Avaya Voice Monitoring Manager Kathy New Colorado Springs School District #11.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
SYSTEM ADMINISTRATION Chapter 19
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
CPSC 441 Tutorial - Network Tools 1 Network Tools CPSC 441 – Computer Communications Tutorial.
Hands-On Microsoft Windows Server 2003 Administration Chapter 10 Monitoring and Troubleshooting Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
8/6/2015Auto Attendants 1 Smarter Communications.
Copyright Kenneth M. Chipps Ph.D. How to Use SNMP to Collect Network Data Last Update
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
CISCO NETWORKING ACADEMY Chabot College ELEC ping & traceroute.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
HiVision SNMP Software.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Integrating Microsoft Project with Other Programs
Ch 11 Managing System Reliability and Availability 1.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Thrive Installation.
Configuring the MagicInfo Pro Display
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 11.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Installing and Configuring IIS. Reliable IIS 6.0 uses a new request-processing architecture and application-isolation environment that enables individual.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Installing and Using Active Directory Written by Marc Zacharko.
Tutorial #1. Lab#: 1 Securing your system Lab 1.2: Tenable Nessus Nessus currently works on Windows, Linux, and Mac. It is a vulnerability scanner, which.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
PC Maintenance: Preparing for A+ Certification Chapter 23: Using a Windows Network.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
A Brief Documentation.  Provides basic information about connection, server, and client.
Microsoft Access 2010 Chapter 10 Administering a Database System.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Managing File Resource Using File Server Resource Manager Chapter 9 Advance Computer Network Lecture Sorn Pisey
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
For the benefit of business and people Lotus Notes R6 Training 4 February 2016 IT Division.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Trouble Shooting, Logs, Alarms and Triggers Configuration Example Lucent Security Products Configuration Example Series.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
Basic Edge Core switch Training for Summit Communication.
Module Overview Installing and Configuring a Network Policy Server
Network Tools and Utilities
ICMP ICMP = Internet Control Message Protocol Layer 3
Chapter 6: Network Layer
Chapter 8: Monitoring the Network
Configuration Of A Pull Network.
Windows Server Administration Fundamentals
Presentation transcript:

Avaya Voice Monitoring Manager Kathy New Colorado Springs School District #11

Telecomm Staff’s Network Troubleshooting and Monitoring Geek Tool

Voice Monitoring Manager (VMM): Logs all IP telephone connections and calls. Provides a graphical view of IP connections. Provides data for network staff on Telecomm system health Continuation of network assessment which is a snapshot in time.

Geek Speak SNMP (Simple Network Management Protocol) - a standard for gathering statistical data about network traffic and the behavior of network components RTP (Real Time Protocol) encapsulates VoIP packets for transmission over IP RTCP (Real Time Control Protocol) Protocol that works in conjunction with RTP. RTCP control packets are periodically transmitted by each participant in an RTP session to all other participants. Feedback of information to the application can be used to control performance and for diagnostic purposes.

Installing VMM When possible, install on a separate server. VMM does not play well with other applications. Install application on separate drive from files if possible. A 90 day trial version can be installed Be sure licenses are purchased for the number of endpoints you have.

S8700 Configuration Configure the IP-Options System Parameters Screen. The default Server IP Address is the server address where VMM is loaded

Configure the IP Network Region Form

VMM Server Configuration Ensure port 1099 is available. If it’s not available, the VMM server will attempt to use the following ports: 49177, 51173, or Windows SNMP Agent must be configured to start automatically. Check by going to Select Start, Settings, Control Panel, Administrative Tools, Services.

Check that a SNMP Community ID has been created. The Community ID for your Windows SNMP Agent must match the Community ID defined in the VoIP Monitoring Manager Options dialog box. By default it is public, but it may have been changed. While in SNMP service, select Properties and then the Security tab. If Public does not already exist, add a public ID with Read and Write privileges. Click OK.

Settings on VMM server Logon as local host to VMM server. Go to Start, Run and type mstsc –console. Select the VMM server and then type your logon name and password for server. Right click on VMM server icon at the right of the task bar and click on Show VMM Server

Connect to database: Select File, Connect to database. Enter the Database Server name, Logon Name, and password. The server name can be either a name or an IP address. Default is localhost. Check that the license server is configured.

Under Edit are choices for SNMP settings, Trap settings, Options and Configure Aliases (Friendly names) The server Database has limited storage (about 2Gb). Stores data in SQL Server 2005 Express database for 30 days and or you can upgrade to SQL Server 2005 and it will be stored for 100 days. Can also change configuration for RTCP port, configuration messaging port and client password.

Traps requires an SNMP server to be configured on the network. This will probably need to be coordinated with network staff.

Configure friendly names Create a file in excel with IP address and the Medpro Name in separate columns. Convert to a text file, name it “friendlylabelsclient.ini”and place in the VMM folder on the server. Click on “Toggle Aliases” in VMM to show names instead of IP addresses.

Installing the License Copy license file from Avaya into folder on VMM server. Connect to WebLM Server User name is admin and password is weblmadmin

Type file location or browse to location and click install. Can also add users, change passwords and view license information.

Using VMM

More Geek Speak

Quality of Service: Measure of the level of quality that a service requires. VoIP has 3 main factors: Jitter, Round Trip Time, and Packet Loss. Jitter: Packets arrive out of sequence Jitter Buffer Underrun: when the arrival time of packets increases beyond a specific threshold Jitter Buffer Overun: when too many packets arrive too quickly the jitter buffer may fill and be unable to handle any further packets Packet Loss: IP packets are lost or discarded if time to live is exceeded Round Trip Time: Time needed go to destination and return. One way time should not exceed 200 ms and 500 ms causes noticeable problems.

TTL (Time to live) – Part of IP packet that provides system with time to keep packet before discarding if not deliverable. Number of Sequence Jumps – number of hops between endpoints Max Sequence Jump – number of packets that reached maximum number of hops between endpoints Number Sequence Falls Max Sequence Fall Received Octets

Using VMM

Connect to new Server Export data for sessions Search Graph Report Configure Report Properties Copy report (graphs) List all active endpoints View report for selected endpoints/session System Summary Report Update/Refresh View Results/List (toggle between windows) Display license info at bottom Help o specific item Help documentation Icons Explained

Configure Report Properties

Search You can search endpoints active from a specified time in the past or within a date range. The Advanced Search options enable you to narrow your search to match phone numbers, SIP user names, network addresses, or QoS level.

System Reports

Endpoint Reports (Medpro/gateway Level)

Endpoint Report (per call)

Exported reports ( Excel ) 1st section: Session ID Participant ID Start Time/End Time Receiver IP Address Receiver Phone number Tool/Board type Payload type (codec) Gatekeeper Last Known 802.1p Last known 802.1Q Acoustic echo cancellation Last known DSCP Echo tail length Frame size Media encryption Silence Suppression 2nd section: SessionID Participant ID TimeOffset Jitter RTT Lost Packets Octets RSVP (enabled or disabled) LargestSeqJumps NumberSeqJumps LargestSeqFall NumberSeqFalls TTL MaxJitter JitterBufferDelay JitterBufferOverRuns JitterBufferUnderRuns 3rd Section: Session ID Participant ID HopCount HopTime (ms) HopAddress -

Other Tools: Ping ASA command ping ip xxx.xxx.xxx.xxx board xxxx DOS command ping xxx.xxx.xxx.xxx Trace route Trace-route ip-address xxx.xxx.xxx.xxx board xxxxx DOS command tracert xxx.xxx.xxx.xxx Netstat -a

Questions???