1 Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer
2 About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure Event Log & Compliance Security Network Monitoring Server Monitoring Desktop Management Helpdesk Active Directory Windows Event Logs Vulnerability Analysis NetFlow Analysis Application Perf Monitoring Asset Management ITIL Service Desk SQL Server Syslog Management Patch Management Network Config Mgmt End User Experience Remote Control Software License Tracking Exchange Server Firewall Log Analyzer Password Management ManageEngine is an IT management vendor focused on bringing a complete IT management portfolio to all types of enterprises
3 The Webinar will discuss: Why network performance management A Network Administrator s wish list Some Cisco technologies you can use for network performance monitoring And a brief on Cisco Flexible NetFlow NetFlow Analyzer and Cisco Technologies
4 Why Network Performance Monitoring Network connectivity and business application uptime are the keywords today Increasing bandwidth but more applications and services in the network Save capex Hold the extra bandwidth or the WAN optimization device you planned Business critical applications have to compete with rogue applications in many networks Planning for VoIP Can your current links do it?
5 A Network Administrator s Wish List
6 A Network Admin s Wish List Need a Capacity Planning Report Is Peer to Peer apps using bandwidth? Traffic Analytics Manage available Bandwidth? What caused the Bandwidth Spike? Network Admin Can the existing link carry Voice Traffic? Is the Network Secure? How will the data traffic perform?
7 A Network Admin s Wish List Bandwidth Monitoring - Analyze link usage - Visualize traffic patterns - Real-time traffic reports Traffic Analytics WHO Traffic Source and related Conversations WHEN Real Time Traffic Graphs to Forever History WHAT Applications and Protocols Used WHERE Traffic Destination and related Conversations Capacity Planning - Existing link meets demand? - Increase available Bandwidth?
8 A Network Admin s Wish List Bandwidth Monitoring - Analyze link usage - Visualize traffic patterns - Real-time traffic reports Traffic Analytics Traffic Source and related Conversations Real Time Traffic Graphs to Forever History Applications and Protocols Used Traffic Destination and related Conversations Capacity Planning - Existing link meets demand? - Increase available Bandwidth?
9 A Network Admin s Wish List Layer 7 Analysis and Traffic Management Analyze Peer to Peer application usage Are unwanted applications using well known ports? Manage, Block or Shape traffic Validate Quality of Service policies
10 A Network Admin s Wish List Measure Link Capability for VoIP Traffic Switching to VoIP to carry Voice Traffic? Can existing link carry the additional traffic? Measure performance of VoIP traffic over the link Available for New Traffic Current Usage
11 A Network Admin s Wish List Link Performance Monitoring How is the WAN link performance Is your ISP delivering as per the SLA? Latency, Jitter, Packet loss, Availability???
12 A Network Admin s Wish List Growing number of Security Threats Threats Threats 70's 80's
13 A Network Admin s Wish List Growing number of Security Threats Is my Network Secure? Are the current firewall rules sufficient? Track network anomalies that may have bypasses firewalls Is your network under attack? Is there a virus spreading or maybe a DDoS attack?
14 Cisco Solutions you can leverage on
15 What Cisco has to help you Cisco s Flexible NetFlow Primary IP Traffic accounting technology Reports on Who, What, When and Where of traffic Helps understand traffic pattern, applications used, top talkers and much more???????? UDP TCP????
16 What Cisco has to help you Source Interface (ifindex) Protocol Source IP Address Destination IP Address Source Port Destination Port ToS
17 A brief about Cisco Flexible NetFlow
18 Cisco Flexible NetFlow What is Flexible NetFlow Uses NetFlow v9 - Allows user defined Key and Non- Key Fields Highly flexible flow export options - Customized traffic monitoring Ability to monitor a wide range of IP packet information which traditional NetFlow did not have
19 Cisco Flexible NetFlow Some Platforms and IOS with Flexible NetFlow Cisco ISR G1 - From 12.4(20)T IOS Cisco ISR G2 Cisco 7200 Cisco ASR1K - All CCO Images - From 12.2(33)SRE - From XE (1)S Cisco CAT 4000 series - SUP Engine 7E Cisco CAT 6000 series - SUP 2T Earl8
20 Cisco Flexible NetFlow NetFlow Performance Impact CPU Utilization 10,000 active flows 7.14 % additional CPU 65,000 active flows % additional CPU Bandwidth Usage Estimate Around 2% to 3% additional bandwidth on the NetFlow enabled device
21 What Cisco has to help you Network Based Application Recognition - NBAR Application Presentation Bitorrent, edonkey, FTP, Kazaa, Skype, SIP Session Transport Network Data Link Data Physical
22 What Cisco has to help you Network Based Application Recognition - NBAR Layer 7 traffic analytics Intelligent Application Categorization Detect Peer to Peer and dynamic port using applications Can work with CBQoS for custom traffic management
23 What Cisco has to help you Class Based Quality of Service - CBQoS Peer to Peer Web VoIP FTP Internet Link Web FTP
24 What Cisco has to help you Class Based Quality of Service - CBQoS Prioritize, limit, block or shape IP traffic Drop unwanted traffic Peer to Peer, IM, etc Ensure delivery of business critical applications
25 What Cisco has to help you Cisco IPSLA IP Service Level Agreement Monitor performance packets reach destination, link performance, availability? RTT, latency, jitter, packet loss, etc Verify if the ISP is delivering as promised Can the link can deliver your data to the destination Can the link carry VoIP traffic?
26 What Cisco has to help you Cisco NetFlow For Security Analytics Valuable information about IP traffic patterns Identify network anomalies, DDoS attacks, spread of malware or viruses Details of attack Offender, Target, Path Helps mitigate attacks that surpasses firewalls and IDS
27 NetFlow Analyzer and Cisco
28 NetFlow Analyzer leverages on Cisco Comprehensive understanding of the Network using Cisco NetFlow Uses NetFlow data for bandwidth and traffic analysis. Visualize traffic pattern with real time graphs. Traffic analytics with application and conversation report. Trend analysis for Capacity Planning.
29 NetFlow Analyzer leverages on Cisco Comprehensive understanding of the Network using Cisco NetFlow
30 NetFlow Analyzer leverages on Cisco Comprehensive understanding of the Network using Cisco NetFlow
31 NetFlow Analyzer leverages on Cisco Comprehensive understanding of the Network using Cisco NetFlow Uses NetFlow data for bandwidth and traffic analysis. Visualize traffic pattern with real time graphs. Traffic analytics with application and conversation report. Trend analysis for Capacity Planning.
32 NetFlow Analyzer leverages on Cisco NBAR Network Based Application Recognition Deep packet Layer 7 Traffic Analysis NBAR reporting via SNMP as well as Flexible NetFlow Identify hosts involved in Peer to Peer Traffic
33 NetFlow Analyzer leverages on Cisco NBAR reporting via Flexible NetFlow
34 NetFlow Analyzer leverages on Cisco NBAR reporting via SNMP
35 NetFlow Analyzer leverages on Cisco Class-Based QoS reporting Validate QoS polices Monitor Class based pre and post policy traffic usage Class based drops Class based queuing Reports for each Match Statement
36 NetFlow Analyzer leverages on Cisco Class-Based QoS reporting
37 NetFlow Analyzer leverages on Cisco Class-Based QoS reporting
38 How NetFlow Analyzer leverages on Cisco Cisco IPSLA VoIP Monitoring VoIP performance analysis using Cisco IPSLA Reports on : Jitter Latency Packet Loss Mean Opinion Score - MoS Compare VoIP reports and Interface level NetFlow reports Identify reason for VoIP quality degradation
39 How NetFlow Analyzer leverages on Cisco Cisco IPSLA VoIP Monitoring
40 How NetFlow Analyzer leverages on Cisco Cisco IPSLA VoIP Monitoring
41 How NetFlow Analyzer leverages on Cisco Cisco IPSLA WAN RTT Reports Link performance analysis using Cisco IPSLA For data packets, reports on : Jitter and Latency Packet Loss and Round Trip Time Link Availability View least performing paths and find which of your links do the worst Prevent possible network issues from becoming an outage
42 How NetFlow Analyzer leverages on Cisco Cisco IPSLA WAN RTT Reports
43 How NetFlow Analyzer leverages on Cisco Cisco IPSLA WAN RTT Reports
44 How NetFlow Analyzer leverages on Cisco Cisco IPSLA WAN RTT Reports
45 NetFlow Analyzer leverages on Cisco Flow based security analytics Network anomaly detection leveraging on NetFlow data Detect anomalies that surpass firewalls and IDS Anomaly classification based on Offender, Target, Path and Problem Real time threat detection using Continuous Stream Mining Engine
46 NetFlow Analyzer leverages on Cisco Flow based security analytics
47 Conclusion Throwing more bandwidth does not always improve performance Utilize technologies available on your Cisco device Find bandwidth used by business critical applications NBAR A hidden technology with wide uses Use QoS to the fullest and ensure they work as expected IPSLA monitoring to measure performance of data and voice Get a 3 rd layer of security beyond firewalls and IDS Use a tool that can leverage on all these technologies ManageEngine NetFlow Analyzer is one
48 Questions? ManageEngine NetFlow Analyzer is used by over 4000 customers worldwide. Visit our website for details:
StableNet - WHITE PAPER Managing End-to-End VoIP Networks Document Ref: - SN_E2E_VoIP_WP_DP002_IV1 Copyright Infosim all rights reserved Author David Poulton COO Infosim (UK) Document Reference SN_E2E_VoIP_WP_DP002_IV1
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
Best Practices for Planning, Deploying and Managing Enterprise VoIP April 2008 Introduction Voice over IP (VoIP) technology has matured rapidly since its inception roughly 10 years ago. Based on this maturity,
WHITE PAPER Service provider Brocade sflow for Network Traffic Monitoring Although both sflow and NetFlow enjoy widespread industry adoption, sflow is the better technology for traffic monitoring. Business
1 High Availability, Security and Peak Performance in Hosted VoIP Deployments Introduction Technical White Paper The hosted VoIP market continues to grow dramatically with more and more providers offering
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
IBM Netcool network management solutions for VoIP Putting service providers on the path to fulfilling the promises of VoIP Highlights Proactively manage the VoIP infrastructure to help avoid problems and
Network Monitoring Based on IP Data Flows Best Practice Document Produced by CESNET led working group on Network monitoring (CBPD131) Authors: Martin Žádník March 2010 TERENA 2010. All rights reserved.
VoIP and IPT Best Practices for Implementation A Guide to Ensuring a Solid Foundation for Unified Communications Executive Summary Gary Audin, Delphi, Inc. Migration is the movement from one place or condition
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
WHITE PAPER Is Your Network Ready For IP Telephony? Straight facts about IP telephony planning and deployment 1. Introduction Enterprises are rapidly adopting IP telephony for cost savings, productivity
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
Create a Secure Private Network for Cloud Computing Learn More: Call us at 877.634.2728. www.megapath.com MegaPath s Secure Private Cloud for Networking Your business may be considering a move to the cloud
Multi-Layered VoIP Security A DefensePro White Paper - Avi Chesla, VP Security Table of Content Abstract...3 What is VoIP...3 VoIP Protocols...4 VoIP Architecture...4 The VoIP Market & Standards...6 The
Top 10 SIEM Implementer s Checklist Operationalizing Information Security Compliments of AccelOps www.accelops.com Table of Contents Executive Summary....................................................................
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, firstname.lastname@example.org Abstract The growing
A CIO's hand guide White Paper Summary This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today's global enterprises. By harnessing the data contained in