Adding a New Application

Select the Add button on the main screen of the Applications tab. The Add Application screen will be displayed.

Complete the following fields and options:

  • Application: Enter the name of the application as you would like it to appear to users and administrators.

  • Type: Select the type of application that you are registering with the Location gateway. The following choices are available: Authentication Server, DNS Server, FTP Server, File Server, Generic Server, Mail Server, or Web Server. Select Generic Server when the application you are registering does not fit into the other categories.

    Your choice will affect the protocols that you may choose from when you add Application Policies.

  • Monitoring Enabled: Select this option to enable monitoring of this application. If you do not select this option, this application can be shared with other locations, but will not be monitored via Reports or in Gateway Viewer.

  • Participates in Secure Network: Select this option to allow this application to be shared over your Corente Services application network. If this option is not selected, you will not be able to share this application like a User Group with other locations. Note that on the Monitoring interface in Gateway Viewer, the application will be listed in the Service Availability Summary section to designate this application as a locally-used application and to differentiate this application from those being shared over the application network, which are listed in the Application Status Summary section.

  • Notification on Failure: Email: Select this option if you would like the application's administrator to receive an email notification if this application should fail. The notification will be sent to the email address supplied in the Owner Email field. If no email address has been entered that field, the notification will instead be sent to the addresses supplied on the Alerts tab for this Location. .

    • Owner Email: Enter the email address of the administrator of this application. All email notifications will be sent to this address. Additionally, this email address will be published to any user in Gateway Viewer that has the appropriate permissions to use this application, so that they can communicate directly with the appropriate administrator, if necessary.

  • Notification on Failure: SNMP: Select this option if you would like to receive an SNMP trap if this application should fail. The SNMP trap will be sent according to the SNMP version and parameters that you specify on the SNMP tab of this Location form.

  • Host Server Name: Enter the DNS name of the server providing this application.

  • Host Server IP: Enter the IP address of the server providing this application.

    Note

    The following network addresses are restricted and cannot be assigned to any hosts on the LAN:

    • 1.1.1.0

    • 1.1.1.1

    • 1.1.1.2

    • 1.1.1.3

  • QoS Settings Inbound: If you would like, choose a QoS entry from the pulldown menu to specify the priority of traffic inbound through the Corente Services Gateway to this application. QoS entry definitions in this menu can be viewed or modified with the Quality of Service (QoS) feature.

  • QoS Settings Outbound: If you would like, choose a QoS entry from the pulldown menu to specify the priority of traffic outbound through the Corente Services Gateway from this application. QoS entry definitions in this menu can be viewed or modified with the Quality of Service (QoS) feature.

    Note

    As when performing any sort of QoS configuration, administrators must be careful when assigning QoS levels because if there is too much high priority traffic, any other traffic with a lower level of priority may become too slow or even be dropped. In addition, you cannot use QoS to prioritize traffic to or from a Corente Client.

After providing basic information about the application, you must use the Modify Application Policies section to register the policies of this application. A policy is essentially a combination of protocol and port number that the application's server uses to communicate with the machines that connect with it, or that the machines use to communicate with the server.

The Application Policies table lists all the policies that you have already added. You may Edit or Delete any policy listed in the table. Click Add to create a new policy.

On the screen that is displayed, enter the following:

  • Protocol: Select the protocol for this policy. The protocols that are available depend on to the Application Type that was chosen for this application.

  • Port: Enter the port number for this policy.

  • Direction: Select the direction of the traffic that you are regulating with this policy. For example, traffic that travels in through the Corente Services Gateway to the server, out through the Location gateway from the server, or both.

  • Administered Application Policy Tests: Application policy tests are tests that are used by the Corente Services Gateway to monitor the application and determine if it is functioning correctly or not. Depending on the test chosen, you will choose thresholds that cause a Warning alarm and a Critical alarm. The types of tests that are available depend on the protocol that you chose for this Application Policy. Each test that you enable will be performed on the application’s traffic once a minute.

    The table lists all the tests that you have already added. You may Edit or Delete any test listed in the table. Click Add to create a new test.

On the screen that is displayed, enter the following:

  • Application Policy Test Name: Select the test you would like to enable from the pull-down menu.

  • Application Policy Test Arguments: When an Application Policy Test Name is selected, this table lists all of the arguments for that test. To modify the variable for an argument, select the argument and click the blue text in the Variable column. You can enter a new value in the field that is provided.

    All Application Types allow you to create policies for ICMP, TCP, and UDP protocols. The following table describes the Policy Tests that you may choose for each of these protocols and what they monitor:

Table 3 Policy Tests for ICMP, TCP, and UDP Protocols

Protocol

Test Types

What Test Monitors

ICMP

ICMP PING

This is a standard test that checks the application server for availability. Warning and critical alarms are based on the latency and loss of test packets.

Roundtrip Latency

This test monitors the average round trip latency of packets sent to and from the applications server.

IP Network Quality

This test estimates network quality by measuring a combination of latency, jitter, and packet loss on traffic samples in an interval. The administrator sets acceptable thresholds for latency (in milliseconds) and loss (in percent of packets in the interval). In addition, the length of the jitter buffer (in milliseconds) is also set as the jitter threshold.

Each traffic sample is evaluated as acceptable or defective in the following manner:

  • If jitter in the sample surpasses the specified jitter threshold, it is treated as a lost packet. If it does not surpass the jitter threshold, the jitter is treated as latency.

  • The latency in excess of the latency threshold and the packet loss in excess of the packet loss threshold are then plugged into an equation that more heavily weights loss against latency.

  • The results of the equation are then compared to an acceptability threshold that is set by the administrator to determine whether the traffic sample is acceptable or defective.

Administrators can specify or use defaults for: Warning and Critical alarm thresholds based on percentage of defective samples in an interval. Interval in seconds over which the percentage of defective samples will be computed. Acceptability threshold (excess packet loss squared times four plus excess latency). Latency threshold. Jitter threshold. Loss threshold.

TCP

ICMP PING

See ICMP PING above.

Roundtrip Latency

See Roundtrip Telephony above.

IP Network Quality

See IP Network Quality above.

TCP Connection

This test monitors the TCP connection of the application.

UDP

ICMP PING

See ICMP PING above.

Roundtrip Latency

See Roundtrip Telephony above.

IP Network Quality

See IP Network Quality above.

UDP Connection

Like the TCP Connection test, but for the UDP protocol.


In addition to the protocols above, some of the Application Types allow you to create policies for application-specific protocols. In addition to the ICMP PING, Roundtrip Latency, IP Network Quality, and occasionally the TCP Connection test, these protocols each have a protocol-specific test:

Table 4 Policy Tests for Application-Specific Protocols

Application Type

Protocol

Test Types

What Test Monitors

Authentication Server

LDAP

LDAP Lookup

This test monitors the response time for LDAP packets sent to the LDAP server.

DNS Server

DNS

DNS Lookup

This test monitors accuracy of the DNS server: you supply a DNS hostname and the IP address that should be returned by the server. In addition, the test monitors the response time and raises a critical alarm when the request has timed out.

FTP

FTP

FTP Handshake

This test monitors the response time for FTP packets sent to the FTP server.

File Server

NETBIOS

File Share

This test measures disk usage percentage. You must supply a share name, username, and password to allow the Corente Services Gateway to log onto the File server.

Mail Server

IMAP

IMAP Handshake

This test monitors the response time for IMAP packets sent to the IMAP server.

POP

POP Handshake

This test monitors the response time for POP packets sent to the POP server.

SMTP

SMTP Handshake

This test monitors the response time for SMTP packets sent to the SMTP server.

Secure IMAP

Secure IMAP Handshake

This test monitors the response time for Secure IMAP packets sent to the IMAP server.

Secure POP

Secure POP Handshake

This test monitors the response time for Secure POP packets sent to the POP server.

Web Server

HTTP

HTTP Transaction

This test monitors the response time of HTTP packets sent to the HTTP server by accessing a specified web page. When an optional Expected Status (string to expect in the first status line of server response) is specified, this test can be used to look for specific HTTP error codes, such as 400. If the string is not found, a CRITICAL alarm is raised. When an optional Expected Expression is specified, the test will search the page returned by the web server for a case-insensitive regular expression. If the specified pattern is not found, a CRITICAL alarm is raised. When an optional Redirection Handling option is specified and the test results in a redirect to another webpage, you can choose to generate no alarm, a WARNING alarm, a CRITICAL alarm, or the redirection can be followed.

HTTPS

Secure HTTP Transaction

Similar to the HTTP Transaction test, but for HTTPS.


When you have finished configuring an Application Policy Test, click OK to store your changes or Cancel to close the window and discard your changes. You may add as many tests to an Application Policy as you would like.

When you have finished configuring an Application Policy, click OK to store your changes or Cancel to close the window and discard your changes. You may add as many Application Policies to a monitored application as is required by that application.

When you have finished configuring an Application, click OK to store your changes or Cancel to close the window and discard your changes. The application will be added to the main screen of the Applications tab.

On the Partners Tab, you can define permissions by including the applications that you register on this screen in tubes. Tubes allow you to specify a set of remote machines and remote applications that are allowed to communicate with your locally-defined applications, so that you can share these applications with specific computers in any other Location.