Tool Optimization. Benefits. Introduction. Technical Brief. Extend the usage life of tools and avoid costly upgrades
|
|
- Brooke Alexander
- 8 years ago
- Views:
Transcription
1 Tool Optimization Technical Brief Benefits Extend the usage life of tools and avoid costly upgrades Increase the accuracy and results of data analysis Extend capacity of storage media by optimizing data streams Avoid oversubscription and maintain 00% visibility Improve utilization of tools across the organization Introduction Most companies already have many types of monitoring tools to oversee application and network performance, as well as specific tools to monitor various security measures throughout the network. But as network traffic continues to grow, driving network migration from G to 0G, 0G and beyond, how do companies know they have 00% visibility into all parts of the network? How do they utilize existing and new tools effectively while maintaining and reducing operational costs? In addition, companies want to improve online user experiences, increase security to prevent damages from cyber-attack or data leakage, implement additional access control, and address regulatory compliance requirements. This creates further pressure to achieve 00% visibility of network traffic and to maximize tool utilization. This ongoing pressure to save time and money, including expectations for better ROI from the current monitoring tools, while addressing the difficulty of staying ahead of production network traffic usually results in purchasing additional very costly high bandwidth monitoring tools. The optimization of existing tools to obtain more utility from them is critical and top of mind for every CIO and network monitoring engineer. TECHNICAL BRIEF
2 Monitoring Tool Challenges Here are some of the most common challenges that CIOs are facing: Ensuring all required packets from the network are delivered to the tool for analysis. A single tool connected directly to the production network is easily overloaded as the bandwidth is too much for the tools NICs and processors. Another factor is that the tool sees all the data instead of just the data set the tool needs to analyze. Both factors result in oversubscription, lost packets and inefficient tool utilization and inaccurate analysis results. Solving SPAN port contention to allow connection of many different to the production network. In many cases, there are to 0 different types of tools that must be connected, each to address different issues and have different requirements and data sets. Aggregating the data from many collection points across the network to deliver the data to the various tools for analysis. This in itself can cause oversubscription for the same reason outlined above but also imposes a new challenge of delivering only the data set required for each tool to analyze. Reducing or eliminating duplicate packets that are inherently created by deploying a monitoring network. Depending on how many collection points in the network, duplicate packets can be the largest contributor to oversubscription and ineffective analysis. Scale and growth of monitoring tools to meet increasing traffic and the scope of the network. In many cases, an additional instance of a tool is required, or it may require faster processors, larger disk capacity and additional higher bandwidth NICs, all increasing investment and cost to maintain status quo. Conforming to Governance and Legal Compliance regulations such as HIPAA, LI, PCI, SOX, without massive costly upgrades to existing monitoring tools. To address these concerns, a tool optimization program must include the following capabilities to achieve 00% visibility and to maximize the optimization of your tool set: Removal of duplicate packets to increase tool utilization and help reduce oversubscription. Filtering and distribution mechanisms to further decrease or eliminate tool oversubscription and deliver the correct data sets to each individual tool increase accuracy of the analysis. Data rate and media type conversion (copper vs. various optical formats) capability allowing the delivery of critical data to tools without compatibility concerns. Removal of confidential information from data streams to address compliancy issues and allow for easy implementation of future regulatory mandates. Ability to load balance traffic allowing 0G to multiple G tools. Intelligent aggregation and scalability to connect any data source to any tool instantly. Easy management of the monitoring network to decrease time to resolution and increase staff efficiency. The biggest and quickest impact on tools is eliminating duplicate packets. Deduplication is highlighted as a top feature but the other capabilities are still critical to maximize tool optimization and are discussed in less detail. The Impact of Duplicate Packets Duplicate packets create challenges for IT and security personnel, including monitoring tool oversubscription, false positives, and inaccurate performance reporting. It is estimated that network monitoring traffic can have up to as much as % duplicate packets can affect monitoring tools in the following ways: Diminished Monitoring Port Bandwidth Production bandwidth is outpacing monitoring tool capacities. Decreased effective link bandwidth, causing port and tool oversubscription (e.g. a G monitoring interface can effectively monitor only 00 Mbps traffic if 0% of the traffic is duplicate packets). Reduced Packet Capture Storage Capability Wasted storage due to duplicate packets (for example, data recorder time window reduced from to hours if 0% duplicate packets). Added incremental cost of storage to allow extended capture times, with little return on new analysis results. Decreased Processing of Analyzer Tools Tools use up CPU and memory resources for deduplicating network traffic instead of performing analysis. A high percentage of duplicate traffic can overload the tool and can halt the analysis function.
3 Interference with Network Analysis and Troubleshooting Duplicate packets skew network statistics causing a lack of precision in analysis. Session-aware tools do not work at all if there are duplicate packets in the data stream. If there are multiple identical packets being provided by the network monitoring infrastructure, an analytics tool has to do more work to separate the true transactions from the duplicates. The tool becomes less effective essentially costing more and additional tools must be purchased to analyze the same volume of traffic just to maintain status quo. It is important to note however, that an identical packet is not necessarily exactly the same bit for bit. For example, layer information (MAC, VLAN) may change as the packet traverses the network, but the remainder of the packet from layer upwards is identical. In some cases, defining packets as duplicate even when the layer header information is different, such as TTL, is critical. Therefore, any deduplication solution must have configurable parameters to define duplicate packets for different monitoring scenarios. The following diagram is an example of just such a scenario. When an application server is communicating with a database server in a different zone, the traffic will traverse the network through different uplinks in the aggregation layer of a typical -tier data center architecture. If all those links are being tapped and aggregated together, the same packets in this example will each be captured twice as indicated by the highlighted red tap points. Production Network Core Layer- Distribution Layer- T T T T T T T T EXPANSION Multiple Distribution Modules Access / ToR Layer- EXPANSION Multiple Access Modules SPAN from all Access Switches Application Server Figure Multiple identical packets traversing the network infrastructure. Database Server For more information on duplicate packets, please download APCON s technical brief Eliminate Duplicate Packets to Drive Network Monitoring Efficiency.
4 How Does APCON Help With Tool Optimization APCON s intelligent monitoring switches and taps directly address the issues of connecting multiple tools to a production network and simplify the architecture to allow 00% visibility. Moreover, APCON switches can fully optimize monitoring tool utilization. With advanced services such as deduplication, time stamping, load balancing, trunking, advanced ingress filtering, and easy to use web-based GUI provisioning, APCON s flexible and highly available monitoring solution can solve the most complex monitoring challenges. APCON solutions have been deployed by some of the largest telecom, financial, banking, and governmental entities in the world. Outlined below are some of the capabilities of APCON s monitoring solution and how they can help tool utilization and reduce the complexities of modern network monitoring. Packet Deduplication We have discussed how duplicate traffic is generated and the negative impact duplicate traffic has on tools. With APCON packet deduplication, the analytic tools can operate at their peak efficiency. With no duplicated packets presented to the tool, wasted processing cycles are eliminated. This results in a more reliable, accurate and precise analysis, maximizing the tool since it receives only the data it needs to analyze. With one of the largest deduplication time window in the industry and configurable settings, APCON, makes it easy to define exactly what constitutes a duplicated packet. Intelligent Traffic Distribution with Multi Stage Filtering The ability to send the right information to the right tool optimizes system performance and provides the best intelligence and clarity. APCON provides Multi Stage Filtering (MSF), which goes beyond simple ingress and egress traffic filtering. MSF provides diverse benefits, depending on how it is used. Many of the benefits fall into the following categories: Intelligent Traffic Distribution MSF can filter incoming packets on the aggregation connections, thereby controlling the correct types of traffic that go to specific tools. This can optimize the tool performance as each tool now sees only the traffic that it is expecting and nothing else. MSF greatly enhances tool performance and also maximizes effective throughput and analysis capability. Provide Bandwidth Control Since MSF is forwarding only the needed traffic to each tool, you can eliminate oversubscription and achieve zero packet loss on the egress ports even if the connection is coming from a high bandwidth 0G or 0G ingress port and going to a low bandwidth G egress port. Similarly, an aggregation connection from multiple ingress ports can be filtered and the data distributed among several egress ports. MSF is infinitely flexible and delivers the ability to finely tune traffic to avoid oversubscribing egress port and tool capabilities. In addition to the intelligent traffic distribution capabilities, MSF can be used with the native port tagging and load balancing features that come with all APCON switches at no additional cost. This feature can further enhance analysis functionality and traffic load management. Packet Slicing Many network monitoring tools analyze only the layer, layer and sometimes part of layer information in an IP packet. Tools either do not store the packet payload, or have no capability to view the packet contents beyond the header or a specific location within the packet. Despite those limitations, tools must still manage the entire packet, which creates an unnecessary load in turn requiring sufficient processing resources and NICs to handle the volume of data. By removing payload data from packets and leaving only the header information, the network monitoring switch can send more data across a given link to the tool. The tool receives more condensed network data for analysis, increasing efficiency and utilization. Another benefit of packet slicing is in regulatory compliance. Legislation such as HIPAA, PCI and others demand data confidentiality, and stripping sensitive payload data from packets before they go to monitoring tools ensures that this sensitive data is not stored outside secure boundaries. APCON s packet slicing can be performed on every port, either at ingress or egress. This creates flexibility in configuring your packet slicing solution. The ability to slice on either ingress or egress allows sharing of the packet payload with other tools by slicing at egress, or you can fully optimize your traffic through the switch by slicing on ingress.
5 Technical Brief Tool Optimization Access (Layer ) Catalyst 0-S Series SI Catalyst 0-S Series SI Catalyst 0-S Series SI Catalyst 0-S Series SI 0G (Aggregated) Before Packet Slicing Dest APCON /..0.0.ºc ACI-00-E- 0 0 R ENTE INTELLAFLEX Blade ACI-0-E- 0 0 GPS ANT Aggregator Plus Time Stamping VLAN Tag Ether IP Header Type FCS CRC IP Data D C B 0 Ether IP Header Type ACI-00-E- EL CANC VLAN Tag ACI-0-E0- PPS/IRIG IN OUT Src Packet Controller Unnamed S/N: 0000 Ver: Hit [Enter] for configuration After Packet Slicing A Dest Src FCS CRC G (Packet Slicing) Monitoring Tool Figure The solution to exploding network traffic volume is to effectively reduce the monitored data to just that portion that is required for analysis. Many tools require only packet header information and in some cases the actual packet payload information may be confidential, and storing that data may present a security risk. APCON s packet slicing feature provides customers the ability to specify the packet slice length for ingress or egress ports in effect reducing the packet size and providing security. While reducing the packet size benefit is clear, the removal of private information can be essential. Load Balancing Performing load balancing at the switch level prevents network traffic growth from overwhelming monitoring tools. APCON load balancing prevents oversubscription and packet loss, for example when monitoring 0G traffic with G tools. Load balancing distributes traffic across multiple monitor ports. Up to eight monitor ports can be configured to share traffic, with their output approximately evenly distributed throughout the load balanced group. L/L/L adjustable hashing algorithm: allows users to configure which layer of information is included in the hashing when distributing traffic to a load balanced group. Automatic redistribution: when a loss of connection is detected, the traffic is automatically redistributed to the remaining ports of the load balanced group. SPANs Catalyst 0-S Series SI Catalyst 0-S Series SI G G G G G (Aggregated) APCON /..0.0.ºc ACI-00-E R ENTE PPS/IRIG IN OUT INTELLAFLEX Blade ACI-0-E- 0 0 GPS ANT Aggregator Plus Time Stamping D C B 0 ACI-00-E- EL ACI-0-E0- CANC Packet Controller Unnamed S/N: 0000 Ver: Hit [Enter] for configuration APCON load balancing provides the following additional features to meet various load balancing requirements: APCON load balancing can reduce the bandwidth to an individual monitoring tool such that 0G or higher traffic can be monitored with an existing G tool. It also allows a 0G interface tool to monitor traffic higher than 0G by load balancing the traffic to multiple 0G interfaces on the same system or on different systems. In addition, load balancing helps increase the processing power of the capture tool by distributing the traffic to multiple systems, such as those for SSL decryption requirements. Output from the load balanced group is designed to maintain packet order within any given conversation, as well as to guarantee a consistent output port for any single conversation. This ensures that a packet sniffer or other monitoring tool will see every packet of a given conversation. Catalyst 0-S Series SI A Load Balanced G G Monitoring Tool Figure Load balancing distributes the workload, optimizes tool resources, maximizes throughput, minimizes response time, and prevents oversubscription and packet loss.
6 Switch Management APCON s TITAN provides a single, centralized point of switch management for network monitoring in a multi-switch environment. With TITAN EP, you can share expensive analysis devices throughout your network. It also allows you to manage all of your data sources and tools for maximum efficiency. Connections between any data source and any tool are made conveniently and instantly from your desktop, and locked in place for the duration of your monitoring session ABOUT APCON APCON develops innovative, scalable technology solutions to enhance network monitoring, support IT traffic analysis, and streamline IT network management and security. APCON is the industry leader for state-ofthe-art IT data aggregation, filtering, and network switching products, as well as leading-edge managementsoftware support. Organizations in over 0 countries depend on APCON network infrastructure solutions. Customers include Global Fortune 00 companies, banks and financial services institutions, telecommunication service providers, government and military, and computer equipment manufacturers. To help with tool optimization, TITAN allows you to review the use of every monitoring tool or other network device in the inventory and understand where, when and by whom it is being utilized. Conclusion When properly implemented, a network traffic optimization strategy increases the performance of all your monitoring tools and the productivity of your IT staff. APCON intelligent network monitoring switches with Multi Stage Filtering, packet deduplication, packet slicing and load balancing offloads compute-intensive tasks from monitoring tools, so that each tool runs better and produces more of the work it was designed for. This in turn reduces capital expenditures by breathing new life into existing tools, can decrease time to resolution, and ensures 00% visibility. Contact Us Please sales@apcon.com or call 0 00 if you have any questions APCON, Inc. apcon.com APCON, Inc. All Rights company/apcon APCON is an Equal Opportunity Employer MFDV 0-R-0
Multi Stage Filtering
Multi Stage Filtering Technical Brief With the increasing traffic volume in modern data centers, largely driven by e-business and mobile devices, network and application performance monitoring has become
More informationChoosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
More informationIntelligent Data Access Networking TM
Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate
More informationApplication Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer
Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer Purpose: Overview on how to use Ixia s Anue Network Tool Optimizer (NTO) to provide the CA Application
More informationSolving Monitoring Challenges in the Data Center
Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate
More informationHow to Monitor a FabricPath Network
How to Monitor a FabricPath Network an owiasz Mar., 0 enefits Monitor FabricPath and other physical networks with one solution Preserve tool investment, increase tool allocation and use Increase network
More informationPacket Optimization & Visibility with Wireshark and PCAPs. Gordon Beith Director of Product Management VSS Monitoring
Packet Optimization & Visibility with Wireshark and PCAPs Gordon Beith Director of Product Management VSS Monitoring 1 Market Trends - Innovation MOBILE LTE INFRASTRUCTURE COMPLEXITY BIG DATA BUSINESS
More informationEnhancing Cisco Networks with Gigamon // White Paper
Across the globe, many companies choose a Cisco switching architecture to service their physical and virtual networks for enterprise and data center operations. When implementing a large-scale Cisco network,
More informationEnabling a Converged World. Are Duplicate Packets Interfering with Network Monitoring?
Enabling a Converged World Are Duplicate Packets Interfering with Network Monitoring? 915-6510-01 Rev A December 2011 Contents Overview...3 Duplicate Packets Diminish Monitoring Port Bandwidth...4 Duplicate
More informationAre Duplicate Packets Interfering with Network Monitoring? White Paper
Are Duplicate Packets Interfering with Network Monitoring? White Paper A network monitoring switch allows IT teams to simultaneously connect a wide array of monitoring tools. The best-in-class network
More informationBest Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive
White Paper Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com
More informationActive Visibility for Multi-Tiered Security // Solutions Overview
Introduction Cyber threats are becoming ever more sophisticated and prevalent. Traditional security approaches such as firewalls and anti-virus protection are not equipped to mitigate and manage modern
More informationSecure Access Complete Visibility
PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE PACKET CAPTURE APPLIANCE Intrusion Detection Switch TAP Data Recorder VoIP Analyzer Switch Secure Access Complete Visibility Web
More informationTechnical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
More informationAnalyzing Full-Duplex Networks
Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three
More informationEnabling Visibility for Wireshark across Physical, Virtual and SDN. Patrick Leong, CTO Gigamon
Enabling Visibility for Wireshark across Physical, Virtual and SDN Patrick Leong, CTO Gigamon 1 Agenda A review of the network then and now Challenges in network monitoring and security Introduction to
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationBest Practices in Gigabit Capture
Network Instruments White Paper Best Practices in Gigabit Capture How to obtain accurate, line-rate captures with your gigabit investment Analysis is a necessary component of network management. Understanding
More informationWHITE PAPER. Best Practices for Eliminating Duplicate Packets
WHITE PAPER Best Practices for Eliminating Duplicate Packets 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6501-01 Rev. B, July 2013 Table of Contents
More informationAny-to-any switching with aggregation and filtering reduces monitoring costs
Any-to-any switching with aggregation and filtering reduces monitoring costs Summary Physical Layer Switches can filter and forward packet data to one or many monitoring devices. With intuitive graphical
More informationAffording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
More informationObserver Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
More informationThe Case for Scalability in Large Enterprise Data Centers
The Case for Scalability in Large Enterprise Data Centers Sponsored by ebook: The Case for Scalability in Large Enterprise Data Centers Chapter 1: As Data Centers Grow, Network Monitoring is a Non-Starter
More informationWhite Paper. Optimizing Visibility, Control and Performance of Network Traffic
White Paper Optimizing Visibility, Control and Performance of Network Traffic 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-6598-01 Rev. B, June 2013 2
More informationNetwork Instruments white paper
Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),
More informationCisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
More informationHIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
More informationCisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches
White Paper Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches What You Will Learn Network Traffic monitoring using taps and Switched Port Analyzer (SPAN) is not a new
More informationWhitepaper Unified Visibility Fabric A New Approach to Visibility
Whitepaper Unified Visibility Fabric A New Approach to Visibility Trends Networks continually change and evolve. Many trends such as virtualization and cloud computing have been ongoing for some time.
More informationOptimized Network Monitoring
Optimized Network Monitoring Four ways matrix switching streamlines data center operation, reduces costs and positions IT for growth WHITE PAPER MARCH 2008 APCON, Inc. T 503.682.4050 800.624.6808 F 503.682.4059
More informationTrading at the Speed of Light
Trading at the Speed of Light How Intelligent Network Monitoring Delivers the Low Latency and High Speed Required by High-Frequency Traders Sponsored by 2014 APCON, Inc. All Rights Reserved. 14047-R1-0614
More informationDeploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure
Deploying F5 BIG-IP Virtual Editions in a Hyper-Converged Infrastructure Justin Venezia Senior Solution Architect Paul Pindell Senior Solution Architect Contents The Challenge 3 What is a hyper-converged
More informationWHITE PAPER. Realizing ROI from Your Network Visibility Investment
WHITE PAPER Realizing ROI from Your Network Visibility Investment www.ixiacom.com 915-6630-01 Rev. A, March 2014 2 Table of Contents Executive Summary... 4 Introduction... 4 Network Visibility ROI... 5
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationNetwork Monitoring Fabrics Are Key to Scaling IT
Network Monitoring Fabrics Are Key to Scaling IT September 2014 Prepared by: Zeus Kerravala Network Monitoring Fabrics Are Key to Scaling IT by Zeus Kerravala September 2014 º º º º º º º º º º º º º º
More informationOptimize Your Network Monitoring Strategy
Optimize Your Network Monitoring Strategy White Paper Packet aggregation switching streamlines data center operation, improves performance and reliability, reduces costs, and prepares enterprises for inevitable
More informationRECORDING VoIP TRAFFIC via PORT MIRRORING
Recording. Solutions. Redefined. OrecX will easily record your VoIP traffic once your VoIP traffic is seen on the server interface. Use (SPAN, port spanning or port monitoring) to get the right traffic
More informationTIME TO RETHINK PERFORMANCE MONITORING
TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.
More informationNet Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationOpen SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
More informationNet Optics xbalancer and McAfee Network Security Platform Integration
Under the McAfee SIA Partner Program, Net Optics is integrating its xbalancer with the McAfee Network Security Platform (NSP). This partnership will enable mutual customers to realize the benefits of load
More informationA New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams
A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationhp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationJuly, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.
Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local
More informationWhat s New in VMware vsphere 5.5 Networking
VMware vsphere 5.5 TECHNICAL MARKETING DOCUMENTATION Table of Contents Introduction.................................................................. 3 VMware vsphere Distributed Switch Enhancements..............................
More informationNetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationActive Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA
Active Visibility for Multi-Tiered Security Juergen Kirchmann Director Enterprise Sales EMEA Billions are Spent on Security Annually $18.4B SPENT BY ENTERPRISES WORLD-WIDE ON SECURITY IN 2014 ENTERPRISE
More informationIn-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
More informationConfiguring IPS High Bandwidth Using EtherChannel Load Balancing
Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel
More information50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
More informationEnd-to-End Visibility
End-to-End Visibility for Your Cisco Infrastructure SOLUTIONS GUIDE GIGAMON TABLE OF Contents Introduction... 1 Overview of Cisco Technologies... 1.Monitoring Cisco Application Centric Infrastructure (ACI)...
More informationCisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
More informationWireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University
Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University Napatech - Sharkfest 2009 1 Presentation Overview About Napatech
More informationDeploying Probes and Analyzers in an Enterprise Environment
Network Instruments White Paper Deploying Probes and Analyzers in an Enterprise Environment As an IT manager, you need visibility into every corner of the network, from the edge to the core. A distributed
More information100 Gigabit Ethernet is Here!
100 Gigabit Ethernet is Here! Introduction Ethernet technology has come a long way since its humble beginning in 1973 at Xerox PARC. With each subsequent iteration, there has been a lag between time of
More informationNavigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center
May 2013 Navigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center Executive Summary There is no single end-all cabling configuration for every data center, and CIOs, data center
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationTITANXR Multi-Switch Management Software
TITANXR Multi-Switch Management Software Centralized management of APCON network monitoring switches Features Centralized APCON system management View status and alerts Configurable Dashboards Monitor
More informationHow To Use A Network Instrument Ntap
ntap Product Family Provides monitoring and security devices with complete visibility into full-duplex networks Network Instruments ntaps let you monitor and analyze full-duplex links. ntaps are critical
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
More informationTIME TO RETHINK REAL-TIME BIG DATA ANALYTICS
TIME TO RETHINK REAL-TIME BIG DATA ANALYTICS Real-Time Big Data Analytics (RTBDA) has emerged as a new topic in big data discussions. The concepts underpinning RTBDA can be applied in a telecom context,
More informationMonitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges
2011 is the year of the 10 Gigabit network rollout. These pipes as well as those of existing Gigabit networks, and even faster 40 and 100 Gbps networks are under growing pressure to carry skyrocketing
More informationIxia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET
Ixia Director TM Powerful, All-in-One Smart Filtering with Ultra-High Port Density The Ixia Director TM is a smart filtering appliance that directs traffic of interest to your monitoring tools. Now you
More informationAND Recorder 5.4. Overview. Benefits. Datenblatt
Datenblatt AND Recorder 5.4 Using affordable call recording enables you to comply with legal and regulatory obligations. These requirements are easily achieved by deploying a secure call recording solution
More informationAerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
More informationA Dell Technical White Paper Dell PowerConnect Team
Flow Control and Network Performance A Dell Technical White Paper Dell PowerConnect Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationBusiness Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers s Executive Summary Cloud computing, video streaming, and social media are contributing to a dramatic rise in metro
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationPowerful Network and Security Monitoring for the Midsize Business
Powerful Network and Security Monitoring for the Midsize usiness Visibility into network traffic is crucial for IT operations to maintain security. Sponsored by eook: Powerful Monitoring for the Midsize
More informationGigabit Ethernet Packet Capture. User s Guide
Gigabit Ethernet Packet Capture User s Guide Copyrights Copyright 2008 CACE Technologies, Inc. All rights reserved. This document may not, in whole or part, be: copied; photocopied; reproduced; translated;
More informationWhite Paper. Optimizing the SAN Fiber Optic Physical Layer in Your Data Center
White Paper October 2012 Optimizing the SAN Fiber Optic Physical Layer in Your Data Center Deploying a structured cabling system for the SAN provides measurable results and long term value, whether you
More informationI1: Best Practices for Packet Collection, Aggregation & Distribution in the Enterprise
I1: Best Practices for Packet Collection, Aggregation & Distribution in the Enterprise J. Scott Haugdahl Architect, Blue Cross Blue Shield MN; scott_haugdahl@bluecrossmn.com Formerly Asst. VP, Architect,
More informationEnabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More information4G Aggregation Network Monitoring (ANM) Switch
Creating the best Shaping future communications 4G Aggregation Network Monitoring (ANM) Switch Mobile data and IP networks are constantly flooded with enormous amounts of data traffic. As technology advances
More informationBrocade Solution for EMC VSPEX Server Virtualization
Reference Architecture Brocade Solution Blueprint Brocade Solution for EMC VSPEX Server Virtualization Microsoft Hyper-V for 50 & 100 Virtual Machines Enabled by Microsoft Hyper-V, Brocade ICX series switch,
More informationApplication Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
More information基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationNetwork Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationThe Fight for Full Network Visibility in a Dangerous World
The Fight for Full Network Visibility in a Dangerous World Total network visibility is a core element of today s fight against emerging security threats. Sponsored by ebook: The Fight for Full Network
More informationArchitecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationProduct Summary Report
Product Summary Report March 2008 S Report 080330 olera Networks engaged Miercom, to independently evaluate the performance of its Model DS5100 deep packet capture and storage appliance. Testing was conducted
More informationCisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
More informationCisco - Catalyst 2950 Series Switches Quality of Service (QoS) FAQ
Page 1 of 8 Catalyst 2950 Series Switches Quality of Service (QoS) FAQ Document ID: 46523 TAC Notice: What's C han g i n g o n T A C We b H el p u s h el p y ou. Questions Introduction What is the software
More informationThe Impact of Virtualization on Cloud Networking Arista Networks Whitepaper
Virtualization takes IT by storm The Impact of Virtualization on Cloud Networking The adoption of virtualization in data centers creates the need for a new class of networking designed to support elastic
More informationBest Practices for Network Monitoring
Enabling a Converged World Best Practices for Network Monitoring How a Network Monitoring Switch Helps IT Teams Stay Proactive 915-6509-01 Rev A February 2012 Contents Monitoring Challenges in Today s
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More informationOKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES
OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES It is possible to consolidate multiple network appliances into a single server using intelligent flow distribution, data sharing and virtualization
More informationWeb Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
More informationAuspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
More information