rpm
rpm
rpm
rpm
-Uvh
-Uvh
-Uvh
-Uvh
-Uvh
php-common-5.1.6-27.el5.i386.rpm
php-pdo-5.1.6-27.el5.i386.rpm
php-pgsql-5.1.6-27.el5.i386.rpm
gmp-4.1.4-10.el5.i386.rpm
php-cli-5.1.6-27.el5.i386.rpm
 33
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
rpm -Uvh php-5.1.6-27.el5.i386.rpm
rpm -Uvh php-gd-5.1.6-27.el5.i386.rpm
6. Change to temporary directory where the Net Inspector v10 RPM packages are
(e.g.: cd /install_niv10) and install MG-SOFT SNMP Trap service:
rpm -Uvh mgtrapd-7.x-x.i386.rpm
Note: Net Inspector Enterprise Edition supports distributed setup that supports also distributed
SNMP Trap collection. More specifically, remote Net Inspector Performance Manager modules
can be configured to receive SNMP Trap and Inform notification messages and pass them to Net
Inspector Server, which acts as a central station that displays all alarms. In such configuration,
MG-SOFT SNMP Trap service needs to be installed on every computer that runs Net Inspector
distributed modules.
7. Install Net Inspector:
Option 1: Install the complete package of Net Inspector v10.x
rpm -ivh mgNetInspector_2015-10.x-x.i386.rpm
Option 2: Install only Net Inspector v10.x distributed modules
(i.e., Net Inspector Performance Manager, NetFlow module and database).
This option may be used if the complete Net Inspector v10.x package is or will be
installed on another computer (see the Distributed Setup section of this manual).
To install only Net Inspector distributed modules, install the “dm” RPM package, as
follows:
rpm -ivh mgNetInspector_dm_2015-10.x-x.i386.rpm
Note: After installing Net Inspector v10 distributed modules, you need to edit the
pollingengine.ini file to connect this Performance Manager polling engine to Net
Inspector Server, as described in this section. See also section Assigning Performance
Manager Polling Engine to Devices and Setting Devices as NetFlow Sources.
Option 3: Install Net Inspector v10.x LITE Edition
(LITE Edition does not include Net Inspector Performance Manager and NetFlow
module).
rpm -ivh mgNetInspector_lite_2015-10.x-x.i386.rpm
Note: If iptables firewall is running, Net Inspector installation script automatically opens the
relevant TCP and UDP ports which Net Inspector services listen to.
8. Copy your license.key file to proper directories:
cp license.key /usr/local/mg-soft/mgtrapd/bin
cp license.key /usr/local/mg-soft/mgnetinspector/bin
 34
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
9. Restart Net Inspector services to read the license key:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_restart_services.sh
10. Once the entire installation process is completed, you can delete the temporary
directory from which you installed the software by issuing the following commands:
cd ..
rm –Rf /install_niv10
After successfully installing Net Inspector, you can launch Net Inspector Client from the
Net Inspector Client Java Web Start page (if JRE 1.6 is installed - see the Installing Java
Runtime Environment (JRE) section) and connect it to Net Inspector Server. For detailed
instructions, please refer to the Net Inspector Client Getting Started Guide.
Note: To be able to effectively monitor alarms on managed objects, you need to configure the
SNMP agents on managed devices to send SNMP notifications to Net Inspector Server.
Otherwise, Net Inspector will not receive those notifications and consequently will not display and
notify you about the corresponding alarms.
5.2.2 Upgrading Existing Installation
The procedure of upgrading existing Net Inspector installation to the latest release
depends on the version that is currently installed.
Upgrading Net Inspector 2010 Version 7.2
To upgrade Net Inspector 2010 (version 7.2) for Linux, first stop the Net Inspector
services and uninstall the Net Inspector 2010 RPM package. Then, install the latest
version, as follows:
1. Stop MG-SOFT Net Inspector services and MG-SOFT SNMP Trap daemon
(mgtrapd), using the following commands:
/etc/init.d/mgniwatchdogd stop
/etc/init.d/mgnetflowd stop*
/etc/init.d/mgperfmngd stop*
/etc/init.d/mgniengined stop
/etc/init.d/mgtrapd stop
/etc/init.d/mgnipgd stop
*Not applicable if updating Net Inspector LITE Edition.
2. Then, remove the existing Net Inspector 2010 version 7.2 installation by running
the following command:
rpm –e mgnetinspector_2010
 35
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
Note: Net Inspector workspace (user views, devices) and all the settings will be preserved.
3. Finally, install the latest version of Net Inspector for Linux by following the
procedure described in the Fresh Installation section. The old settings from Net
Inspector for Linux version 7.2 will be automatically imported and applied to the
new version of the software.
Upgrading Net Inspector 2012 Version 8.x
To upgrade Net Inspector 2012 (version 8.x) for Linux , first stop the Net Inspector
services and uninstall the Net Inspector 2012 RPM package. Then, install the latest
version, as follows:
1. Stop MG-SOFT Net Inspector services and MG-SOFT SNMP Trap daemon
(mgtrapd), using the following commands:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_stop_services.sh
/etc/init.d/mgtrapd stop
2. Then, remove the existing Net Inspector 2012 version 8.x installation by running
the following command:
rpm –e mgnetinspector_2012
Note: Net Inspector workspace (user views, devices) and all the settings will be preserved.
3. Finally, install the latest version of Net Inspector for Linux by following the
procedure described in the Fresh Installation section. The old settings from Net
Inspector for Linux version 8.x will be automatically imported and applied to the
new version of the software.
Upgrading Net Inspector 2013 Version 9.x
To upgrade Net Inspector 2013 for Linux (version 9.0 or newer), first stop the Net
Inspector services and uninstall the Net Inspector 2013 RPM package. Then, install
the latest version, as follows:
1. Stop MG-SOFT Net Inspector services and MG-SOFT SNMP Trap daemon
(mgtrapd), using the following commands:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_stop_services.sh
/etc/init.d/mgtrapd stop
2. Update the existing installation of MG-SOFT SNMP Trap daemon (mgtrapd) by
using the rpm –Uvh command:
rpm -Uvh mgtrapd-7.x-x.i386.rpm
 36
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
3. Then, remove the existing Net Inspector 2013 version 9.x installation by running
the following command:
rpm –e mgnetinspector_2013
Note: Net Inspector workspace (user views, devices) and all the settings will be preserved.
4. Finally, install the latest version of Net Inspector for Linux by following the
procedure described in the Fresh Installation section. The old settings from Net
Inspector for Linux version 9.x will be automatically imported and applied to the
new version of the software.
Upgrading Net Inspector 2014 Version 10.0
To upgrade Net Inspector 2014 for Linux (version 10.0), first stop the Net Inspector
services and uninstall the Net Inspector 2014 RPM package. Then, install the latest
version, as follows:
1. Stop MG-SOFT Net Inspector services and MG-SOFT SNMP Trap daemon
(mgtrapd), using the following commands:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_stop_services.sh
/etc/init.d/mgtrapd stop
2. Update the existing installation of MG-SOFT SNMP Trap daemon (mgtrapd) by
using the rpm –Uvh command:
rpm -Uvh mgtrapd-7.x-x.i386.rpm
3. Then, remove the existing Net Inspector 2013 version 9.x installation by running
the following command:
rpm –e mgnetinspector_2014
Note: Net Inspector workspace (user views, devices) and all the settings will be preserved.
4. Finally, install the latest version of Net Inspector for Linux by following the
procedure described in the Fresh Installation section. The old settings from Net
Inspector for Linux version 10.0 will be automatically imported and applied to the
new version of the software.
5.2.3 Updating Net Inspector 2015 Version 10.5
This section describes the procedure of applying updates to the current major release
of Net Inspector (e.g., from v10.5 to v10.6).
 37
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
1. Stop MG-SOFT Net Inspector services and MG-SOFT SNMP Trap daemon
(mgtrapd), using the following commands:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_stop_services.sh
/etc/init.d/mgtrapd stop
2. Update the existing installation of MG-SOFT SNMP Trap daemon (mgtrapd) by
using the rpm –Uvh command:
rpm -Uvh mgtrapd-7.x-x.i386.rpm
3. Update the existing installation of MG-SOFT Net Inspector by using one of the
following “rpm –Uvh“ commands:
Option 1: Install/update the complete Net Inspector v10.x installation
rpm -Uvh mgNetInspector_2015-10.x-x.i386.rpm
Option 2: Install/update Net Inspector v10.x distributed modules installation
rpm -Uvh mgNetInspector_dm_2015-10.x-x.i386.rpm
Option 3: Install/update Net Inspector v10.x LITE Edition installation
rpm -Uvh mgNetInspector_lite_2015-10.x-x.i386.rpm
Note: If iptables firewall is running, Net Inspector installation script automatically opens the
relevant TCP and UDP ports which Net Inspector services listen to.
4. If you obtained a new license, copy your license.key file to proper directories:
cp license.key /usr/local/mg-soft/mgtrapd/bin
cp license.key /usr/local/mg-soft/mgnetinspector/bin
5. Restart Net Inspector services to read the license key:
/usr/local/mg-soft/mgnetinspector/bin/mg_ni_restart_services.sh
5.2.4 Installing Java Runtime Environment (JRE) for Linux
Java Runtime Environment (JRE), version 6.x (a.k.a. 1.6.x) must be installed on all
computers that will run Net Inspector Client. JRE for various operating systems can be
downloaded from the following Web page: http://www.java.com/
By default, JRE 1.4.x is installed with RHEL5, however, this version is not compatible
with Net Inspector Client. Net Inspector Client requires JRE 1.6.x (a.k.a. 6.x) or later
version. This section describes how to install JRE 1.7.x on RHEL5 and configure it
either for use with Net Inspector Client exclusively, or make it the system-wide default
version of JRE (used for all Java applications).
Note: Provided example is for JRE 1.7u51 for x86. Please change the commands accordingly for
installing a different version of JRE.
 38
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
1. Login as root. This will allow you to install Java system-wide (/usr/local/).
2. Download the Java for Linux RPM installation package
(e.g., jre-7u51-linux-i586.rpm) from the following web page:
http://www.java.com/en/download/linux_manual.jsp?locale=en&host=www.java.com
3. Execute the following command to install the RPM package:
rpm -ivh jre-7u51-linux-i586.rpm
4. Set this version of Java for use with MG-SOFT Net Inspector (2 options):

Set this Java version for use only with Net Inspector. Select this option if
you use other Java applications that require lower JRE version than 1.6. To
apply this setting, execute the following command (type everything in one line):
echo "MG_JAVA_BIN=/usr/java/jre1.7.0_51/bin/java ; export MG_JAVA_BIN" >
/etc/mg-soft/mg-java-defs.sh

Set this Java version as the default Java installation on your machine:
Type the following command in one continuous line (no line breaks):
/usr/sbin/update-alternatives --install /usr/bin/java java
/usr/java/jre1.7.0_51/bin/java 500
Execute the following two commands:
/usr/sbin/update-alternatives
/usr/sbin/update-alternatives
--set java /usr/java/jre1.7.0_51/bin/java
--config java
The last command above will prompt you to select the desired Java binary, e.g.:
There are 2 programs which provide 'java'.
Selection
Command
----------------------------------------------* 1
/usr/lib/jvm/jre-1.4.2-gcj/bin/java
+ 2
/usr/java/jre1.7.0_51/bin/java
Enter to keep the current selection[+], or type selection number: 2
Enter the number for the JRE version 1.7 and press Enter.
Verify that the installation was successful:
java -version
This prints out the JRE version information, e.g.:
java version "1.7.0_51"
Java(TM) SE Runtime Environment (build 1.7.0_51-b13)
Java HotSpot(TM) Client VM (build 24.51-b03, mixed mode)
After successfully finishing the installation procedure, you can launch Net Inspector Client
from the Net Inspector Client Java Web Start page and connect it to Net Inspector Server.
For detailed instructions, please refer to Net Inspector Client Getting Started Guide.
 39
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
5.2.5 Installing Mozilla Firefox 3.x on RHEL5
In addition to Java Runtime Environment, Mozilla Firefox 3.0.12 (or newer) Web
browser is required for viewing Net Inspector Performance Manager and NetFlow
reports in Net Inspector Client that is running on Linux. This section describes how to
install Mozilla Firefox 3.x on a RHEL5 computer, either by using the Yum
updater/installer or by manually installing the RPM packages from the RHEL5 DVD.
1. First, check if a version of Mozilla Firefox prior to 3.x is installed on the system
(e.g., rpm –qa | grep firefox). If yes, uninstall it by using the following
command:
rpm -e --force firefox-1.5.0.9-10.el5
The above example is for uninstalling Firefox version 1.5. Please change the command
accordingly for uninstalling a different version of Firefox.
2. Then, install Mozilla Firefox 3.0.12 or newer, as follows:
A) Using Yum RPM Installer:
If you have RHN subscription and access to the Internet, use the Yum RPM
installer/updater facility to install the latest version of Mozilla Firefox. To do this,
run the following commands with root user privileges in a Terminal window:
yum install firefox
B) Manually Installing RPM Packages:
Instead of using the Yum updater/installer, you can install the required modules
manually from the RHEL5 DVD medium using the RPM Package Manager. This
option does not require Internet connection. To do this, insert the RHEL5.4 or
newer DVD medium into the DVD drive, mount the DVD drive (e.g., mount
/dev/hdc /media/cdrom) and use the following commands in a Terminal
window to install all the required modules (dependencies) and Mozilla Firefox 3.x
for Linux (root privileges are needed):
1. Change current directory to directory with i386 RPM modules on RHEL5 DVD
Note: Versions in RPM file names in the examples below are for RHEL_5.5 i386 Server
DVD. For other RHEL 5 releases, please use corresponding versions of RPM packages
available in the used release:
cd /media/cdrom/Server
2. Install dependencies:
rpm -Uvh prelink-0.4.0-2.el5.i386.rpm
rpm -Uvh nss-tools-3.12.3.99.3-1.el5_3.2.i386.rpm
 40
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
rpm -Uvh nspr-4.7.6-1.el5_4.i386.rpm
rpm -Uvh nss-3.12.3.99.3-1el5_3.2.i386.rpm
rpm -Uvh xulrunner-1.9.0.18-1.el5_4.i386.rpm
3. Install Mozilla Firefox 3.x for RHEL5:
rpm -Uvh firefox-3.0.18-1.el5_4.i386.rpm
 41
MG-SOFT Net Inspector — Installation and Configuration
Installing Net Inspector on Linux
5.3 Starting and Stopping Net Inspector Server from Command
Prompt
If you would like to configure any parameters in the Net Inspector Server initialization
file or the Net Inspector Server profiles file, you first need to stop the Net Inspector
Server daemon, then edit the configuration (.ini) file(s) and then start the Net Inspector
Server daemon.
You need the root user privileges to successfully start and stop Net Inspector Server
from the command prompt.

To start the Net Inspector Server (mgniengined), run the following command from
the command prompt:
/etc/init.d/mgniengined start

To stop the Net Inspector Server (mgniengined), run the following command from
the command prompt:
/etc/init.d/mgniengined stop
Note: If using Net Inspector in a clustered environment, you must start and stop Net Inspector
Server from the cluster management software.
 42
MG-SOFT Net Inspector — Installation and Configuration
6
Net Inspector Server Initialization File
NET INSPECTOR SERVER INITIALIZATION FILE
Net Inspector Server initialization parameters are specified in the niengine.ini file.
This initialization file should be located in the workspace directory. When Net Inspector
Server starts up, it reads the initialization parameters from the niengine.ini file,
and initializes itself accordingly. If the niengine.ini file is not present in the
workspace directory, the default initialization parameters are used.
The Net Inspector Server initialization file (niengine.ini) is a plain ASCII file that can
be edited in any text editor. It has the following format:
[section1]
; optional
parameter1
parameter2
parameter3
comment
= value1
= value2
= value3
[section2]
; optional comment
parameter1 = value1
parameter2 = value2
...
The initialization file contains several sections. Every section contains one or more
parameter. Supported sections and corresponding parameters are described below.
6.1 Section [connection]
The [connection] section contains the connection parameters.
The port parameter value determines the TCP port number on which Net Inspector
Server listens to for Client connections. The default value of this parameter is 5221.
The timeout parameter specifies how long (in seconds) the Client will wait for the
Server response (or vice-versa), before generating the timeout signal. The retries
parameter specifies how many times the program re-sends the connection request
after the first timeout.
The extension_port parameter value specifies the TCP port number on which Net
Inspector Server listens to for incoming connections initiated by its program extensions
(e.g., Net Inspector mgmail extension, Performance Manager polling engines, etc.).
The soap_port parameter value specifies the TCP port number on which Net
Inspector Server listens to for incoming connections initiated by Net Inspector
Configuration Browser application. The default value of this parameter is 8080.
 43
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
Example:
[connection]
port = 5221
timeout = 10
retries = 3
extension_port = 5223
soap_port = 8081
6.2 Section [user]
Note: Net Inspector user accounts can be configured in Net Inspector Client, in the Server
Preferences dialog box. For details, please refer to the Net Inspector Client Reference Manual.
The [user] section specifies where the Net Inspector user accounts are defined.
The type parameter determines the source of the user data. Available values are:

txt – the data about users is in a text file.
The dsn parameter specifies the location of the user accounts data.
The default username is admin with the password admin.
Example:
[user]
; available type is: txt.
type = txt
dsn = //workspace/user_config.txt
Example of a text file defining users:
[user]
username=admin
passwd=admin
access=admin
[user1]
username=operator
passwd=operator
access=operator
[user2]
username=guest
 44
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
passwd=guest
access=guest
6.3
Section [config]
The [config] section provides information about the Net Inspector configuration
database, which contains data about the managed objects. The niengine.ini file
can contain more than one configuration section. In this case, sections must be named
according to the following scheme: [config], [config1], [config2],
...[configN], where N ≤ 63.
The value of the type parameter specifies the type of the configuration database.
Valid values are:

txt – the configuration information is stored in a text file,
The dsn parameter specifies the location of the configuration database. The user and
passwd parameters are used for specifying the username and password for accessing
the database (if required).
The passive_resync parameter is used for enabling or disabling the passive
resynchronization of event records maintained by Net Inspector Server and the SNMP
agents on managed objects. The default value of this parameter is false. If the
passive resynchronization is enabled, the resynchronization will occur only if initiated
by the user and immediately after the managed object starts responding to Net
Inspector Server queries; while there will be no resynchronization in case the SNMP
notifications are lost.
The change_gateway parameter controls if Net Inspector Server should change the
gateway for accessing duplicated objects when their state turns from active to passive.
The default value of this parameter is true.
Examples of different configurations:
[config]
type = txt
dsn = //workspace/simpleconfig.txt
passive_resync = true
change_gateway = true
[config1]
type = txt
dsn = //workspace/simpleconfig2.txt
passive_resync = false
change_gateway = false
 45
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
Example of device configuration information specified in a text file (e.g.,
simpleconfig.txt):
Note: All parameters of managed objects (devices) can be configured in Net Inspector Client, in
the managed objects’ Properties window. For details, please refer to the Net Inspector Client
Reference Manual.
[device1]
mstate = 1
hostname = local
ipaddr = 127.0.0.1
type = IP
device_class = 1
poll_profile = default_no_snmp
snmp_access_profile = default
polling_engine = 192.168.0.34
netflow_source = false
[device2]
mstate = 1
hostname = router1
ipaddr = 192.168.69.10
type = IP
device_class = 512
poll_profile = default
snmp_access_profile = default
polling_engine = 192.168.0.1
netflow_source = true
The mstate parameter above designates if the device is being monitored (polled) or
not. Valid values are 1 (monitoring is enabled) and 0 (monitoring is disabled).
In the hostname parameter specifies the hostname of the managed object (device).
The ipaddr parameter specifies the IP address of the managed object (device).
The type parameter specifies the type of the managed device. The valid value is IP.
The device_class parameter specifies the class of the object. Valid values are the
following:






1 = Workstation
2 = Server
4 = Printer
256 = Switch
512 = Router
1024 = Gateway
The poll_profile parameter specifies the name of the polling profile assigned to
the managed object. A valid value can be any polling profile name listed in the
nieprofiles.ini file.
 46
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
The snmp_access_profile parameter specifies the name of the SNMP access
profile assigned to the managed object. A valid value can be any SNMP access
profile name listed in the nieprofiles.ini file.
The polling_engine parameter specifies the IP address of the Net Inspector
Performance Manager polling engine that polls the managed object. If this parameter
is missing, the given managed object is polled by the Net Inspector Server
(mgniegined).
The netflow_source parameter determines whether the managed object is set as a
NetFlow source in Net Inspector. Valid values are true and false.
6.4 Section [action]
Note: Actions and their parameters can be configured in Net Inspector Client, in the system
action objects’ Properties window. For details, please refer to the Net Inspector Client Reference
Manual.
The [action] section specifies where the Net Inspector actions are configured.
The type parameter determines the source of the actions information. Available
values are:

txt – the actions information is in a text file.
The dsn parameter specifies the location of the actions information.
Example:
[action]
; available type is: txt.
type = txt
dsn = //workspace/actionconfig.txt
6.4.1 Defining Actions
A text file that defines Net Inspector actions (e.g., actionconfig.txt) should be
present in the workspace directory.
 47
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
An action is defined with the [actionX] section. If more than one action is defined,
the action sections should be named according to the following scheme: [action1],
[action2],...,[actionN].
The action section contains the following parameters:
The mstate parameter controls if the action functionality (e.g., e-mail sending) is
enabled or not. Valid values are 1 (enabled) and 0 (disabled).
The name parameter specifies the name of the action (action object).
The type parameter above specifies the type of the action (action object). Valid
values are:



CMD - command object
SMS - SMS object
MAIL - mail object
The desc parameter is used for describing the action (action object).
The filter_name parameter specifies the name of the action filter applied to the
action object.
The remaining parameters depend on type of the action, as follows:
CMD:
cmd_line
The system command or the path to the program or
script to be executed on events.
cmd_args
The switches and parameters to be appended to the
command line specified above. It supports using the
reserved words.
auto_term_enable
Controls if Net Inspector will check if started processes
still run and automatically terminate such processes.
Valid values are true and false.
auto_term_timeout
Controls how long (in seconds) Net Inspector waits
before it checks if started processes still run. This setting
is effective only if the auto_term_enable parameter
value is set to true.
SMS:
port
The serial port to which the mobile phone for sending
SMS messages is connected.
speed
The baud rate (speed in bits per second) for
communication with the mobile phone.
 48
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
data_bits
The number of data bits used for each character that is
transmitted and received.
parity
The communication parity setting..
stop_bits
The communication stop bits setting.
phone
The phone number of the SMS message recipient. The
phone number must include the international country
code, the area code or mobile network code (without the
leading zero), and the actual mobile phone number. Do
not prefix the number with the international direct-dial
prefix (which is 00 in most countries (011 in North
America) and sometimes substituted with the plus (+)
sign).
Specifies the contents of the SMS messages. You can
specify the contents of the SMS message by combining
regular text with reserved words.
msg
MAIL:
mail_server_addr
The name or IP address of the SMTP mail server used for
sending e-mails.
mail_server_port
The TCP port on which the SMTP server listens to for
incoming connections.
mail_server_timeout
The timeout value (in seconds) for connecting to the
SMTP server.
user_name
The name of the e-mail sender (e.g., the name of the
e-mail account holder).
user_org
The sender’s organization name.
user_email
The sender’s e-mail address.
user_reply_to
The “reply to” e-mail address.
send_to
The e-mail address of the recipient.
msg_custom_subject
Specifies the contents of the e-mail subject section by
combining arbitrary text and reserved words, which let
you include desired information about events into the email subject.
msg_body_file
The file in which the contents of the e-mail body
section is specified (e.g.,
//Engine/workspace/action3_msg_body.txt)
 49
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
msg_as_html
Enables or disables sending e-mails in HTML format.
Valid values are true and false.
msg_merge_max
Specifies up to how many events triggered within a
particular time frame (defined with the
msg_merge_interval) will be included into one e-mail
message.
msg_merge_interval
Specifies the time frame for merging e-mails.
Example of the contents of the message body section definition file (e.g.,
//Engine/workspace/action3_msg_body.txt):
$FOR_EACH_BEGIN
'$SEVERITY' alarm from '$SOURCE_NAME' at '$DATE_TIME'
('$MESSAGE', cause: '$CAUSE')
$FOR_EACH_END
Reserved Words
a) The following reserved words are available for all events:
$SEVERITY
$SEVERITY_ID
$SOURCE_ID
$SOURCE_NAME
$SOURCE_INFO
$SOURCE_TYPE
$MESSAGE
$MESSAGE_ID
$CAUSE
$CAUSE_ID
$EVENT_TYPE
$EVENT_TYPE_ID
$DATE_TIME
$THRESHOLD
Event severity level (e.g., critical, major,…)
Event severity ID number (2=normal, 4=informational,
8=warning, 16=minor, 32=major, 64=critical)
ID number of event source object (e.g., 65595)
Name of event source object (e.g., MyServer)
Additional information about the source of event
(e.g., Physical Memory)
Type of source object (e.g., IP)
Event message (e.g., Threshold value for storage
usage exceeded)
Event message ID number (e.g., 11007)
Event cause (e.g., Threshold Crossed)
Event cause number (e.g., 549)
Event type (e.g., Equipment)
Event type ID number (e.g., 5)
Date and time of event (e.g., Thu 19 Oct 2006
01:50:28 PM CEST)
Value in case of a threshold event (e.g., 86.774)
b) The following additional reserved words are available for events generated from
received SNMP Trap and SNMP Inform notifications, which are not included in the
built-in notification-to-event mapping table:
$NOTIFICATION
$TIME_STAMP
$AGENT_ADDRESS
$V1AGENT_ADDRESS
$PROTOCOL
$ENTERPRISE
$COMMUNITY
$TRANSPORT
$PORT
$VBCOUNT
Identity (name) of SNMP notification
Notification’s time stamp value
Address of notification sender
SNMPv1 agent address (from SNMPv1 Trap)
SNMP protocol version of notification
Enterprise associated with notification
SNMPv1/v2c community string
Notification’s transport protocol
UDP port of notification receiver
Total number of variable bindings in notification
 50
MG-SOFT Net Inspector — Installation and Configuration
$VB(E)
$VBALL
$SEC_USER_NAME
$SEC_AUTH_PROTOCOL
$SEC_PRIV_PROTOCOL
$SEC_CONTEXT
Net Inspector Server Initialization File
Log E bindings. E can be individual bindings from
the variable bindings list (1,3,19), ranges of
bindings (3-6), or both (1,3-6,19).
Log all bindings
SNMPv3 security user name
SNMPv3 authentication protocol
SNMPv3 privacy protocol
SNMPv3 context name
c) The following for-each loop reserved words are available:
$FOR_EACH_BEGIN
$FOR_EACH_END
Starts the for-each loop
Ends the for-each loop
Every reserved word inside the for-each loop (i.e., between the $FOR_EACH_BEGIN
and $FOR_EACH_END reserved words) is expanded repeatedly for each event that is
merged and sent in one message.
Example of a text file defining actions (e.g., actionconfig.txt):
[action1]
mstate = 0
name = dummy_cmd
type = CMD
desc = command test1
filter_name = critical_events
cmd_line = //Engine/mycmd.sh
cmd_args = $SEVERITY $SOURCE_NAME $MESSAGE
auto_term_enable = true
auto_term_timeout = 30
[action2]
mstate = 1
name = sms test
type = SMS
desc = sms test1
filter_name = critical_events
port = /dev/ttyS0
speed = 19200
data_bits = 8
parity = 0
stop_bits = 1
phone = 38641222333
msg = NIE '$SEVERITY' alarm: '$MESSAGE' from '$SOURCE_NAME' at
'$DATE_TIME'
[action3]
mstate = 0
name = Test mail
type = MAIL
desc = test mail
filter_name = my_filter
 51
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
mail_server_addr = mail.my-company.com
mail_server_port = 25
mail_server_timeout = 10
user_name = [email protected]
user_org = my-company
user_email = [email protected]
user_reply_to = [email protected]
send_to = [email protected]
msg_custom_subject = Net Inspector Engine '$SEVERITY' alarm:
'$MESSAGE' from '$SOURCE_NAME' at '$DATE_TIME'
msg_body_file = //Engine/workspace/action3_msg_body.txt
msg_as_html = false
msg_merge_max = 10
msg_merge_interval = 5
6.5 Section [event]
The [event] section provides the event database information. The type parameter
specifies the type of the event database used. Valid values are:

odbc – event database is accessible via the ODBC interface,
The dsn parameter value is the ODBC data source name of the event database.
The user and passwd parameters are used for specifying the username and
password for accessing the database (if required).
The write parameter determines what events are logged in the event database. Valid
values are:

all – alarms and events are logged,

alarm – only alarms are logged.
The maintenance_type and maintenance_value parameters control the
database maintenance operation. The maintenance_type parameter specifies
whether the maintenance operation is enabled, and if yes, how the database size is
controlled (i.e., by the number of events, or by the age of events stored in the
database). The maintenance_value parameter specifies the max. number of
events or the max. age of events to be kept in the database. The
maintenance_type value also determines the units in which the
maintenance_value is expressed. Valid values of the maintenance_type
parameter are:

days or hours or minutes or seconds – limits the age of events in the database,

count – limits the number of events in the database,

none – disables the database maintenance.
 52
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
Every hour Net Inspector Server checks if the condition for performing the database
maintenance is met. If the condition s met, it carries out the maintenance operation. If the
maintenance_type value is days or hours or minutes or seconds, the
maintenance operation deletes all events older than specified by the
maintenance_value parameter from the events database. If the maintenance_type
value is count, the oldest events are deleted from the database (when required) in order
to keep the total number of events below or at the value of the maintenance_value
parameter.
The statistics parameter determines what statistics about database records is
kept. Valid values of this parameter are:

count – the number of events is kept track of,

count_time – the number of events and their timestamps are kept track of,

none – statistics is disabled.
Example:
[event]
; available type is: odbc
type = odbc
dsn = Net Inspector DataBase
user = NI6
passwd = NI6
; available write types are: all, alarm
write = alarm
; available maintenance types are: days, hours, minutes,
seconds, count, none
maintenance_type = count
maintenance_value = 10000
; avaialble statistics types are: count, count_time, none
statistics = count_time
6.6
Section [log]
The [log] section contains parameters that control the Net Inspector Server logging
behavior.
Net Inspector Server logs messages to the following log files located in the
//workspace/log directory:

niengine.log,

niengine_action.log,

niengine_stat.log,

niengine_trap.log.
 53
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
The system parameter controls what messages related to Net Inspector Server
functioning are logged. Valid values are:

debug – all messages are logged,

notice – all normal (but relevant) messages, warning and error messages are
logged,

warning – only warning and error messages are logged,

error – only error messages are logged.
The system_size parameter controls the size of the niengine.log file. The
maximum value of this parameter is 2 GB, while the default value is 10 MB. The value
of this parameter must be specified in bytes; for example, 10 MB (=10485760 bytes)
needs to be entered as 10485760.
The action parameter controls the logging of Net Inspector Server actions. Valid
values are:

admin – all actions performed by the users with admin access rights are logged,

none – actions are not logged.
The default_size parameter controls the size of the niengine_action.log
and niengine_stat.log log files. The maximum and default value of this
parameter is 2 MB. The value must be specified in bytes.
The stat parameter controls the logging of Net Inspector Server operating statistics.
Valid values are:

all – statistics on Net Inspector Server functioning is logged,

none – statistics on Net Inspector Server functioning is not logged.
The stat_interval parameter value (in minutes) specifies the interval for statistics
logging.
The trap parameter controls the logging of received SNMP notifications. Valid values are:

all – all received SNMP notifications are logged,

none – SNMP notifications are not logged.
The trap_size parameter controls the size of the niengine_trap.log file. The
maximum value of this parameter is 2 GB, while the default value is 10 MB. The value
must be specified in bytes.
The trap_format parameters specifies which details of SNMP notifications are
logged and in what format. This is achieved by using the reserved words, which are:
$NOTIFICATION
$TIME_STAMP
$AGENT_ADDRESS
The identity (name) of the SNMP notification
The notification’s time stamp value
The address of the notification sender
 54
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
$V1AGENT_ADDRESS
$PROTOCOL
$ENTERPRISE
$COMMUNITY
$TRANSPORT
$PORT
$VBCOUNT
The SNMPv1 agent address from the SNMPv1 Trap
The SNMP protocol version of the notification
The enterprise associated with notification
The SNMPv1/v2c community string
The notification’s transport protocol
The UDP port of notification receiver
The total number of variable bindings in the
notification
$VB(E)
Log E bindings. E can be individual bindings
from the variable bindings list (1,3,19),
ranges of bindings (3-6), or both (1,3-6,19).
$VBALL
Log all bindings
$SEC_USER_NAME
SNMPv3 security user name
$SEC_AUTH_PROTOCOL SNMPv3 authentication protocol
$SEC_PRIV_PROTOCOL SNMPv3 privacy protocol
$SEC_CONTEXT
SNMPv3 context name
Example:
[log]
; system log types are: debug, notice, warning, error
system = notice
system_size = 50000000
; action log types are: admin, none
action = admin
default_size = 1200000
; trap types are: all, none
trap = all
trap_size = 70000000
trap_format = $NOTIFICATION($PROTOCOL) $AGENT_ADDRESS $COMMUNITY
$VB(1-3)
; stat types are: all, none
stat = all
; interval is in minutes
stat_interval = 5
6.7
Section [snmp notifications]
The [snmp notifications] section controls the SNMP notification reception.
The port parameter specifies on which UDP port(s) Net Inspector Server listens to
for incoming SNMP notifications. More than one port can be specified, using the
following notation:
port = 6162
port1 = 7000
...
portN = 8000
 55
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
The assign_to_object parameter controls whether the received SNMP notification
messages are assigned to managed objects or not.
Valid values of this parameter are true and false. If the value of this parameter is
true, Net Inspector Server checks the address from which the generic SNMP
notification has been sent and tries to assign the received SNMP notification to the
managed object with the same address. If the managed object with the matching
address exists in Net inspector, its name is displayed in the “Source” field of the alarm
or event that has been created from the notification. If the managed object with the
matching address does not exist in Net inspector, the generic SNMP notification is
either assigned to the SNMP notification system object or silently discarded,
depending on the value of the ignore_unassigned parameter. If the value of this
parameter is false, Net Inspector Server does not assign received SNMP
notifications to managed objects. Whether notifications in this case will be discarded or
converted to events/alarms and displayed depends on the value of the
ignore_unassigned parameter.
The ignore_unassigned parameter controls whether the received SNMP
notification messages that were not assigned to managed objects (because no such
managed objects exist in Net Inspector or because the assign_to_object value is
set to false) are ignored or not. Valid values are true and false.
The unknown_to_alarm parameter controls whether the “unknown” SNMP
notifications are mapped to alarms and thus logged and displayed by Net Inspector or
not. “Unknown” notifications are those SNMP notifications for which neither built-in nor
user-defined trap-to-alarm rules exist in Net Inspector. Note that Net Inspector comes
with a built-in set of rules for mapping the generic SNMP notifications (coldStart,
warmStart, linkDown, linkUp, authenticationFailure, egpNeighborLoss) to alarms/events.
Therefore, the generic SNMP notifications are “known” notifications. Additionally, users can
define their own trap-to-alarm mapping rules for enterprise specific SNMP notifications and
thus make those types of notifications “known” to Net Inspector.
The unknown_to_event parameters controls whether the “unknown” SNMP
notifications are mapped to events or not. If the value of the unknown_to_alarm
parameter is true, then the value of this parameter must also be true.
The unknown_ignore_duplicate parameters controls whether the duplicate
“unknown” SNMP notifications are ignored or not. The default value is true, meaning
that only the first “unknown” SNMP notification of a certain type, coming from a certain
source, will be mapped to a new alarm and event (if the unknown_to_alarm
parameter is true), while all subsequently sent “unknown” SNMP notifications of the
same type (timestamps are ignored) and coming from the same source will not
generate new alarms or events in Net Inspector.
The check_community parameter controls if the community names included in
received SNMP notification messages should be compared with the trap community
names configured for the managed objects the notifications are being assigned to.
Valid values are true and false.
 56
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Initialization File
Example:
[snmp notifications]
port = 6162
port1 = 7000
unknown_to_alarm = true
unknown_to_event = true
unknown_ignore_duplicate = true
assign_to_object = true
ignore_unassigned = false
check_community = false
6.8
Section [snmp agent]
The [snmp agent] section controls the connection with the SNMP agent extension.
The supported parameter controls if the connection between Net Inspector Server
and the Net Inspector SNMP agent extension is enabled or disabled. Valid values are
true and false.
The ipaddr parameter specifies the IP address of the PC running the SNMP agent
extension application.
The downscaleid parameter controls whether the device indices should be
downscaled from 32 to 16 bits. If this parameter is not present or if its value is 0, the
parameter is ignored. If the value of this parameter is in the range 1-6, the index is
downscaled so that the upper 16 bits, which represent the configuration number (0-63),
are copied to the upper N bits of the 16-bit index, where the N is the value of the
downscaleid parameter.
Example:
[snmp agent]
supported = true
ipaddr = 127.0.0.1
downscaleid = 4
 57
MG-SOFT Net Inspector — Installation and Configuration
7
Net Inspector Server Profiles File
NET INSPECTOR SERVER PROFILES FILE
The profiles used by Net Inspector Server to poll managed objects can be specified in
the nieprofiles.ini file. This initialization file should be located in the workspace
directory. When Net Inspector Server starts up, it reads the profiles from the
nieprofiles.ini file, and initializes itself accordingly. If the nieprofiles.ini file
is not present in the /workspace directory, the default profile parameters are used.
The Net Inspector profiles file (nieprofiles.ini) is a plain ASCII file that can be
edited in any text editor. It can contain two types of profiles (sections):

poll profile - contains parameters for polling managed objects by means of
ICMP and SNMP protocols (e.g., polling intervals, monitored OID groups, etc.)

snmp access profile – contains SNMP access parameters used for polling
SNMP agents on managed objects (SNMP version, community names, etc.)
7.1 Section [poll profile]
The [poll profile] section includes a set of parameters for polling managed
objects by means of ICMP and SNMP protocols (e.g., polling intervals, monitored OID
groups, etc.).
The nieprofiles.ini file can contain more than one polling profile section. In this
case, sections must be named according to the following scheme: [poll profile],
[poll profile1], [poll profile2], ...[poll profileN], where N is a
unique polling profile number.
The polling profile sections contain the following parameters:

name – the name of the polling profile,

polling_plan – specifies what protocols are used for monitoring (ICMP, SNMP)
and what OID groups are monitored (when SNMP monitoring is enabled). Valid
values are (more than one value can be specified):


icmp_ping – enables the ICMP Ping polling,

snmp_ping - enables the SNMP Ping polling,

snmp_if – enables monitoring network interfaces on managed objects via
SNMP,

snmp_resources – enables monitoring the managed object system
resources, like the memory consumption, CPU load, etc. via SNMP,

snmp_storage - enables monitoring the data storage units, like the disk
capacity utilization etc. via SNMP,
timeout – specifies the timeout value for ICMP and SNMP queries (in seconds),
 58
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Profiles File

retries – specifies how many times the request will be retransmitted after the
first timeout occurs (applies to both, SNMP and ICMP queries),

ttl – specifies the TTL (Time To Live) value for ICMP packets,

ping_poll_interval – specifies the ICMP in SNMP Ping polling interval (in
seconds),

stat_poll_interval – specifies the polling interval for collecting statistics via
SNMP (in seconds),

resync_interval – sets the alarm resynchronization interval (in seconds). The
alarm resynchronization occurs if the managed object does not respond to queries
within this interval.
Threshold parameters:
Valid value for threshold parameters consists of three numbers separated by comma
(,). The first number controls if the threshold is enabled (1) or disabled (0), the second
and third numbers specify the threshold alarm raise and clear values. The following
threshold parameters exist:

if_inutil_threshold – Controls the interface inbound utilization threshold
values.

if_oututil_threshold – Controls the interface outbound utilization threshold
values.

if_inerrorrate_threshold
threshold values.

if_outerrorrate_threshold – Controls the interface outbound error rate
threshold values.

if_status_threshold – Controls the interface status threshold values.

hr_memoryused_threshold – Controls the memory usage threshold values.

hr_processorload_threshold
values.

hr_storageused_threshold – Controls the storage usage threshold values.
– Controls the interface inbound error rate
– Controls the processor load threshold
Example:
[poll profile]
name = default
polling_plan = icmp_ping,snmp_ping,snmp_if,
timeout = 3
retries = 2
ping_poll_interval = 30
stat_poll_interval = 60
ttl = 64
resync_interval = 120
if_inutil_threshold = 1,80,70
 59
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Server Profiles File
if_oututil_threshold = 1,80,70
if_inerrorrate_threshold = 1,20,10
if_outerrorrate_threshold = 1,20,10
if_status_threshold = 1,1,0
hr_memoryused_threshold = 1,20,10
hr_processorload_threshold = 1,5,2
hr_storageused_threshold = 1,20,10
[poll profile1]
name = fast_test
polling_plan = icmp_ping,snmp_ping
timeout = 10
retries = 3
ping_poll_interval = 10
stat_poll_interval = 15
ttl = 64
resync_interval = 0
7.2 Section [snmp access profile]
The [snmp access profile] section includes parameters for accessing the SNMP
agents on managed objects. It also specifies the community name included in SNMP
notifications sent by SNMP agents.
The nieprofiles.ini file can contain more than one SNMP access profile section.
In this case, sections must be named according to the following scheme: [snmp access
profile], [snmp access profile1], ...[snmp access profileN], where
N is a unique SNMP access profile number.
The SNMP access profile sections contain the following parameters:

name - the name of the profile,

version – specifies the version of SNMP protocol used for querying SNMP agents
on managed objects. Valid values are:

snmpv1

snmpv2c

snmpv3

port – specifies the UDP port number on which SNMP agents on managed
objects listen to for incoming SNMP requests,

read_context – specifies the community name expected by the SNMP agents
for SNMP Get, GetNext and GetBulk operations,

set_context – specifies the community name expected by the SNMP agents
for SNMP Set operation,
 60
MG-SOFT Net Inspector — Installation and Configuration

Net Inspector Server Profiles File
trap_context – specifies the community name included in SNMP Trap
messages sent by the SNMP agents on managed devices. If this parameter is not
specified or if its value is missing, this community name is not checked.
SNMPv3 access profile parameters:

v3_user_name - The name of the SNMPv3 USM user.

v3_context_name - The SNMPv3 USM context name.

v3_not_localize_keys – Controls if the software uses localized or nonlocalized authentication and privacy keys. Valid values are true and false (default).

v3_auth_proto - The SNMPv3 authentication protocol (HMAC-MD5 or HMACSHA).

v3_auth_key – The SNMPv3 authentication security key (hex).

v3_priv_proto - The SNMPv3 privacy protocol (CBC-DES or CFB-AES-128).

v3_priv_key – The SNMPv3 privacy security key (hex).
Example:
[snmp access profile]
name = default
version = snmpv1
port = 161
read_context = public
set_context =
trap_context =
[snmp access profile1]
name = snmpv3_profile
version = snmpv3
port = 161
read_context = public
set_context = private
trap_context = SNMP_trap
v3_user_name = MD5_DES_User
v3_context_name = public
v3_not_localize_keys = false
v3_auth_proto = hmac-md5
v3_auth_key = B65EDE1E0371C43BDFDBB0F189096F15
v3_priv_proto = cbc-des
v3_priv_key = A634AEB72FB4BA9C331FA6BE766311CB
 61
MG-SOFT Net Inspector — Installation and Configuration
8
Net Inspector Performance Manager Initialization File
NET INSPECTOR PERFORMANCE MANAGER INITIALIZATION
FILE
Net Inspector Performance Manager initialization parameters are specified in the
pollingengine.ini file. When Net Inspector Performance Manager Engine starts
up, it reads the initialization parameters from the pollingengine.ini file, and
initializes itself accordingly.
The pollingengine.ini is a plain ASCII file that can be edited in any text editor.
Before editing the file, you need to stop the Net Inspector Performance Manager
Engine service (in Linux use the /etc/init.d/mgperfmngd stop command).
The pollingengine.ini is located in the following directory:
In Linux:
/var/mg-soft/mgnetinspector/mgperfmng
In Windows, the location depends on the Windows version used:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\mgperfmng
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8:
C:\ProgramData\MG-SOFT\Net Inspector\mgperfmng
The initialization file contains several sections containing one or more parameters, as
described below.
8.1 Section [database]
The [database] section contains parameters for accessing the Net Inspector
Performance Manager and NetFlow databases.
The dsn parameter value is the ODBC data source name of the Net Inspector
Performance Manager database.
The nfdsn parameter value is the ODBC data source name of the Net Inspector
NetFlow database.
The user and passwd parameters specify the username and password for accessing
the databases.
The keep_raw parameter controls how long (in days) the raw data (individual
readings without aggregation) will be kept in the Net Inspector Performance Manager
database. The default value is 7 days.
The keep_hour parameter controls how long (in days) the hourly averages will be
kept in the Net Inspector Performance Manager database. The default value is 32
days.
 62
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector Performance Manager Initialization File
The keep_day parameter controls how long (in days) the daily averages will be kept
in the Net Inspector Performance Manager database. The default value is 366 days.
Example:
[database]
dsn = MG-SOFT_PE_DB
nfdsn = MG-SOFT_NF_DB
user = mgpeusr
password = mgpepwd
8.2 Section [net inspector]
The [net inspector] section contains parameters used by Net Inspector
Performance Manager Engine to connect to the Net Inspector Server Engine.
the ipaddress parameter specifies the IP address of the computer running Net
Inspector Server.
The port parameter specifies the TCP port number on which Net Inspector Server
listens to for incoming Performance Manager connections (by default: 5223).
The local_ipaddress parameter specifies the IP address that will be used by the
Performance Manager Engine to connect to Net Inspector Server. This parameter
needs to be configured only when running Performance Manager Engine in a high
availability cluster in order to instruct both (all) instances of Performance Manager
Engine to connect from the cluster’s floating IP address (e.g., in case of a failover
event). This parameter can also be used in non-clustered environments on computers
that have two or more network interfaces or IP addresses assigned in order for the
Performance Manager Engine to always use the specified IP address to connect to
Net Inspector Server.
Example:
[net inspector]
ipaddress = 10.0.3.151
port = 5223
local_ipaddress = 10.0.0.123
8.3 Section [system]
The [system] section controls whether the Performance Manager Engine should
receive SNMP notifications or not (if not, Net Inspector Server can receive them).
the receive_traps parameter specifies if Performance Manager should receive
SNMP Trap and Inform notification messages or not. The default value in a simple
installation (all components of Net Inspector installed on one computer) is false,
while the default value in a distributed setup is true.
 63
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector NetFlow Module Initialization File
Note: For Performance Manager Engine or Net Inspector Server to be able to receive SNMP
Trap and Inform messages, MG-SOFT SNMP Trap service must be installed and running on the
same computer. Net Inspector installer for Windows installs this service automatically, however,
on Linux, you need to install it from a separate RPM package (mgtrapd-x.x-x.i386.rpm), as
described in the Installing Net Inspector on Linux section.
Example:
[system]
receive_traps = true
9
NET INSPECTOR NETFLOW MODULE INITIALIZATION FILE
Net Inspector NetFlow module initialization parameters are specified in the
netflowengine.ini file. When Net Inspector NetFlow engine starts up, it reads the
initialization parameters from the netflowengine.ini file, and initializes itself
accordingly.
The netflowengine.ini is a plain ASCII file that can be edited in any text editor.
Before editing the file, you need to stop the Net Inspector NetFlow Manager engine
service (in Linux use the /etc/init.d/mgnetflowd stop command).
The netflowengine.ini is located in the following directory:
In Linux:
/var/mg-soft/mgnetinspector/mgnetflow/
In Windows, the location depends on the Windows version used:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\mgnetflow
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8:
C:\ProgramData\MG-SOFT\Net Inspector\mgnetflow
The initialization file contains several sections containing one or more parameters, as
described below.
9.1 Section [database]
The [database] section contains parameters for accessing the Net Inspector
NetFlow database.
The dsn parameter value is the ODBC data source name of the Net Inspector NetFlow
database.
The nfdsn parameter value is the ODBC data source name of the Net Inspector
NetFlow database.
 64
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector NetFlow Module Known Ports File
The user and passwd parameters specify the username and password for accessing
the NetFlow database.
The approx_max_db_size_gb parameter value specifies the approximate maximum
size of the NetFlow database in gigabytes (GB). The default value is 200 GB.
Example:
[database]
dsn = MG-SOFT_NF_DB
user = mgpeusr
password = mgpepwd
approx_max_db_size_gb = 200
9.2 Section [netflow_processor]
The [netflow_processor] section contains parameters that controls the NetFlow
engine processing behavior.
The resolve_url_file parameter controls whether the domain names specified in
the known_urls.dat file will be resolved to IP addresses or not. The
known_urls.dat file contains a list of domain names of the 200 world’s most
important Internet sites (e.g., google.com, youtube.com, etc.). By default, Net
Inspector NetFlow Engine resolves each of these domain names to (a list of) IP
addresses in order to ‘identify’ the IP addresses found in the received NetFlow packets
more accurately and quickly by names.
The resolve_url_file_interval_hr parameter controls the interval in hours to
repeat resolving domain names specified in the known_urls.dat file. The default
value is 2.
The list_of_supplemental_ports parameter specifies an array of comma
separated ports above 1024, found in received NetFlow packets that will not be set to
zero. This functionality is also configurable in the known_ports.dat file (the latter
takes precedence over the list_of_supplemental_ports parameter setting).
Example:
[netflow_processor]
resolve_url_file = true
resolve_url_file_interval_hr = 10
list_of_supplemental_ports = 5221,5223,5225,5228
10
NET INSPECTOR NETFLOW MODULE KNOWN PORTS FILE
By default, Net Inspector NetFlow engine ignores the source and destination TCP and
UDP ports above 1024 in collected flows and replaces those ports with the value 0 when
storing flow records in the NetFlow database (to prevent excessive database growth). As
 65
MG-SOFT Net Inspector — Installation and Configuration
Net Inspector NetFlow Module Known Ports File
a consequence, NetFlow Conversation Details web pages generated by Net Inspector
Performance Manager show the “random high port” label for port numbers above 1024
(instead of displaying the actual port numbers). To enable storing and displaying source
and destination TCP and UDP ports greater than 1024, one needs to edit the
known_ports.dat file in the following location:
In Linux:
/var/mg-soft/mgnetinspector/mgnetflow/
In Windows, the location depends on the Windows version used:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\mgnetflow
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8:
C:\ProgramData\MG-SOFT\Net Inspector\mgnetflow
When Net Inspector NetFlow module starts up, it reads the known_ports.dat file
and initializes itself accordingly. If this file is not present in the above path, the
default behavior described above is applied.
The known_ports.dat is a plain ASCII file that can be edited in any text editor. It
lists ports and port ranges above 1024 that are not ignored (each port or port range is
specified in one line), as follows:
To name a port or a port range, use a colon (:) and specify the name of the port or
port range as it will appear in the NetFlow reports (Top N Applications), e.g.;
9991: NetFlow Engine
5221-5225: Net Inspector
If the name is omitted, the port number will appear in the NetFlow reports instead.
Use '#' or ';' for comments.
Example of the known_ports.dat file contents:
5221: NI C/S
5223: NI Ext
5228: NI HTTP
16384-16386: XY
#
#
#
#
MG-SOFT Net Inspector
MG-SOFT Net Inspector
MG-SOFT Net Inspector
Port range used by XY
Server (listening for Clients)
Server (listening for extensions)
Micro HTTP Server (Web Start)
application
After editing the known_ports.dat file, apply the changes by restarting the NetFlow
engine, as follows:
In Linux:
/etc/init.d/mgnetflowd restart
In Windows:
net stop “MG-SOFT Net Inspector NetFlow Manager”
net start “MG-SOFT Net Inspector NetFlow Manager”
 66
MG-SOFT Net Inspector — Installation and Configuration
11
Net Inspector NetFlow Module Known URLs File
NET INSPECTOR NETFLOW MODULE KNOWN URLS FILE
By default, when the Net Inspector NetFlow engine starts up, it reads the
known_urls.dat file and resolves the domain names listed in this file to IP
addresses and stores this information in the NetFlow database. The
known_urls.dat file contains a list of domain names of the 200 world’s most
important Internet sites (e.g., google.com, youtube.com, etc.). By default, Net
Inspector NetFlow Engine resolves each of these domain names to (a list of) IP
addresses via DNS or NBNS in order to ‘identify’ and tag the IP addresses found in the
received NetFlow packets more accurately and quickly with names (NetFlow reports
generated by Net Inspector display the names of endpoints if possible). This behavior
(resolving well known domains to IP addresses) is controlled by the
resolve_url_file parameter in the netflowengine.ini file.
The known_urls.dat file is located in the following directory:
In Linux:
/var/mg-soft/mgnetinspector/mgnetflow/
In Windows, the location depends on the Windows version used:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\mgnetflow
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8:
C:\ProgramData\MG-SOFT\Net Inspector\mgnetflow
The known_urls.dat is a plain ASCII file that can be edited in any text editor.
 67
MG-SOFT Net Inspector — Installation and Configuration Back Up and Restore Net Inspector Configuration and Database
12
BACK UP AND RESTORE NET INSPECTOR CONFIGURATION
AND DATABASE
Net Inspector comes with the mg_ni_backup script that lets you create a backup
copy of the entire Net Inspector configuration (i.e., workspace and related files) and
optionally a backup copy of all Net Inspector databases (event, performance and
NetFlow databases) and save it to a disk archive. The back up operation can be
performed during runtime, i.e., while Net Inspector system is running.
Furthermore, the bundled mg_ni_restore script can restore the entire Net
Inspector configuration and databases from a backup archive.
Note: Back up and restore operations should always be performed by using the same version of
Net Inspector. Restoring a configuration and/or databases from a backup archive created in an
earlier version of Net Inspector is strongly discouraged and may cause Net Inspector to stop
functioning.
12.1 Back Up Procedure
The mg_ni_backup script supports several command line switches, as follows:
Usage: mg_ni_backup [-w][-d][-f path/file.tar.gz][-s][-h][-?]
Options:
-h
-w
-d
-f
-s
Show the usage
Archive Net Inspector workspace (configuration)
Archive Net Inspector database(s)
Save archive to user-specified path*
Silent mode
* The path may contain only US-ASCII characters and must follow the operating system
rules for specifying a valid path.
The default backup archive location is:
Windows:
a) Windows XP, Windows Server 2003:
C:\Documents and Settings\All Users\Application Data\MG-SOFT\Net Inspector\archive\date_time\
b) Windows Vista, Windows Server 2008, Windows 7, Windows Server 2012, Windows 8:
C:\ProgramData\MG-SOFT\Net Inspector\archive\date_time\
Note: date_time is the date and time of archive creation in YYYY-MM-DD_hh-mm-ss format
 68
MG-SOFT Net Inspector — Installation and Configuration Back Up and Restore Net Inspector Configuration and Database
Linux:
/var/mg-soft/mgnetinspector/archive/mg_ni_archive_date_time.tar.gz
Note: date_time is the date and time of archive creation in YYYY-MM-DD_hh-mm-ss format
12.1.1 On Windows
Open a command prompt (CMD) window as administrator.
Change directory to the //Engine/bin, i.e.:
cd “C:\Program Files\MG-SOFT\Net Inspector 10\Bin”
Run the following command to back up the Net Inspector configuration (workspace) and
databases to the default location:
mg_ni_backup –w –d
The above command creates a backup archive in the default folder (exact location
depends on the Windows version used).
12.1.2 On Linux
Root user privileges are required.
Change directory to the //Engine/bin, i.e.:
cd /usr/local/mg-soft/mgnetinspector/bin
Run the following command to back up the Net Inspector configuration (workspace) and
databases to the default location:
./mg_ni_backup.sh –w –d
The backup script creates a backup archive in the default folder. The archive is stored
in a compressed tarball (.tar.gz) file. The archive files are named according to the following
scheme:
mg_ni_archive prefix indicating that this is a Net Inspector backup archive
ws
if present, the archive contains Net Inspector configuration files (workspace)
db
if present, the archive contains a backup of Net Inspector database(s)
date_time
the date and time of archive creation in YYYY-MM-DD_hh-mm-ss format
Example:
mg_ni_archive_ws_db_2015-02-16_15-01-35.tar.gz
Note that it is not necessary to stop the Net Inspector services while creating a
backup.
 69
MG-SOFT Net Inspector — Installation and Configuration Back Up and Restore Net Inspector Configuration and Database
12.2 Restore Procedure
The mg_ni_restore script restores the Net Inspector configuration and databases
(if present in the archive) from a backup archive.
Usage: mg_ni_restore [-s] [-h] path*/mg_ni_archive_file.tar.gz
Options:
-h
Show the usage
-s
Silent mode
* The path may contain only US-ASCII characters
The script stops all relevant Net Inspector services, restores the configuration and
database(s) from the backup archive (if present in the archive), and restarts Net
Inspector services.
12.2.1 On Windows
Note: Back up and restore operations should always be performed by using the same version of
Net Inspector for Window. Restoring a configuration and/or databases from a backup archive
created in an earlier version of Net Inspector is strongly discouraged and may cause Net
Inspector to stop functioning.
Open a command prompt (CMD) window as administrator.
Change directory to the //Engine/bin, i.e.:
cd “C:\Program Files\MG-SOFT\Net Inspector 8\Bin”
Example of a command that restores the Net Inspector configuration (workspace) and
databases from a backup:
mg_ni_restore “C:\ProgramData\MG-SOFT\Net Inspector\archive\2015-02-16_15-01-35”
12.2.2 On Linux
Note: Back up and restore operations should always be performed by using the same version of
Net Inspector for Linux. Restoring a configuration and/or databases from a backup archive
created in an earlier version of Net Inspector is strongly discouraged and may and may cause Net
Inspector to stop functioning.
Root user privileges are required.
Change directory to the //Engine/bin, i.e.:
 70
MG-SOFT Net Inspector — Installation and Configuration Back Up and Restore Net Inspector Configuration and Database
cd /usr/local/mg-soft/mgnetinspector/bin
Example of a command that restores the Net Inspector configuration (workspace) and
databases from a backup archive:
./mg_ni_restore.sh /var/mg-soft/mgnetinspector/archive/mg_ni_archive_ws
_db_2015-02-16_15-01-35.tar.gz
 71
MG-SOFT Net Inspector — Installation and Configuration
13
Configuring SNMP Notification Destination on SNMP Agents
CONFIGURING SNMP NOTIFICATION DESTINATION ON SNMP
AGENTS
To be able to discover devices based on SNMP Trap or Inform notifications received
from them (using the auto configuration feature) and to effectively monitor alarms on
managed objects with Net Inspector, you need to configure the SNMP agents on
managed devices to send SNMP notifications to the computer (IP address) running
Net Inspector Server (simple setup scenario) or a Net Inspector Performance Manager
engine (distributed setup scenario). Otherwise, Net Inspector will not receive those
notifications and consequently will not display and notify you about the corresponding
alarms. For details on configuring SNMP agents on managed objects, kindly refer to
user manuals of the relevant network elements.
 72