Sample. Network Integrity Monitor Evaluation. Report by: Bernie Ledwick Network Integrity Service Ltd 17 March 2005 Phone:
|
|
- Diane Rogers
- 8 years ago
- Views:
Transcription
1 Sample Report by: Bernie Ledwick Network Integrity Service Ltd 17 March 2005 Phone:
2 1 Tables. 1.1 Contents. 1 Tables Contents Figures Introduction Overview Constraints Network overview Network Diagram Network description Findings Site Firewall Switch Switch Wireless access points Site Site-2 router Site-3 Wireless Access Point Site Site-3 Router Site-3 Switch Site-3 Wireless access point Site Site-4 Switch 1 Port Latency Environmental Conclusions Appendix A. Network Diagram Figures. Figure 1 Site-1 Firewall 09-Mar to 17Mar... 6 Figure 2 Site-1 Firewall - Mar Figure 3 Switch 2 port 8 16-Mar to 17 Mar... 7 Figure 4 Site-1 Switch 2 port 8 9-Mar to 17-Mar... 8 Figure 5 Switch 2 port 8 - Mar Figure 6 Switch 2 port Mar to 17-Mar... 9 Figure 7 Switch 2 Port Mar to 17-Mar... 9 Figure 8 Site-1 switch 2 port 18 traffic - Feb-Mar Figure 9 Site-1 switch port 18 errors - Feb-Mar Figure 10 Switch 2 Gigabit port Figure 11 Site-4 switch 3 port 4 errors...11 Bernie Ledwick Page 2 19 April 2005
3 Figure 12 Site-4 switch 3 port 9 errors...12 Figure 13 Site-4 switch 3 port 15 errors...12 Figure 14 Conset router ADSL interface Mar Figure 15 Site-2 ISDN - Jan-Feb Figure 16 Site-2 ISDN - 9-Mar-17 Mar...15 Figure 17 Site-3 router ADSL interface 9-Mar to 17-Mar...16 Figure 18 Site-3 router ISDN interface - Feb-Mar Figure 19 Site-3 switch 2 port 3-16-Mar to 17-Mar...17 Figure 20 Site-3 switch 2 gigabit port 2 16-Mar to 17-Mar...17 Figure 21 Site-3 wireless access point Feb-Mar Figure 22 Site-4 switch 3 port 16-9-Mar to 17-Mar...19 Figure 23 Site-4 switch 3 port 24-9-Mar to 17-Mar...19 Figure 24 Site-4 switch 2 port 24-9-Mar to 17-Mar...20 Figure 25 Site-4 Switch 2 port 23-9-Mar to 17-Mar...20 Figure 26 Site-4 switch 1 port 21-9-Mar to 17-Mar...21 Figure 27 Site-4 switch 1 port 24-9-Mar to 17-Mar...21 Figure 28 Site-4 switch 1 port 21 traffic...22 Figure 29 Site-4 switch 1 port 21 errors...22 Figure 30 Site-2 router latency...24 Figure 31 Site 2 router errors on WAN port...24 Figure 32 Site 2 router traffic on WAN port...24 Figure 33 Computer room temperature...25 Figure 34 Network connectivity at Site Bernie Ledwick Page 3 19 April 2005
4 2 Introduction. 2.1 Overview. The background to the report is as follows.. Network Integrity Services Ltd (NIS) were asked by XXX Company to assist them in monitoring various aspects of their network, as issues were being encountered on a regular basis and the IT department resources were fully stretched and finding it difficult to keep on top of the issues as they arose. It was agreed that the evaluation should cover the Site-1, Site-2, Site-3 and Site-4 sites, concentrating on bandwidth usage, ISDN activation and network latency. 2.2 Constraints. All routers and switches at the four sites are being monitored. However, it has not been possible to monitor the Site-1-Site-4 routers during the evaluation as these are maintained by xxx-communications-services-company, rather than yyycommunications-services-company. Two switches in Site-1 (switch6 and switch7) do not appear to be configured to allow monitoring. Bernie Ledwick Page 4 19 April 2005
5 3 Network overview. 3.1 Network Diagram. Please refer to Appendix Network description. The XXX Company branch network is based on a zzz-isp (supported by yyycommunications-services-company) VPN solution, over ADSL with ISDN backup. The main site is Site-1 where all the live servers reside. There are backup servers located in Site-4, with real-time data synchronisation via a high-capacity link between the Site-1 and Site-4 sites. This link is maintained by xxx-communications-servicescompany. Each of the remote sites has a wireless access point and the Site-1 site has two wireless access points. The NIM server was installed at Site-1 and has links back to NIS s servers in Manchester via the internet connection. NIS were provided with a dial-in VPN connection for configuration and monitoring purposes. Bernie Ledwick Page 5 19 April 2005
6 4 Findings. The reports below show anomalous results, which may actually show expected traffic, but may also show underlying issues which would require further analysis to determine the causes. 4.1 Site Firewall. Figure 1 Site-1 Firewall 09-Mar to 17Mar As can be seen on the above graph, the Site-1 firewall network interface is completely utilised for about 8 hours each night from 21:30-07:30. There are times when the firewall is completely utilised during the day, e.g. Monday evening and Tuesday midday. During these periods Internet users will experience reduced performance and the e-commerce applications will also be slow to use for customers. This needs monitoring for a longer period to see if the experience of Monday and Tuesday is repeated. Bernie Ledwick Page 6 19 April 2005
7 Figure 2 Site-1 Firewall - Mar 2005 The above graphs show a significant increase in the throughput of the firewall during the day, with traffic increasing to 400kb/s in the last week. It may be useful to turn on the NIM Internet Usage reporting to identify if the increase is linked to non work related usage of the Internet Switch Port 8. Figure 3 Switch 2 port 8 16-Mar to 17 Mar Bernie Ledwick Page 7 19 April 2005
8 Figure 4 Site-1 Switch 2 port 8 9-Mar to 17-Mar Figure 5 Switch 2 port 8 - Mar 2005 There is a significant amount of traffic on a regular basis on this port, mainly overnight. However, traffic was not apparent in week 10. It is suspected this is related to a backup process, if it is expected to run every day then NIM can be configured to detect the failure of the process as seen during week 10. Bernie Ledwick Page 8 19 April 2005
9 Switch 2 Port 11. Figure 6 Switch 2 port Mar to 17-Mar Figure 7 Switch 2 Port Mar to 17-Mar Significant traffic can be seen on this port over the last 2 days, with no previous traffic. NIM can identify unexpected usage this may simply be a new employee or similar change of use. Bernie Ledwick Page 9 19 April 2005
10 Site-1 switch 2 port 18 Figure 8 Site-1 switch 2 port 18 traffic - Feb-Mar 2005 Figure 9 Site-1 switch port 18 errors - Feb-Mar 2005 There are errors showing on the port in weeks 9-11, which may indicate an issue with cabling or an interface. The user on this port will probably experience poor performance so correcting the issue will improve user satisfaction. Bernie Ledwick Page April 2005
11 Switch 2 Gigabit port 1. Figure 10 Switch 2 Gigabit port 1 Significant, abnormal traffic can be seen over the weekend period. This needs to be explained as it may indicate data being transferred out of the system, or a virus Switch 3. Figure 11 Site-4 switch 3 port 4 errors Bernie Ledwick Page April 2005
12 Figure 12 Site-4 switch 3 port 9 errors Figure 13 Site-4 switch 3 port 15 errors The above ports are showing errors in weeks 9-11, which may indicate an issue with cabling or an interface. See note on Bernie Ledwick Page April 2005
13 4.1.4 Wireless access points. Neither of the wireless access points seems to be utilised, with traffic only being apparent on ap2, yesterday. Bernie Ledwick Page April 2005
14 4.2 Site Site-2 router ADSL interface. Figure 14 Conset router ADSL interface Mar 2005 Traffic can be seen to be reasonably within the limits of the ADSL connection, but there is evidence of some constant 10-15kb/s traffic in weeks 7 and 10. The volume recorded is within the limits for normal activity but may indicate an underlying issue ISDN interface. Figure 15 Site-2 ISDN - Jan-Feb 2005 Bernie Ledwick Page April 2005
15 Figure 16 Site-2 ISDN - 9-Mar-17 Mar There is evidence that the ISDN line is being raised regularly in January and February, less so in March. NIM reports on these instances to NIS and to XXX Co IT staff. Reducing the time that the ISDN is in use for clearly saves money Site-3 Wireless Access Point. This does not seem to be utilised. Bernie Ledwick Page April 2005
16 4.3 Site Site-3 Router Site-3 Router ASDL Interface. Figure 17 Site-3 router ADSL interface 9-Mar to 17-Mar The traffic on the ADSL interfaces seems to be reasonably in the bounds of the ADSL capability, but there has been a marked increase to 15-20kb/s in the underlying traffic this week Site-3 Router ISDN Interface. Figure 18 Site-3 router ISDN interface - Feb-Mar 2005 Bernie Ledwick Page April 2005
17 The ISDN line is being activated on a regular basis for short periods Site-3 Switch Site-3 Switch 2 Port 3 and Gigabit Port 2. Figure 19 Site-3 switch 2 port 3-16-Mar to 17-Mar Figure 20 Site-3 switch 2 gigabit port 2 16-Mar to 17-Mar Abnormal traffic yesterday is showing between these two ports, up to 15:30. N.B. Gigabit port 2 is labelled as being connected to switch5, but we have no record of a switch5 in Site-3. Bernie Ledwick Page April 2005
18 4.3.3 Site-3 Wireless access point. Figure 21 Site-3 wireless access point Feb-Mar 2005 This seems to have been utilised only in weeks 9 and 10. Bernie Ledwick Page April 2005
19 4.4 Site Switches. Figure 22 Site-4 switch 3 port 16-9-Mar to 17-Mar Figure 23 Site-4 switch 3 port 24-9-Mar to 17-Mar Bernie Ledwick Page April 2005
20 Figure 24 Site-4 switch 2 port 24-9-Mar to 17-Mar Figure 25 Site-4 Switch 2 port 23-9-Mar to 17-Mar Bernie Ledwick Page April 2005
21 Figure 26 Site-4 switch 1 port 21-9-Mar to 17-Mar Figure 27 Site-4 switch 1 port 24-9-Mar to 17-Mar It would seem that the switches in Site-4 are daisy chained, e.g. 1->2->3. It may be beneficial to re-arrange the switch connections, so that, as in the case shown above, significant amounts of traffic would not need to visit 3 switches, thus removing a potential performance bottle neck. Bernie Ledwick Page April 2005
22 4.4.2 Site-4 Switch 1 Port 21. Figure 28 Site-4 switch 1 port 21 traffic Figure 29 Site-4 switch 1 port 21 errors This port is showing errors in weeks 9-11, which may indicate an issue with cabling or an interface. Bernie Ledwick Page April 2005
23 5 Latency. In the last few days of the evaluation period, we implemented a latency test of the network to the three remote sites. The test as implemented is a network ping test to the router and a switch at each of the remote locations. Whilst this gives an indication of performance, including packet loss, it can be, in some cases, misleading as routers and switches do not always respond readily to ping requests if they are busy. More sophisticated tests can be implemented, e.g. HTTP round trip timings, depending on what network equipment is available at the remote location. Some thought would be required as to the relevance of this type of information, but one important use could be as a direct comparison between different service providers. A sample output for the performed test is shown below and it can be seen that there is a strong correlation between traffic, CRC errors and slower response times. A small volume of packet loss was observed. All remote sites, except Site-4 connected by Megastream, exhibited similar characteristics, so it would be worth investigating the cause of the CRC errors as this could have performance implications for users at remote sites. Bernie Ledwick Page April 2005
24 Figure 30 Site-2 router latency Figure 31 Site 2 router errors on WAN port Figure 32 Site 2 router traffic on WAN port Bernie Ledwick Page April 2005
25 6 Environmental As well as monitoring the data traffic NIM has been recording the temperature in the computer room. Figure 33 Computer room temperature Problems with the air conditioning during the period are clear to see. NIM alerted staff at XXX Co to the problem allowing them to prevent a serious issue. Bernie Ledwick Page April 2005
26 7 Conclusions. The above findings need to be discussed and investigated, as required, so that XXX Company IT personnel have an understanding of the types of issues that NIM can identify and report. In order for XXX Company to benefit fully from a wider implementation of NIM, some work will be required to more fully document the network (e.g. what is connected to which switch port) and an on-going programme of assessing what issues need to be reported automatically needs to be progressed. During the period covered by the report, NIM identified several issues where money was saved with the ISDN links and a number of issues that were unlikely to be found without NIM and which would have an impact on the user. A number of system processes were identified that need further investigation, and close monitoring if deemed critical. Bernie Ledwick Page April 2005
27 Appendix A. Network Diagram Sample only Figure 34 Network connectivity at Site 1. Bernie Ledwick Page April 2005
Managed Service For IP VPN Networks
LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationwww.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
More informationInternet Services. Amcom. Support & Troubleshooting Guide
Amcom Internet Services This Support and Troubleshooting Guide provides information about your internet service; including setting specifications, testing instructions and common service issues. For further
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationSERVICE LEVEL AGREEMENT
SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the
More informationServer must be connected to the internet via high-speed internet connection.
Server Based System Requirements Database Server Component / Number of users 1-10 Users 11-25 Users 28-50 Users Processor Recommended 4 Cores 6 Cores 8 Cores Processor Minimum 2 Cores 4 Cores 6 Cores Memory
More informationmbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More information3.2 This situation is also experienced by Officers who also need remote access to Council networks.
Report Asset Management Committee 29 September 201 15- BROADBAND ACCESS TO COUNCIL NETWORKS 1. Reason for Report To seek Members' approval to undertake a pilot project which will lead to the introduction
More informationSUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
More informationCan a Data Centre lower your networking costs?
2009 WHITE PAPER Can a Data Centre lower your networking costs? Version 1.0.0 Release 5.0 www.link-connect.com advice@link-connect.com +44 (0)800 0354 777 Link-Connect Services Ltd, Moor Park House, Farnham,
More informationSite2Site VPN Optimization Solutions
XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads
More informationLocal Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
More informationMesh VPN Link Sharing (MVLS) Solutions
XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads
More informationFirewall, Mail and File server solution
Firewall, Mail and File server solution Table of Contents Introduction......2 Overview......3 Detailed description....4 Firewall......4 Other services offered by IPCop:......4 Mail and File Server......5
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationApplication Performance Analysis and Troubleshooting
Exam : 1T6-520 Title : Application Performance Analysis and Troubleshooting Version : DEMO 1 / 6 1. When optimizing application efficiency, an improvement in efficiency from the current 90% to an efficiency
More informationQoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
More informationThis document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
More informationThe Key to Cost-Effective WAN Optimization - White Paper
The Key to Cost-Effective WAN Optimization - White Paper Table of Contents General...3 The Challenges of WAN Link Management in the Datacenter...3 Link Up-time and Business Continuity...3 The Active-backup
More informationUMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationHow to configure DNAT in order to publish internal services via Internet
How to configure DNAT in order to publish internal services via Internet How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationUsing Application Response to Monitor Microsoft Outlook
Focus on Value Using Application Response to Monitor Microsoft Outlook Microsoft Outlook is one of the primary e-mail applications used today. If your business depends on reliable and prompt e-mail service,
More informationData Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
More informationAdvanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationConfigure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
More informationMPLS provides multi-site solution
MPLS provides multi-site solution Executive Summary MPLS (Multi Protocol Label Switching) meets the need for a cost effective solution for voice and data connectivity across multiple sites. Spitfire s
More informationL-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning
L-Series LAN Provisioning Best Practices for Local Area Network Deployment Introduction Scope NComputing s L-series access devices connect to a host computer through an Ethernet interface and IP protocol.
More informationRAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
More informationA Simple Idea: Multiple Carriers, One Point of Contact
A Simple Idea: Multiple Carriers, One Point of Contact Private Network & MPLS Gurus 10 Years of Experience Industry Recognition Experienced Install & Provisioning Support Thousands of Installs Hundreds
More informationCampus Network Best Practices: Core and Edge Networks
Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center dsmith@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).
More informationCampus Network Best Practices: Core and Edge Networks
Campus Network Best Practices: Core and Edge Networks Dale Smith University of Oregon/NSRC dsmith@uoregon.edu This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).
More informationLab Testing Summary Report
Key findings and conclusions: Lab Testing Summary Report March 2012 Report SR120222B AR s Access and Interconnection Vendor Tested: Dual 3G uplinks provide fully redundant WAN connectivity Interoperability
More information1 Network Service Development Trends and Challenges
1 Network Service Development Trends and Challenges Mobility 1. Shift the focus from technology, device, and connectivity to services and user experience. Cloud Computing 2. Shift from single-point security
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationData Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
More informationHow To Implement A Ucmc Communications System
COMMUNICATIONS OPTIONS FOR UTMC Mark Bodger Siemens Traffic Controls Sopers Lane, Poole Dorset, BH17 7ER United Kingdom Tel: +44 (0)1202 782848 Fax: +44 (0)1202 782602 Mobile: +44 (0)7808 822366 Email:
More informationBioCity Nottingham, Pennyfoot Street, NG1 1GF
Description of requirement Invitation To Quote ref BioCity location Your quotation is invited for the supply of internet connectivity and VOIP services in accordance with this ITQ and any attached specifications.
More informationEnterprise Broadband Customer Service Description
BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationVirtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
More informationMonitoring the NTP Server. eg Enterprise v6.0
Monitoring the NTP Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationFigure 41-1 IP Filter Rules
41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1
More informationUniversal Network Access Policy
Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety
More informationNetwork Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
More informationReliable high throughput data connections with low-cost & diverse transport technologies
Virtual Leased Line (VLL) for Communications between Offices Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband Bonding Network
More informationChapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
More informationBuilding integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationHow To Monitor Bandwidth On A Computer Network
Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I sinha@live.in, II nishant@desidoc.drdo.in
More informationTechnical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
More informationTotal solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack
Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive
More informationMeeting the challenge of voice services
Meeting the challenge of voice services Executive Summary Making the most of convergence to bridge the gap between IT networks and traditional telephony. This white paper is aimed at IT support companies
More informationBased on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.
30. VoIP Example 3 (VoIP over VPN) Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel. In this example 3300V
More informationAppendix C Network Planning for Dual WAN Ports
Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:
More informationNetworking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
More information- Introduction to PIX/ASA Firewalls -
1 Cisco Security Appliances - Introduction to PIX/ASA Firewalls - Both Cisco routers and multilayer switches support the IOS firewall set, which provides security functionality. Additionally, Cisco offers
More informationService Descriptions
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
More information4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W
4G Business Continuity Solution 4G WiFi M2M Router NTC-140W Introduction Whether you run a small corner shop, are the plant manager of a factory or manage IT in a corporate office, you ll need a reliable
More informationAscenVision. Successful Story of F1. AscenVision Technology Inc. The Intelligent Network Provider
AscenVision Successful Story of F1 AscenVision Technology Inc. The Intelligent Network Provider Background Formula one racing is all about winning. Only the car first to cross the checker flag is the winner.
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationSURF Feed Connection Guide
SURF Feed Connection Guide Tullett Prebon Information Ltd A wholly owned subsidiary of Tullett Prebon Version 6.0 3 rd August 2005 Contents 1. Introduction...3 1.1 General...3 2. Connectivity via the Internet...4
More informationThe evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
More informationTSC (Total Solution Communications Ltd)
TSC (Total Solution Communications Ltd) 1 Parkway Drive, Mairangi Bay, North Harbour Phone: 09 477 2888 Fax: 09 477 2889 E-Mail: info@tsc.co.nz Web: www.tsc.co.nz A vaya IP Office Converged Communications
More informationBandwidth-based load-balancing with failover. The easy way. We need more bandwidth.
Bandwidth-based load-balancing with failover. The easy way. We need more bandwidth. Presenter information Tomas Kirnak Network design Security, wireless Servers, Virtualization Mikrotik Certified Trainer
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationNet Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
More informationBreak Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
More informationHow to Build a Security Dashboard
Building a Security Dashboard Joel M Snyder jms@opus1.com Senior Partner Opus One Agenda What s a Dashboard? How do I build one (part 1)? don t fit in an hour A Security Dashboard Provides
More informationWAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
More informationApplication Description
Application Description Firewall in front of LAN Different Servers located behind Firewall Firewall to be accessible from Internet Load Balancer to be installed in a TRANSPARENT MODE between Firewall and
More informationWhite Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
More informationAvaya IP Office. Converged Communications. Contact Centres Unified Communication Services
Avaya IP Office Converged Communications Streamlining and simplifying communications by bringing your voice, data and Internet all together IP Telephony Contact Centres Unified Communication Services Simplicity
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More informationSingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration
SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN
More informationForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
More informationSystemWatch SM. Remote Network Monitoring
SystemWatch SM Remote Network Monitoring SystemWatch Network Monitoring Service: Real World Experience Sony s SystemWatch network monitoring service uses device and networking monitoring software in conjunction
More informationFatPipe Networks www.fatpipeinc.com
WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool
More informationChapter 51 WAN Load Balancing
Chapter 51 WAN Load Balancing Introduction... 51-2 WAN Load Balancer Operating Principles... 51-2 Load Distribution Methods... 51-3 Round Robin Distribution... 51-3 Weighted Lottery Distribution... 51-3
More informationProvider Managed Network Products
Provider Managed Network Products Service Description and Prices LAST UPDATED: 7 July 2014 VERSION 1 Contents 1 Overview... 3 2 Definitions... 3 3 Managed Network Connection... 4 3.1 Features... 4 3.2
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationGigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationAccelerating WAN Performance with Riverbed
Information Technology Accelerating WAN Performance with Accelerating WAN Performance with How this revolutionary technology is improving WAN performance. By Alex Dewar, Head of IT & IM Solutions, Excitech
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationEXINDA NETWORKS. Deployment Topologies
EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: info@exinda.com :: 2005 Exinda Networks Pty Ltd.
More informationFirewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
More informationBeyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
More informationBroadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
More informationMERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable
MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations
More informationWhite Paper: Broadband Bonding with Truffle PART I - Single Office Setups
PART I - Single Office Setups Truffle boosting WAN banwidth and reliability for a single office The Truffle Broadband Bonding Network Appliance enables an SMB (Small and Medium Sized Business) or an enterprise
More information