Usage summary, Vpn discovery, Vpn maintenance – HP Intelligent Management Center Licenses User Manual
Page 45: Vpn discovery vpn maintenance
Usage summary
Depending on the situation, you can use MVM differently. Below is a list of the various situation:
•
VPN network discovery
MVM has just been installed and a network topology needs to be displayed.
◦
◦
VPN configuration is changed.
•
VPN maintenance
To know whether a VPN works normally.
◦
◦
To know whether inter-CE communication in a VPN is normal.
◦
To know whether VPN configuration changes.
•
VPN deployment
To deploy a VPN network.
◦
◦
To adust VPN network structure.
•
VPN performance management
To know VPN traffic in the entire network.
◦
◦
To know VPN traffic for a certain SA service.
VPN discovery
VPN network discovery is needed in the following situations:
•
MVM is used for the first time to display a VPN network.
•
VPN network topology has changed.
You are recommended to follow the procedure: Import devices in a VPN network >> Discover VPN
>> Configure VPN links.
Discover VPN:
1.
Import devices in a VPN network.
MVM manages devices existing in the platform only. For devices not existing in the platform,
you can add them to the platform through the device adding or auto discovery function, and
import them to the MVM as PEs or CEs. For details, refer to Import PE Devices and Import CE
Devices.
2.
Auto discover VPN:
Select related PEs and discover VPN and VPN links existing in the network. For details, refer
to VPN Network Discovery.
3.
Configure Links:
You can manage VPN links discovered through MVM only after performing the following
configurations. You can select VPN links to be managed, or select CEs corresponding to the
VPN links to make a correct view in the MVM topology. For details, refer to Add Link.
VPN maintenance
MVM provides easy operation for maintaining VPN networks, including VPN link configuration
audit, VPN link connectivity audit and VPN monitoring.
Daily maintaining includes: configuration audit and connectivity audit for VPN links, and monitoring
for a VPN network.
Usage summary
45