Network Monitoring and Management
Network Monitoring and Management Software
AggreGate Platform

FCAPS Compliance

FCAPS is an acronym for fault, configuration, accounting, performance, security. The term is widely used to describe the full range of network management tasks. This article is intended to explain how the AggreGate Network Manager complies with the FCAPS model.

Being an umbrella IT management system, AggreGate Network Manager covers hundreds of monitoring and management objectives which are implied by FCAPS. While competing systems often require purchasing a suite of diverse products, AggreGate Network Manager includes all NMS modules in a single software package with a very simple licensing model.

The below sections briefly list FCAPS objectives tackled by the Network Manager. However, the underlying AggreGate IoT Platform with its data modeling and visualization capabilities makes it easy to extend any specific installation with other functions matching the FCAPS concept.

Fault Management

Configuration Management

  • Network discovery and provisioning
  • Device configuration backup, restoration and comparison
  • Network inventory and asset management
  • Centralized firmware management
  • Network node configuration database maintenance
  • Configuration compliance management
  • Bulk and scheduled configuration operations
  • Automated software distribution
  • Change management

Accounting Management

  • Tracking detailed network bandwidth usage
  • Tracking network host resources (CPUs, disks, etc.)
  • Calculating aggregated commercial KPIs
  • Business service cost assessment
  • TCO minimization analysis
  • Billing system integration
  • User quotas monitoring

Performance Management

  • Tracking network bandwidth utilization and interface errors
  • Monitoring diverse performance KPIs of applications and network devices
  • Modeling and tracing aggregated performance metrics
  • Deep performance data analysis
  • Historical performance data storage
  • Performance reporting
  • Trend analysis
  • Capacity planning

Security Management

  • Internal role-based network resource access model
  • Security event consolidation
  • Real-time security breach reporting
  • Security auditing
  • Log file analysis
  • Fraud reporting