What is a remote management service and the use of server remote management?

In theRemote Management Services folder, tasks from the management services of remote servers can be imported.

Information note

The involved environments must use the same major QlikView release (for example, QlikView 12 and QlikView 12 or QlikView November 2018 and QlikView November 2018). If the involved environments use different major releases (for example, QlikView November 2017 and QlikView November 2018), the Remote Management Services cannot be used.

Each connection is set up by the user account of the current Management Service; hence, this account has to be a member of the QlikView Management API security group of the remote system.

Information noteIf the QlikView Management API security group does not exist on the remote system, it must be created.

This function can be used to retrieve tasks between QlikView Publisher (QVP) environments, typically between a test system and a production system. To do this, a link, a remote management service, has to be set up in the production system, towards the test system. Using the link, tasks can be pulled from the test system into the production system. Since the test system usually has its own set of folders and servers, and other folders and servers are used in production, the test items have to be mapped to the production items. The link and the map are set up once only. Hence, when importing the tasks, the retrieval and mapping are performed automatically.

Import Task

Information noteThe Remote Management Services cannot be used to import Supporting Tasks.

Supporting Tasks

Information noteWhen importing a task, triggers of the type On Event from Another Task are excluded (that is, not imported). To keep such triggers, all tasks have to be imported as described in Import task.

Triggers

Import Task

Functions

Add

To create a Remote Management Service entry, click on the Add icon,

What is a remote management service and the use of server remote management?
, to the right in the pane, and enter the URL in the new text box. The new entry will be available in the tree view in the left pane.

Default value: http://remotehost:4799/QMS.

Delete

To entirely remove a configured entry from the list, click on the Delete icon,

What is a remote management service and the use of server remote management?
.

Apply

Select Apply to confirm the change.

Cancel

Select Cancel to revert the change.

View

To view or configure the settings of a Remote Management Service, in the right pane, click on the entry in the tree view. Each entry contains the following tabs:

ISA Server 2004 Remote Console ISA Server 2004 firewall administrators can install the same ISA Server 2004 management console that's used on the firewall machine itself on a management station anywhere on the network. The remote management console can also be used to manage multiple ISA Server 2004 firewalls. This greatly simplifies management of multiple firewalls. The firewall administrator can connect to multiple firewalls, and each firewall's name will appear in the left pane of the console, which is easy to navigate. In contrast, Web-based management interfaces provided by other vendors often require that the firewall administrator have many browser windows open and then try to manage the firewalls through each of these windows.

Remote Desktop Protocol Management Another effective method for managing one or multiple ISA Server 2004 firewalls is with the Remote Desktop Protocol (RDP). You can use RDP to manage the ISA server via the terminal services client installed on Windows 2000 and previous operating systems or via the Remote Desktop Connection client built into Windows XP and Server 2003. This allows the ISA Server 2004 firewall administrator to connect to the local console of one or more firewalls over the network. While the Remote Desktop client requires that you open multiple windows in order to connect to multiple ISA Server 2004 firewalls, you can use the Windows Server 2003 Remote Desktops utility to manage multiple firewalls in a single RDP interface and move between machines by clicking on the name of the firewall in the left pane of the console.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836197500101

Cloud security and forensic readiness

Chaz Vidal, Kim-Kwang Raymond Choo, in The Cloud Security Ecosystem, 2015

2.3.4 Insecure interfaces and APIs

Remote management of Cloud Services infrastructure is typically done over secure Web services but there may be inherent vulnerabilities in these interfaces that may be exploited by would-be attackers. These vulnerabilities are usually reported on and addressed by vendor-released patches to that are then implemented on the IaaS platform.

It has been observed that Company A has strong authentication mechanisms for management access to the IaaS platform using SSL-encrypted Web management front ends. Access to hosted VMs utilizes standard operating system connectivity such as the Remote Desktop Protocol and SSH.

There is an established patching and remediation process for the IaaS platform but there is no observed regular schedule for this patching process. The patching and remediation of the IaaS service are performed on an ad-hoc basis if and when vulnerabilities are discovered and patches released.

There are also regular security scans of the overall IT environment and not just the IaaS hosted VMs. These scans would sometimes reveal vulnerabilities in running applications that would then be remediated by regular VM operating system patching or ad-hoc application patching as the need and criticality arises.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128015957000185

ISA 2004 Network Concepts and Preparing the Network Infrastructure

Dr.Thomas W. Shinder, Debra Littlejohn Shinder, in Dr. Tom Shinder's Configuring ISA Server 2004, 2005

Computer Sets

The Computer Set Network Object is a collection of IP addresses for computers that have a common function or purpose. For example, you might create a computer set for all the servers on your network that never have logged-on users, or you might create a computer set for all non-Windows machines that do not support the Firewall client and you still need some measure of access control.

There are three default Computer Sets:

Anywhere

IPSec Remote Gateways

Remote Management Computers

The Anywhere Computer Set includes all addresses in the IPv4 address range. You can use this Computer Set when you need to allow communications for broadcast-based protocols. For example, when you want to make the external interface of the ISA firewall a DHCP client, you can use the Anywhere Computer Set to allow the client to broadcast a DHCP Request message.

The IPSec Remote Gateways Computer Set is automatically populated when you create a site-to-site VPN connection using IPSec tunnel mode. You should not need to manually add entries into this Computer Set because the Remote Site VPN Wizards do the work for you.

The Remote Management Computers Computer Set is used by the ISA firewall's System Policy to allow connections from machines running the ISA remote MMC console. You can manually add your remote management computers by doing the following:

1.

In the Microsoft Internet Security and Acceleration Server 2004 management console, expand the server name, and then click the Firewall Policy node.

2.

In the Task pane, click the Toolbox tab. Click the Network Objects link.

3.

Click the Computer Sets folder.

4.

Click the Remote Management Computers icon, and click the Edit menu.

5.

Click Add in the Remote Management Computers Properties dialog box. Click the Computer, Address Range or Subnet entry from the fly-out menu.

6.

Fill out the information in the New Rule Element dialog box, and click OK.

7.

Click Apply to save the changes and update the firewall policy.

8.

Click OK in the Apply New Configuration dialog box.

You can also create your own computer sets. We typically create Computer Sets for servers that do not have logged-on users. For example, your organization is operating a high-security environment and you require authentication for all inbound and outbound access. To meet your high-security requirements, you install the Firewall client on all your client operating systems.

The problem is that some of your servers do not have logged-on users, such as your outbound SMTP relay or Exchange Server. In order for these machines to access the Internet while at the same time exerting some level of access control, you can use a Computer Set and add the machines that do not have logged-on users to the Computer Set.

You can create a new Computer Set by performing the following steps:

1.

In the Microsoft Internet Security and Acceleration Server 2004 management console, expand the server name, and then click the Firewall Policy node.

2.

In the Task Pane, click the Toolbox tab. Click the Network Objects link.

3.

Click the Computer Sets folder.

4.

Click the New Menu.

5.

In the New Computer Set Rule Element dialog box, enter a name for the set in the Name text box. In this example we'll name it Mail Relays.

6.

Click Add. Select Computer, Address Range, or Subnet. In this example we'll select Computer.

7.

In the New Computer Rule Element dialog box, enter a name for the Computer Set in the Name text box. In this example, we'll name it BORAX. In the Computer IP Address text box, enter the IP address of a server belonging to this group. You can use the Browse button if you don't remember the IP address, but the address must be resolvable via DNS. Enter a description for the Computer in the Description (optional) text box. Click OK. You can see an example for Creating a New Network Set Network Object in Figure 4.41.

What is a remote management service and the use of server remote management?

Figure 4.41. Creating a New Network Set Network Object

8.

Click Apply to save the changes and update the firewall policy.

9.

Click OK in the Apply New Configuration dialog box.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836197500113

Availability and Reliability Requirements in the IoT

Tyson Macaulay, in RIoT Control, 2017

Remote Diagnostics and Management

A major element of reliability and availability will be linked to touchless maintenance and operation. IoT devices and gateways especially will need to operate for long periods of time without physical (hands-on) maintenance or technical support to resolve problems. The only alternatives to hands-on servicing are either self-diagnostics and repair or remote diagnostics and resolution by the system itself or by human operators.

In all likelihood, remote diagnostics and management will be a combination of automated and semiautomated capabilities that are supplied by multiple, coordinated parts of the IoT service. For instance, different capabilities will need to come from different service providers in order to effectively discover and trace problems.

Access to diagnostic and reporting information from the many different parts and service providers in any IoT is a critical requirement, and this access should be built into agreements and SLAs by customers. Otherwise, tracing problems associated first and foremost with availability and reliability will be difficult, expensive, and time consuming. This is a major point of evolution in IoT requirements from traditional IT requirements, where disparate reporting from different service providers is the norm rather than the exception.

Today in IT systems it is very common to encounter a system problem, and, in the course of trying to resolve the issue, the different service providers (both internal and external) will simply point fingers at each other as the clock runs. The application guys blame the server (platform) guys. The platform guys blame the network guys. The network guys blame the carrier. The carrier blames all the others. And nothing gets fixed because there is no consolidated reporting from all these systems and service providers rapidly understand to where the fault actually occurred.

As often as not, the system fault is due to cascading and converging issues from multiple systems—to fix the problem you need to adjust two or more systems, neither of which in or of themselves actually appears to be failing!

This is a major risk to any IoT service: the effective and efficient diagnosis and tracking of system problems when there are multiple service providers and manufacturers.

In any complex system involving multiple providers, it is a well-known condition that service failures and degradations are first blamed on the interdependent service providers. The buck gets passed. Without good remote diagnostics, it becomes very difficult to be conclusive about where in the service a failure has occurred, and without good diagnostics to prove a failure has occurred in a given part of the systems (endpoint, gateway, network, cloud), getting providers to assume responsibility will be very difficult and inflict delays.

A significant operational requirement in the IoT will be defining sufficient diagnostics capabilities for all parts of the system with enough detail to manage interdependencies in the service efficiency without inflicting too much additional cost. Because most diagnostic tools and logs can create more information management requirements and data storage demands, it can raise costs.

Risk managers in the IoT must break down the different elements of the IoT services and understand what diagnostics are required and available from each distinct element and/or service provider (see Fig. 8.1). Even within the major IoT element categories, there will be subservices. For instance:

What is a remote management service and the use of server remote management?

Figure 8.1. Diagnostic data sources in the IoT.

Endpoint devices: define the remote diagnostics and maintenance capabilities

Gateway devices: define the remote diagnostics and maintenance capabilities

Network

Physical network platform: define the remote diagnostics and maintenance capabilities

Network as a service platform: define the remote diagnostics and maintenance capabilities

DC/cloud

Infrastructure as a Service (IaaS): define the remote diagnostics and maintenance capabilities

Platform as a Service (PaaS): define the remote diagnostics and maintenance capabilities

Software as a Service (SaaS): define the remote diagnostics and maintenance capabilities

Logging and aggregated reporting across all service elements

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978012419971200008X

Introduction to Sniffer Pro

Robert J. Shimonski, ... Yuri Gordienko, in Sniffer Pro Network Optimization and Troubleshooting Handbook, 2002

What Is a Hub?

A hub is a device that runs at the physical layer of the OSI model and allows Ethernet networks to be easily expanded. A hub allows for multiple Ethernet cable segments of any media type to be connected to create a larger network that operates as a single Ethernet LAN. Since hubs operate at the physical layer, they have no concept of source and destination addresses. A hub takes all bits received on one port and rebroadcasts them to all other ports.

When devices are connected to a hub, they hear everything that the other devices attached to the hub are sending, whether the data is destined for them or not (see Figure 1.22). Hubs are also sometimes called multiport repeaters. A group of connected hubs is called a collision domain; all hosts on that shared Ethernet LAN use CSMA/CD to compete for transmission.

What is a remote management service and the use of server remote management?

Figure 1.22. Hub Operation

There are many variations between different types of hubs. Passive hubs rebroadcast data, but do not enhance LAN performance or assist in the troubleshooting process. Additionally, active hubs have broadcast features similar to the passive hubs, but provide additional functionality. Active hubs implement store-and-forward technology to watch the data before transmitting it. They have the ability to repair certain “damaged” frames and retime the distribution of the other frames. Although retiming frame delivery slows overall network performance, it is often preferable to data loss. If an active hub receives a weak signal, it regenerates the signal before broadcasting it. Some active hubs also provide additional diagnostic capabilities.

NOTE

Intelligent hubs offer remote management capabilities by implementing SNMP. This enables network engineers to remotely monitor network traffic and performance, thereby helping to troubleshoot network ports. Intelligent hubs are also known as manageable hubs.

Designing & Planning…

Ethernet Cabling Considerations.

There are many restrictions on how Ethernet is cabled. To begin with, there are these distance limitations:

10Base2 Maximum of 185 meters.

10BaseT Maximum of 100 meters.

100BaseTX Maximum of 100 meters.

100BaseFX Maximum of 412 meters (half duplex) or 2000 meters (full duplex).

1000BaseLX MMF Maximum of 316 meters (half duplex) or 550 meters (full duplex).

1000BaseLX SMF Maximum of 316 meters (half duplex) or 5000 meters (full duplex).

1000BaseSX Maximum of 316 meters (half duplex) or 550 meters (full duplex).

There are also limitations on the number of repeaters and cable segments allowed between any two stations on the network. There cannot be more than five repeated segments nor more than four repeaters between any two Ethernet stations. This limitation is commonly referred to as the 5-4-3 rule (5 segments, 4 repeaters, 3 populated segments). In other words, any possible path between two stations cannot pass through more than four repeaters or hubs nor more than three populated cable segments.

It is important to note that there is also a maximum number of network devices that can be placed on an unrepeated cable segment. In 10Base2, there can only be 30 devices per unrepeated segment, with a minimum distance of half a meter between T-connectors. In 10BaseT, 100BaseTX, 100BaseFX, 1000BaseLX, and 1000BaseSX, you can have a maximum of 1024 devices.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836579500058

Home Networks

Walter Ciciora, ... Michael Adams, in Modern Cable Television Technology (Second Edition), 2004

25.12.1 Management and Provisioning

One of the main goals of CableHome is to support remote management and provisioning of the home network from a network management system (NMS) that is part of the cable operator's back-office environment. This allows operations to be automated and can be used to enforce consistent practices across all home networks supported by the cable operator. CableHome defines an SNMP MIB for each of the various components of the HA, allowing an SNMP-based NMS to fully manage and provision them. CableHome includes support for secure software download (using TFTP) so that automated procedures can be established to maintain all HA devices at a consistent revision of software.

Figure 25.11 illustrates some of the key concepts in the CableHome model. The home access device contains an SNMP agent that receives commands and reports events to the NMS located at the cable operator headend. The SNMP agent not only interacts with the other components of the HA device but is also in a position to monitor the state of the home network and the LAN IP devices connected to it. For example, it can report address leases granted by its DHCP server and names assigned by its DNS server. However, because the LAN IP devices in the home are typically assigned nonroutable private IP addresses, the NMS has no direct visibility to them. For this reason, a test portal is defined that can ping the LAN IP devices under control of the NMS. The test portal can establish connectivity and speed of data transfer, providing information for remote diagnosis of a problem.

What is a remote management service and the use of server remote management?

Figure 25.11. CableHome management and provisioning model.

In addition, it is possible for the HA device SNMP agent to act as a proxy to allow access to an SNMP agent in the LAN IP device. (This flow is currently undefined in the CableHome specification.)

CableHome 1.0 defines the network management methods in six standard MIBS, allowing the cable operators to build a unified back-office system to manage CableHome devices from multiple vendors.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781558608283500278

Perspectives

Chiara Buratti, ... Andreas F. Molisch, in Inclusive Radio Communications for 5G and Beyond, 2021

10.2.1 Applications

Nowadays we are moving toward a society of fully automated and remote management systems. Autonomous systems are becoming popular in every sector of society, and require to embed cities, vehicles, homes, and industries with millions of sensors. Hence, a high data-rate with reliable connectivity will be required to support these applications. Although 5G will provide better QoS as compared with 4G, it will not have the capacity to deliver a completely automated and intelligent network, that provides everything as a service, and a completely immersive experience. In contrast, it is expected that 6G will be able to jointly meet all the stringent network demands (e.g., ultra-high reliability, capacity, efficiency, and low latency) in a holistic fashion, in view of the foreseen economic, social, technological, and environmental context of the 2030 era. Some key prospects and applications of 6G wireless communication are briefly described below.

Full and immersive experience. This application aims at providing to humans immersive experience with machine/things, making the human-to-machine communication seamless. To this aim, a digital real-time experience that mimics the full resolution of human perception is needed. Extended reality, five-sense communication and haptic communication will be essential for the realization of this full experience. Extended Reality (XR) services, including Augmented Reality (AR), Mixed Reality (MR), and Virtual Reality (ViR), use 3D objects and artificial intelligence as key driving elements. ViR uses headsets to generate realistic sensations and replicate a real environment or create an imaginary world. AR is a live view of a physical real world, whose elements are augmented by various computer-generated sensor inputs; it uses the existing reality and adds to it by using a device of some sort. MR merges the real and the virtual worlds to create new atmospheres and visualizations to interact in real-time. With MR the artificial and real world contents can respond to one another in real-time. XR refers to all combined real and virtual environments and human-machine interactions generated by computer technology and wearables. It brings together AR, ViR, and MR. XR will require a data rate above 1 Tbps, as opposed to the 20 Gbps target defined for 5G. Additionally, to meet the latency requirements that enable real-time user interaction in the immersive environment the per-user data rate needs to touch the Gbps, in contrast to the more relaxed 100 Mbps 5G target. A true XR environment engages all five senses, requesting the communication and transfer of information related to the five senses of hearing, sight, taste, smell, and touch. This technology uses the neurological process through sensory integration. It detects the sensations from the human body and the environment and uses the body effectively within the environment and local circumstances. The research in this field is at a very early stage. Finally, a full experience involves the haptic communication, that is a branch of nonverbal communication that uses the sense of touch: remote users will be able to enjoy haptic experiences through real-time interactive systems. The implementation of haptic systems and applications will be facilitated by the superior features of 6G communication networks.

Industry 4.0. The industry today undergoes a major transformation due to the increasing role of the new technologies - robotics, the IoT, and AI. This revolution, which is often referred to as Industry 4.0, will make it possible to increase productivity and safety, ensure the quality of products, and contribute to reducing material and energy wastage. Automation comes with its own set of requirements in terms of reliable and real-time communication. For example, high-precision manufacturing requires very high reliability - up to the order of 5 nines or more - and extremely low latency - in the order of 0.1 to 1 ms of round trip time. Furthermore, industrial control networks require real-time data transfer and strong determinism, which translates into a very low delay jitter, in the order of 1 μs. While existing technologies, such as LoRa, NB-IoT, and even 5G, could be useful for monitoring purposes, they have issues when it comes to controlling loops. This calls for the design of novel transmission techniques, for example moving to the use of sub-THz and THz bands (allowing extreme high-data rates and low-latency), and the need a precise knowledge of the radio channel in such harsh environments.

eHealth. 6G will revolutionize the health-care sector, eliminating time and space barriers through remote surgery and guaranteeing health-care workflow optimizations. Besides the high cost, the current major limitation is the lack of real-time tactile feedback, together with the challenge to meet the stringent requirements, that are continuous connection availability, ultra low latency (sub-ms), and mobility support. In addition, absorption of radio signals by living tissues, including human and animals, from radio devices operating in the proximity of or inside a body is another concern that hinders wide-spread deployment of these applications.

Unmanned mobility. The evolution towards fully autonomous transportation systems offers safer traveling, improved traffic management, and support for infotainment, with a market of 7 trillion USD. Future transportation scenarios will be characterized by high mobility and involve cars, trains, and unmanned aerial vehicles flying at low altitudes. Connecting autonomous vehicles demands unprecedented levels of reliability and low latency (i.e., above 7 nines and below 1 ms, respectively), even in ultra-high mobility scenarios (up to 1000 km/h), to guarantee passenger safety, a requirement that is hard to satisfy with existing technologies. In addition, the increasing number of sensors per vehicle will demand very-high data rates (e.g., Terabytes generated per driving hour), beyond current network capacity. The 6G system will promote the real deployment of self-driving cars (autonomous cars or driverless cars). A self-driving car perceives its surroundings by combining a variety of sensors, such as light detection and ranging, radar, Global Positioning System (GPS), sonar, odometry, and inertial measurement units. The 6G system will support reliable vehicle-to-everything and vehicle-to-server connectivity. Also UAVs, a.k.a. drones, represent a huge potential for various scenarios. Swarms of drones may be used to provide network connectivity and capacity when and where needed. The ground-based controller and the system communications between the UAVs and the ground will be supported by 6G networks. Full 3D vision of the networks will have to be handled, increasing complexity in comparison to the mainly 2D networks considered in 5G.

Read moreNavigate Down

Read full chapterView PDFDownload book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978012820581500016X

Installation of IIS 7.0

Chris Adams, ... Gene Whitley, in How to Cheat at IIS 7 Server Administration, 2007

Web Management Tools

The Web Management Tools not only install IIS Manager, WMI, and Remote Management Service, but they are also responsible for loading IIS 6.0 Management Compatibility, which is not installed by default. This is important because if you or your developers have older applications that cannot be modified to take advantage of the new architecture, such as those that use Admin Base Objects (ABO) or Active Directory Service Interface (ADSI), you must install IIS 6.0 Management Compatibility so that these applications can be provided with the forward compatibility that they require to run on IIS 7.0. Figure 2.28 shows us installing Web Management Tools along with IIS 6 Management Compatibility with the IIS 6 Management Console and IIS Metabase and IIS 6 configuration compatibility in Windows Vista. Table 2.2 is a listing of the modules that make up the Web Management Tools feature set, along with their descriptions and dependencies.

What is a remote management service and the use of server remote management?

Figure 2.28. Web Management Tools

Table 2.2. Web Management Tools Modules

ModuleDescriptionDepends OnManagementConsoleWeb server management console supporting management of local and remote Web serversConfigurationAPIManagementScriptingProvides the ability to manage a Web server with IIS configuration scriptsConfigurationAPIManagementServiceAllows the Web server to be managed remotely via the Web server management console

ManagementConsole

NetFxEnvironment

ConfigurationAPI

MetabaseInstalls the IIS metabase and compatibility layer—WMICompatibilityInstalls IIS 6.0 SMI scripting interface—LegacyScriptsInstalls IIS 6.0 configuration scriptsMetabase WMICompatibilityLegacySnap-inInstalls IIS 6.0 management console—

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491556500069

Requirements and Risk Management

Tyson Macaulay, in RIoT Control, 2017

Information and Communications Technology

Can the network create new benefits for itself? In other words, will the IoT bring new benefits to itself in some sort of virtuous circle and feedback loop? Well, at the very least the IoT will bring more devices onto the network, creating more demand and (hopefully) more revenues and profit opportunities.

The ICT industry, just to be clear, is typically considered not only telecommunications carriers but also various manufacturers of equipment and software. It might also include certain types of service providers like systems integrators and DC operators.

What is the use of remote server?

Remote servers provide access to shared data and objects in your organization. A user's level of access depends on the security group that the administrator assigns to the user name (client ID) that the user employs to access the remote server.

Which tool is used for the remote management of the server manager?

RSAT enables IT administrators to remotely manage roles and features in Windows Server from a computer that is running Windows 10 and Windows 7 Service Pack 1.

What is WinRM and how IT works?

What is WinRM? Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate.

What is a remote management user?

The Remote Management Users group is generally used to allow users to manage servers through the Server Manager console, whereas the WinRMRemoteWMIUsers_ group is allows remotely running Windows PowerShell commands.