Application Aware Traffic Engineering and Monitoring
|
|
- Collin Wilkins
- 8 years ago
- Views:
Transcription
1 Course Number Presentation_ID 2000, 1999, 2000, Cisco Cisco Systems, Systems, Inc. Inc. 1 Application Aware Traffic Engineering and Monitoring Session 2000, Cisco Systems, Inc. 2
2 Agenda Challenges, Metrics, and Measurement Strategies Measurement Technologies NetFlow SA Agent Case Studies NBAR ART MIB 3 Traffic Engineering in a Multiservice Network VoIP ERP Multimedia VPN Web/URL Low Latency Low Bandwidth Latency Tolerant Bursty Bandwidth Network Must Provide Each Application With Different Service Level Characteristics Simultaneously 4
3 Application Traffic Engineering Challenges Planning Verify application impact on the network and vice-versa Deployment of new applications and services Gain understanding of traffic flows Utilization and latency dependent on application mix Troubleshooting Bursts in traffic load caused by applications Service degradation Rogue applications that hijack the network Misconfigured applications 5 Application Performance Metrics Responsiveness Availability Throughput Utilization Jitter 6
4 Responsiveness Client Web Browser DNS Request DNS Response DNS Server Si TCP Connect TCP Ack HTTP Request HTTP Response Web Server The response time to fulfill a request for service Measurement based on the start of fulfillment When the server responds with requested data Not all services requested are the same effort 7 Availability X Traffic Destination As a percentage of time the service is actually provided Network service is not busy Network service is not down Network service does not introduce errors As a function of MTBF and MTTR 8
5 PSTN Throughput VPN LAN 48 Kbps 128 Kbps T1 10 Mbps Provisioned 26 Kbps Observed Transmission rate of observed data transport measured in: Bits/bytes per second Packets per second Differences between provisioned and observed due to: Oversubscription of circuit Router utilization Server congestion 9 Utilization Percent of total bandwidth consumed Per interface Per interface by traffic class Per interface by application or protocol 25% 15% 20% 10% 12% 18% 10
6 Delay Variation Jitter Source Destination PBX Network PBX A B C Source Transmits t A B D 1 D 2 = D 1 D 3 = D 2 C Destination Receives t The change in packet interval for sequential packets Source transmits with constant inter-packet interval During network transit, inter-packet interval is affected At destination, variation of inter-packet interval is jitter 11 Performance Measurement Strategies Synthetic Sampling Method Observed Collection Method Embedded Agents External Probes Device/Link Scope of Measurement End-to-End/Path End-to-End/Path User Perspective of Measurement Network 12
7 Sampling Method Definition Actual end-user network traffic where performance is measured by timing specific application traffic flows Advantages Synthetic Most accurate for live application traffic on a specified link Disadvantages Limited to measuring: Existing traffic types, which may not be present on the network at all times Existing traffic patterns, which may not reflect patterns for new or future applications Definition Network traffic generated strictly for the purpose of measuring a network performance characteristic Advantages Observed Measures performance: Between any two points in the network Controllable, on a continuous basis By traffic class based on IP Precedence marking Disadvantages Only an approximation for performance of live traffic 13 Collection Method Definition Mechanisms for collection of network statistics are integrated into the network communication device (e.g., router or switch), itself Advantages Embedded Follows network infrastructure Gathers metrics that can not be observed externally Disadvantages Performance monitoring has device-level performance implications Definition Mechanisms for collection of network statistics are provided by a stand-alone device specifically designed to collect network performance statistics Advantages External Validation of performance performed independent of the devices that transmit network traffic Disadvantages More hardware to administer Observed statistics limited to points of deployment 14
8 Scope of Measurement Device or Link Oriented Definition Performance measurement based on analysis of specific device or device interface, and typically based on utilization rates Advantages Detailed application performance monitoring of critical network links Disadvantages When network-wide performance problems exist, how does one select which device or link to evaluate? Definition End-to-End Performance measurement based on analysis of response time across two or more network devices, and typically based on latency Advantages Starting point performance troubleshooting Reflects end-user experience Disadvantages Prior knowledge of relevant end-to-end paths is needed 15 Perspective of Measurement Definition Measurement based on performance statistics measured at the end-user workstation Advantages User Accurate measurement of end-user experience Disadvantages Scale and distribution issues Intrusive on the desktop Definition Measurement based on performance statistics measured in network devices Advantages Network Easy to deploy, and non-intrusive to the desktop Identifies network performance issue Disadvantages Imperfect understanding of enduser experience 16
9 Application Measurement Technologies 2000, Cisco Systems, Inc. 17 Measurement Technologies NetFlow MEASURES: Device interface traffic rate by s/d IP address, port number or AS ART MIB Application Response Time SNMP MIB MEASURES: Response time of live application traffic to server device Sampling: Collection: Scope: Perspective: Observed Embedded Device/Link Network Sampling: Collection: Scope: Perspective: Observed External Probe End-to-End User/Network SA Agent Service Assurance Agent MEASURES: Latency and Jitter between source router and specified target NBAR Network-Based Application Recognition MEASURES: Device interface utilization by application type or QoS traffic class Sampling: Collection: Scope: Perspective: Synthetic Embedded End-to-End User/Network Sampling: Collection: Scope: Perspective: Observed Embedded Device/Link Network 18
10 Measurement Technologies NetFlow 2000, Cisco Systems, Inc. 19 NetFlow Defined Flows are defined by 7 keys: Source Address Destination Address Source Port Destination Port Layer 3 Protocol TOS byte (DSCP) Input Interface Flows are unidirectional Flows are enabled on a per input-interface basis Flows can be configured on-demand or continuous Flow Data Exported to Management Application 20
11 RMON Accessible Usage Device Interface QoS NetFlow Data Record per Flow Packet Count Byte Count Input Interface Output Interface Type of Service TCP Flags Protocol Source IP Address Destination IP Address Source Prefix Mask Destination Prefix Mask Source AS Number Destination AS Number Source TCP/UDP Port Destination TCP/UDP Port Routing and Peering Application Usage Number of Flows Flow Size Distribution Non-RMON Time Stamp Start Timestamp End Timestamp Call Duration Next Hop Address Lost Datagrams 21 NetFlow Related Applications Network Planning RMON Probe Accounting/Billing Flow Profiling Network Monitoring NetFlow/ Data Export Flow Collectors Management Application End-User Information 22
12 Measurement Technologies SA Agent 2000, Cisco Systems, Inc. 23 Service Assurance (SA) Agent Defined Head Office LAN Router Chicago VPN-Gwy-SFO Users wwwin-hr ISP Router New York Branch Office Embedded technology in Cisco IOS devices Synthetic traffic for various protocols Supports IP precedence for QoS Measures latency, jitter and availability RTP Irvine Mass 24
13 Service Assurance Agent Operation Types Operations IOS Release 11.2/11.3 IOS Release 12.0 IOS Release 12.0T/12.1 ICMP Echo (Ping) X X X IP Path Echo X X X LU0/LU2 (3270 Ping) X X X SSCP (SNA) X X X UDP Echo TCP Connect UDP Jitter IP Precedence DNS Name Resolution DHCP Get IP Address DLSw Peer Tunnel HTTP Note: IP precedence can be combined with other operation types to simulate QoS traffic marking 25 X X X X X X X X SA Agent Example of Latency Graph 26
14 Measurement Technologies NBAR 2000, Cisco Systems, Inc. 27 NBAR Network-Based Application Recognition Cisco IOS-based protocol discovery featuring: Measure interface utilization by protocol or traffic class Stateful Inspection for non-symmetric protocols See list of protocols Define QoS traffic classes HTTP traffic by URL or MIME type NBAR Process SNMP or Web Reporting Queue 1 Queue 2 Queue 3 Queue 4 Queue 5 Queue 6 28
15 NBAR Partial List of Protocols Identified Statefully-inspected protocols SQL*Net Sun RPC H.323 MSExchange UNIX r commands VDOLive RealAudio MS Netshow HTTP (via URL/MIME) FTP L4 L7 protocols which dynamically assign TCP/UDP ports Static-port protocols CuSeeMe EGP GRE ICMP IGMP IMAP OSPF BGP DHCP DNS Finger Gopher HTTP IPSec IRC L2TP LDAP NFS NNTP NTP NetBIOS Notes OSPF PCAnywhere POP3 RIP RSVP Secure HTTP SMTP SNMP SOCKS SSH Streamworks TFTP Telnet X Windows Etc. Support for Additional Protocols Is Software Definable 29 NBAR Example of Protocol Discovery 30
16 Measurement Technologies ART MIB 2000, Cisco Systems, Inc. 31 ART MIB Implementation Example Dedicated RMON probes for critical links and highspeed backbones ART monitoring option installed on key probes Application monitoring tools for measuring application performance and response time FE/Gigabit Probe ART TR Probe FDDI Probe FDDI Ethernet Probe ATM Probe ART WAN Probe ART Application Monitoring Tools WAN 32
17 ART MIB Functionality TCP protocols only (1.0) Based upon well-known destination port Default protocols: AOL COMPUSRV DLSW_RD DLSW_WR DNS_TCP DOOM FTP-CTRL FTP-DATA HTTP HTTPS NB_DGM_T NB_NS_T NB_SSN_T NEWS_TCP NNTP NOTESTCP ORACLSQL REALAUD SMTP SNA_TCP SOCKET SQLNET_N SUNRPC_T TELNET XWINDOW Client Latency C Response Time Application Level Response Time SEQ 101 ACK 101 SEQ 102 SEQ 103 SEQ 104 ACK 104 SEQ 105 ACK 105 Network Flight Time Identify Application Example: FTP Packet Level Measurement Server Latency 33 S Server address Number of clients For all (summary) clients: Min/avg/max response time Request/response pair count Response time distribution Client and server octets and overflows Retries Timeouts ART MIB Example of Reporting 34
18 Case Study 1: Troubleshooting Application Response Time Issues 2000, Cisco Systems, Inc. 35 Network Environment Large banking institution Web-based application being used for both internal and external customers Application had been running for several months without problems Organization Four service groups: Firewall group Local application group (proxy server) Network group Application group (application deployment) Internet The network Proxy Server Clients attached to 10 Mbps VLANS Web server access via the Internet Web Server Web access via a proxy server Firewalls running NAT 36
19 Problem Description Upon switching to secured access (HTTPS), users experienced excessive response time problems ( hourglass mode for minutes) All service groups were pointing fingers at each other 37 Technical Analysis Internet Proxy Server ART ART ART Web Server Analyze network traffic TrafficDirector and external probes with ART monitoring were used to profile the network No errors were found on the network Traffic volumes were within acceptable range Client conversations could not be mapped due to NAT Probe 1 Probe 2 Probe 3 Analyze application flow ART Monitor was used to determine response time at each step Average response time Probe 1: 130 ms Average response time Probe 2: 135 ms Average response time Probe 3: 138 ms Response time seemed reasonable, yet the client was still experiencing problems 38
20 The Resolution Internet ART Proxy Server ART ART Web Server Problem Isolation Probe 1 Initial analysis showed no problems Probe 1 was moved between the client and proxy server Significant delays in response time between the client and proxy server TrafficDirector was used to capture and analyze traffic data New proxy server was configured to retrieve the entire page from the web server before sending it to the client Probe 2 Probe 3 Resolution Reconfigured proxy server Response time for the user now acceptable Summary ART Monitor provided insight into the user experience TrafficDirector provided the tools to analyze the details of the problem The groups were able to share information and resolve the problem 39 Case Study 2: Analyzing Application-Network Interaction and QoS Activation 2000, Cisco Systems, Inc. 40
21 Network Environment Workstation configuration tracking /web browsing ERP Home Users 380+ Retail Outlets Dial-in 256K T-1 Frame Relay 128K HQ 56K 56K Bit Bucket 41 Problem Description Existing: PC configuration tracking Maintain consistent software configurations on 3,000+ PCs ERP Manage inventory worth over $400M at over 380 retail locations Manage daily pricing strategies at over 350 retail locations and web access Future: Voice over IP Use data infrastructure to reduce PSTN and cell phone charges Problems: PC configuration tracking congests T-1 Frame Relay from HQ to SP ERP, and web traffic are deprived reasonable bandwidth VoIP deployment to retail outlets is not possible Home users dial-in on 800 number, then use expensive cell phones 42
22 Technical Analysis NBAR is used for: Baseline application utilization QoS traffic class definition Monitoring QoS traffic class utilization 43 Solution: QoS Applied to Traffic Classes Traffic Class PC Configuration ERP and Web VOIP Minimum Guarantee Maximum Guarantee Queue Priority 10% of Link 33% of Link Normal 40% of Link None Normal 10% of Link 20% of Link Normal 15Kbps 15Kbps High 256K T-1 Frame Relay 128K 56K HQ 56K Bit Bucket X 44
23 Application Traffic Engineering Summary Effective traffic engineering requires: Determining which application performance metrics are relevant to the network environment Understanding which measurement strategies are most appropriate for obtaining performance metrics Knowledge of performance measurement technologies that will facilitate each measurement strategy 45 Other Networkers Topics of Interest SLAM presentation SAA presentation Demo at booth CiscoWorks2000 Product Overview 46
24 Application Aware Traffic Engineering and Monitoring Session 2000, Cisco Systems, Inc. 47 Please Complete Your Evaluation Form Session 2000, Cisco Systems, Inc. 48
25 2000, Cisco Systems, Inc. 49
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationNetwork-Based Application Recognition
Network-Based Application Recognition Last Updated: March 2009 Cisco Content Networking delivers the network agility required by the enterprise to deploy new Internet business applications critical to
More informationLab 3.3 Configuring QoS with SDM
Lab 3.3 Configuring QoS with SDM Learning Objectives Configure Quality of Service tools with the SDM QoS wizard Monitor traffic patterns using the SDM QoS interface Topology Diagram Scenario Cisco Security
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationA host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
More informationCisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
More informationCiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationVegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationThe Power of SA as a SLM Tool
1 1 The Power of SA as a SLM Tool Building Scalable SLM Solutions Session 2 Agenda Customer Requirements Solution Overview Available Capabilities Example Deployment Summary 3 Customer Requirements 4 Customer
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationHosted Voice. Best Practice Recommendations for VoIP Deployments
Hosted Voice Best Practice Recommendations for VoIP Deployments Thank you for choosing EarthLink! EarthLinks best in class Hosted Voice phone service allows you to deploy phones anywhere with a Broadband
More informationCiscoWorks Internetwork Performance Monitor
CiscoWorks Internetwork Performance Monitor (IPM) v2.6 Tutorial Introduction 1-1 About This Tutorial Identify the need for network service monitoring tools Describe how to use IPM to configure and monitor
More informationAbout Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationHow To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
More informationCOMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informations@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationBest of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
More informationCopyright 2006 Comcast Communications, Inc. All Rights Reserved.
ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationEnterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationClass of Service Data Collection Document. For AT&T Managed Internet Service (MIS)
AT&T Managed Internet Service (MIS) Class of Service Data Collection Document Class of Service Data Collection Document For AT&T Managed Internet Service (MIS) 2010 AT&T Intellectual Property. All rights
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationHOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide
HOSTED VOICE Bring Your Own Bandwidth & Remote Worker Install and Best Practices Guide 2 Thank you for choosing EarthLink! EarthLinks' best in class Hosted Voice phone service allows you to deploy phones
More informationRevised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0
Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes
More informationThis topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
More informationFirewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
More informationCisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
More informationQuality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
More informationChapter 2 Quality of Service (QoS)
Chapter 2 Quality of Service (QoS) Software release 06.6.X provides the following enhancements to QoS on the HP 9304M, HP 9308M, and HP 6208M-SX routing switches. You can choose between a strict queuing
More informationSLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
More informationUser Datagram Protocol - Wikipedia, the free encyclopedia
Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationThe Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network
More informationChapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationLab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
More informationCisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
More informationImplementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led
Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationVirtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
More informationIPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More information2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
More informationCisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
More informationNQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
More informationConfigure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication
More informationColasoft Capsa Technical White Paper. Maximize Network Value
Colasoft Capsa Technical White Paper Maximize Network Value Content Content BACKGROUND... 3 OVERVIEW... 3 CONCEPT AND PRINCIPLE... 4 HOW TO WORK... 4 DATA CAPTURE... 4 DATA ANALYSIS... 5 EXPORTING DATA...
More informationThe Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
More informationApplication Note. Pre-Deployment and Network Readiness Assessment Is Essential. Types of VoIP Performance Problems. Contents
Title Six Steps To Getting Your Network Ready For Voice Over IP Date January 2005 Overview This provides enterprise network managers with a six step methodology, including predeployment testing and network
More informationBroadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationSUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationChapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators
More informationTest Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites
More informationLoad Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
More informationHow To: Diagnose Poor VoIP Calls through diagnostics.
How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing
More informationBusiness case for VoIP Readiness Network Assessment
Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The
More informationUsing a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note
Using a Sierra Wireless AirLink Raven X or Raven-E with a Application Note Cisco routers deliver the performance, availability, and reliability required for scaling mission-critical business applications
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationChapter 4 Security and Firewall Protection
Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be
More informationNETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
More informationEssential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationLab PC Network TCP/IP Configuration
Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer
More informationJive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
More informationChapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
More informationInternetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
More informationCisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
More informationFirewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
More information"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary
Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,
More informationQoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationIOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationHP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software
More informationLAN Planning Guide LAST UPDATED: 1 May 2013. LAN Planning Guide
LAN Planning Guide XO Hosted PBX Document version: 1.05 Issue date: 1 May 2013 Table of Contents Table of Contents... i About this Document... 1 Introduction: Components of XO Hosted PBX... 1 LAN Fundamentals...
More informationConfiguring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
More informationEdgeMarc 4508T4/4508T4W Converged Networking Router
Introduction The EdgeMarc 4508T4W combines multiple voice and data features into a single, easy to use converged networking router. It includes models that have up to 4 T1 WAN interfaces or a single Ethernet
More informationCisco Branch Routers Series Network Analysis Module
Cisco Branch Routers Series Network Analysis Module The Cisco Branch Routers Series Network Analysis Module (NAM) is a powerful integrated network monitoring solution that delivers unparalleled insight
More informationTroubleshooting VoIP and Streaming Video Problems
Using the ClearSight Analyzer to troubleshoot the top five VoIP problems and troubleshoot Streaming Video With the prevalence of Voice over IP and Streaming Video applications within the enterprise, it
More informationConfigure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
More informationFirewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
More informationIP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum
IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Addendum These IP/MPLS VPN Additional Terms & Conditions are part of the IP/MPLS Addendum ( Addendum ). 1. SELECTED DEFINITIONS. Unless
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationCisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
More informationUsing the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video
Using the ClearSight Analyzer To Troubleshoot the Top Five VoIP Problems And Troubleshooting Streaming Video With the prevalence of Voice over IP applications within the enterprise, it is important to
More information