Customer Data Collection Spreadsheet
Pre-populating the Customer Data Collection workbook before adding a new customer will assist you with the onboarding process.
Right click the link below to download the workbook.
The following items in this section will guide you on what is required within each sheet of the workbook.
Customer Details
The following information is required to add a customer into the web portal.
Customer Security Policies
A number of security policies can be enforced within VSM and are administered at the time of creating the customer in the portal.
Customer Features
The following features are available within VSM.
Assignment of these features in the web portal creates a billing contract and the Business Partner will begin to be invoiced for the service by Virsae in accordance with the financial relationship.
Each VSM feature is priced separately. See your Virsae Account Manager for more details.
API and Service Desk are automatically subscribed to, as part of the VSM service
IP Network and Firewall Settings (Legacy Hardware Appliance Only)
The Legacy Hardware Appliance is comprised of a Virtual Machine host and a Virtual Machine, therefore it requires two IP addresses to be administered.
Capture the IP Addresses and additional network details required.
Only the Legacy Hardware Appliance requires two IP addresses (the table above applies only to the Legacy Hardware Appliance).
The Windows Software Client, Linux Virtual Machines and Raspberry Pi only require one IP Address.
IP addresses are recommended to be static or reserved via DHCP
UC Platform Settings
VSM requires access to various interfaces on UC Application Servers to enable the collection of data.
In is most basic form these are normally an SSH Connection on TCP Port 22 and SNMP Traps and SNMP Access on UDP Ports 161/162, however on some applications VSM uses other specific interfaces to collect data such as SFTP
With this in mind it is wise to capture (or have available) at minimum the following information for each UC Application you wish to monitor with VSM:
Item | Description |
---|---|
Name | The name you wish to be displayed in VSM for this server |
IP Address | The IP Address of the administrative interface for this server, this will be used for SSH connections |
Username | The name of the user account you wish VSM to access this server with, bear in mind this may need elevated permissions |
Password | The password for the user account you with VSM to use. |
SNMP Trap details | The Version of SNMP (1,2,3c) you wish the Application to use when sending SNMP Traps to VSM. E.g. the Username and Community string and any Authentication/Privacy protocols and passwords required. |
SNMP Access details | The Version of SNMP (1,2,3c) you wish VSM to use when querying information from the Application. e.g. the Username and Community string and any Authentication/Privacy protocols and passwords required. |
Each of the specific interfaces and steps to configure them are found within the guides below.
Equipment can also be bulk imported into VSM by using the template below: