Application Visibility in Federal Networks > White Paper
|
|
- Duane Fisher
- 8 years ago
- Views:
Transcription
1 > White Paper
2 Application Visibility in Federal Networks Identify, classify and prioritize everything running on your network No matter where you serve in government, all federal agencies face the same IT challenges. Each department must provide secure access to critical data and enable inter-agency collaboration through reliable, highquality voice and video applications. You also have to enhance productivity and control rising network infrastructure costs. It s a tall order, so where do you start? To optimize application performance across your distributed network, you first need a clear, in-depth view of your entire infrastructure. Then you need to identify and classify all applications in real time so you can assess traffic patterns, bandwidth consumption and more. For instance, can you tell the difference between mission-critical communication and casual Web surfing? Most importantly, can you prioritize and allocate bandwidth to ensure your critical applications perform optimally while achieving your mission? Blue Coat PacketShaper enables total application visibility, control and monitoring To help you achieve complete network visibility, Blue Coat PacketShaper delivers integrated monitoring, control and compression capabilities in a single appliance. With PacketShaper, you can identify all the applications on the network and monitor response times and utilization at the application level. You can also optimize application performance by using granular quality of service (QoS) controls to regulate traffic and increase WAN capacity through application-specific compression techniques. Designed as a scalable, flexible platform, PacketShaper can be easily configured for additional functionality with a range of software modules or hardware components that enhance each appliance. In this white paper, you ll learn how PacketShaper can help you achieve the complete visibility you need to identify, classify and prioritize all the traffic and users on your entire network. This paper will specifically outline how you can: -> Identify all the applications running on your WAN and determine which consume the most bandwidth. 1 < >
3 -> Know how much of your bandwidth is consumed by recreational traffic. -> Determine if application performance meets your users expectations and service levels. -> Identify the top users of a specific application at each office. -> Ensure remote locations get the bandwidth they need to meet their mission requirements. Traffic Classification Government networks often host many more types of traffic than IT administrators can see. To diagnose and solve performance problems, you first need to identify and categorize all the types of traffic on your network. As soon as PacketShaper is installed, it auto-identifies and organizes each distinct type of traffic and sets a priority for that traffic. It builds a hierarchical traffic-classification tree, inserting an entry for every traffic type it observes. Each traffic category is called a class and all classes together form a traffic tree. While many products can differentiate traffic based on IP address and port numbers, PacketShaper can scrutinize multiple packets, behavioral characteristics, application markers and traffic histories to determine precisely which applications are in use. In fact, traffic classification is one of PacketShaper s key benefits. PacketShaper can classify traffic with a wide range of criteria, including: -> Advanced Layer 7 application signatures -> Application sub-classification including Oracle and PostgreSQL (by database), Citrix (by published application, client name, or priority tag), FTP (by file name or extension), ICMP (by message type such as ping), NNTP (by name or type of newsgroup), DICOM (by healthcare application) and VoIP (by protocol, CODEC or device type) -> HTTP sub-classification by URL, URL wildcard, content type, MIME type, browser type, HTTP tunnel, HTTP 1.1 virtual server -> SSL sub-classification by certificate common name 2 < >
4 -> Layer 4 UDP and TCP ports, port ranges and port lists -> Layer 3 IP addresses, address ranges, subnets, subnet ranges, MAC addresses, host lists, and LANs or physical devices -> QoS markings, including DiffServ, IP-ToS, IP-CoS, IP precedence, MPLS label, MPLS experimental bits -> Frame relay interface, PVC/DLCI, ATM PVC and VLAN Types of Traffic Classification With increasingly complex traffic on your network, you need sophisticated classification techniques that go beyond simple IP address or static port schemes. PacketShaper detects dynamic and migrating port assignments, differentiates applications using the same port and uses Layer 7 indicators to identify specific applications. Web Classification The majority of your network traffic can come from the Web and consist of both recreational browsing and legitimate government business. Therefore, how you prioritize all this traffic depends on urgency, time of day, type of application, bandwidth requirements, user and other criteria. PacketShaper differentiates between various types of traffic so you can manage each with an appropriate response. You can sub-divide HTTP traffic (using mime type, URLs, browser type and more), detect non-http traffic using port 80, spot non-http traffic within an HTTP tunnel, and more. You can also separate critical HTTP XML from recreational HTTP MPEGs to prevent an employee s hobbies from interfering with important missioncritical communications. Occasionally, in an attempt to bypass security controls, Web traffic disguises itself by running over an HTTP tunnel (using http-tunnel or socks2http protocols) and disrupts performance of critical HTTP applications. The PacketShaper spots and separates this tunnel traffic so you can manage it appropriately. 3 < >
5 Citrix and Oracle Classification PacketShaper can automatically isolate each published application running within a Citrix environment. For example, it can distinguish Microsoft Word from Oracle, and it can separate interactive Oracle traffic from its print traffic. In cases where Citrix features (e.g., encryption) obscure PacketShaper s ability to sub-classify Citrix, PacketShaper can still protect each individual user to ensure productive Citrix sessions. In addition, PacketShaper differentiates many types of Oracle traffic, allowing you to tailor your analysis or management strategies. For instance, you can separate Oracle traffic accessing a specific database from Oracle traffic accessing another database. PacketShaper also identifies backend database traffic consisting of Oracle8i/9i/10g and netv2 protocols using a multi-threaded server as well as the older Oracle 7 (or before) and netv1 protocols using a dedicated server. Furthermore, PacketShaper identifies Oracle s Java-based, front-end client traffic, as well as Oracle over SSL and Oracle s Enterprise Manager traffic. Intricate Port Classification When multiple applications use the same port, it can be difficult to manage because they appear as one application. PacketShaper, however, can distinguish between different applications on the same port, such as TN3270, TN5250 and other Telnet sessions that all use port 23. By contrast, an application that hops from port to port can be a challenge to identify because it looks like multiple applications. But PacketShaper can easily identify and track individual applications that frequently hop ports or applications such as FTP or VoIP that use dynamic ports. File-Sharing Protocols Although specific peer-to-peer (P2P) applications come and go with political and legal battles, there are now whole groups of P2P applications that facilitate file sharing. These applications voraciously consume bandwidth, so you absolutely must maintain control over who and what uses your network to guarantee performance of mission-critical applications. PacketShaper automatically identifies a large number of these file-sharing applications, enabling you to analyze or control their behavior. PacketShaper can also help you identify P2P applications hiding inside an HTTP tunnel, as well as traffic that uses encryption to disguise itself and avoid detection. 4 < >
6 Multiple Locations When federal agencies choose a main-site deployment, the ability to distinguish traffic to and from each remote site becomes crucial. PacketShaper can classify traffic according to subnet, IP address, address ranges and host lists, which can all work to discern traffic from different offices. PacketShaper can then automatically discover all applications used by each location. Even if there s a classified application, PacketShaper might not know what type of traffic it is, but it can still classify and prioritize each packet by signature. By separating these applications (or not, your choice) from those discovered at other locations, PacketShaper enables you to apply different management strategies for the same application at different sites. Classification in Heterogeneous Networks PacketShaper can identify and track hosts by DNS name, even if Dynamic Host Configuration Protocol (DHCP) changes the host s IP address frequently. You can use the Lightweight Directory Access Protocol (LDAP) host lists to isolate any traffic associated with any host on the list. PacketShaper can also classify traffic based on IP COS/TOS bits, Diffserv settings, and MPLS labels, allowing traffic types to have uniform end-to-end treatment by multi-vendor devices in heterogeneous WANs. Hierarchical Classification More granular and targeted classification leads to more insightful analysis and more precise control of performance. PacketShaper s hierarchical classification and traffic tree structure help pinpoint precisely the traffic you need to manage. Many nested levels enable you to split one type of traffic into different categories so that you can treat them differently or run separate reports on each network segment. For example, you can separate Microsoft Exchange traffic into its components. Or, instead of lumping all VoIP traffic together, you can divide it by function or CODECs. Common Classification Approaches Network administrators often categorize their traffic based on applications, source or destination locations, or a combination of both. Your choice depends on where you install PacketShaper and how you want to manage traffic. 5 < >
7 Application-based Traffic Tree An application-based traffic tree distinguishes traffic based on application (such as SAP) or application-related criteria (such as a URL or particular database) and builds a traffic tree of application-based classes. This configuration is most common at distributed branches where the focus is on the site s own applications, rather than on dividing traffic for multiple locations. Location-based Traffic Tree A location-based traffic tree separates traffic according to location or user group, based on subnets, host lists or IP addresses. Then, optionally, it can expand each location to list its applications. This configuration is most common at main sites to manage traffic with distinct strategies for several branches or for several divisions. PacketShaper Reporting PacketShaper enables you to generate network and application reports that help you: -> Investigate and diagnose problems and evaluate service levels -> Monitor historical performance trends -> Notify administrators of critical performance factors -> Check on a configuration change or justify an equipment purchase -> Communicate network and application conditions to users PacketShaper measures hundreds of characteristics about your network traffic, creating an extensive collection of measurement data. These metrics form the basis of PacketShaper s reports. PacketShaper offers a variety of built-in reports, which are all accessible from a Web browser. And, because PacketShaper centralizes all reporting functions, you can compare, correlate and summarize behavior between appliances and by location. PacketShaper also stores measurement data on appliances for up to two months and for months or years if using IntelligenceCenter for central reporting. PacketShaper s metrics can also be incorporated into SNMP 6 < >
8 management platforms, NetFlow v5 collectors and third-party reporting tools, such as Concorde, InfoVista and Microsoft Excel. Reports include details on: -> Performance: How long application traffic spends in different portions of the network -> Utilization: Bandwidth usage by applications, locations and users -> Diagnosis: Information that helps to analyze or pinpoint a problem Response-time Measurement Response-time measurement (RTM) quantifies what has traditionally been subjective, anecdotal information about slow applications. It s not enough to measure availability and bandwidth usage because these figures don t reflect the user s perception of performance. RTM measures the actual user experience with a mechanism to compare actual and anticipated performance. PacketShaper s RTM features offer techniques to measure performance, troubleshoot sluggish response, set service-level goals and assess compliance. With RTM, you can: -> Track delay statistics for flexible traffic categories -> Measure response times for individual applications, hosts, subnets and any transaction-oriented TCP traffic class -> Break down each response-time measurement into network delay (time spent in transit) and server delay (time the server used to process the request) -> Identify users and servers with the slowest performance -> Set acceptability standards and track whether performance adheres to them -> Set the speed that divides good responses from bad (500 ms, for example), and set the percentage of transactions that should meet designated performance goals (95 percent, for example) -> View current and historical performance data in intuitive tables and graphs, in a management information base via an XML API or as raw data -> Integrate SNMP management tools and third-party reporting tools -> Quantify and validate performance to justify new equipment expenditures 7 < >
9 Measuring Response Times By monitoring all the traffic that passes through your network, PacketShaper provides a unique opportunity to accurately measure response times at a very low cost. Because PacketShaper already sees every packet, it can easily calculate the time traffic moves between a client and a server, the time used by the server and the time spent on either side of the PacketShaper. PacketShaper then notes response times as traffic passes. This simple approach provides rich data without network impact or overhead. PacketShaper s Response-time Advantages PacketShaper measures performance anywhere on the network, as long as it sees the traffic it is measuring. It can sit on the client side or on the server side of the topology. If the Internet separates the client and server, it does not matter on which side the PacketShaper is deployed. PacketShaper offers other considerable advantages when measuring response times, including: -> No application modifications -> No need for additional API calls or software wrappers around measured applications -> No desktop or server changes, or location restrictions -> No additional software loaded on client desktops or any server -> No artificial traffic overhead, router reconfiguration or topology changes needed PacketShaper does not create extraneous application requests merely to time their responses and does not issue pings. It can issue synthetic requests, if required, but calculates all response-time metrics without needing to generate artificial traffic. Bandwidth Utilization Reports Bandwidth is an expensive resource and prone to congestion. To help you manage your links effectively and conserve bandwidth, PacketShaper helps you assign a certain amount of bandwidth per link and prioritize applications, protocols and services. You can also see if critical applications have sufficient bandwidth access, or if the wrong applications have too much access. For example, do file transfers and print traffic monopolize your bandwidth while SAP and Oracle starve? 8 < >
10 PacketShaper also helps you determine if you are getting all the bandwidth you require. Could you support your critical applications with half or twothirds of the bandwidth you currently have, or if your applications were more effectively managed? PacketShaper can help you definitively answer those questions. Evaluating the Usage Tops PacketShaper offers a variety of mechanisms, including lists, tables, pie charts, line graphs, bar charts and voluminous raw data to track top consumers of bandwidth. Using this information, you can identify which applications, users, locations, and Web sites consume the most bandwidth. The Top 10 Classes graph provides a more detailed view. With the granular level of detail these charts provide, you can achieve valuable insight into application and network behavior. For example, you can: -> Examine the chattiest host IP pairs for traffic from a specific application, location or combination of the two -> Split the traffic from one remote location into its different application, service, or DSCP types, even if you didn t sub-classify traffic into its services as it passed -> List the busiest ports, the ports a specific application or host used, and spot potential port-scans -> Expose the top current or historical traffic contributors or recipients for a location or application 9 < >
11 PacketShaper puts these more detailed, per-flow metrics into flow detail records using the industry-standard NetFlow format. PacketShaper appliances serve as NetFlow emitters, automatically pushing data to remote systems, called collectors. The collectors interpret and incorporate the data into meaningful reports and other useful tools. Another feature, called host accounting, tracks historical usage levels for each IP address and offers statistics sums for each user, host list or subnet. If you export this data into a tool such as Microsoft Excel, you can sort the results, yielding top users or a fully ranked list of users from top to bottom. Using these features, you could, for example, retrieve usage figures for each department in an agency. Synthetic Transactions PacketShaper can also, at your discretion, initiate Web or other TCP communications at periodic intervals to verify the availability of critical hosts. This activity is similar to scheduled pings or SNMP polls, but includes these important capabilities: -> Detailed analyses of host behavior and response times apply to synthetic requests, enabling you to profile network and behavior over time. This information is much more helpful than knowing if a device simply responds to pings or not. -> Synthetic requests can determine if a service or application is running, not just if a server is responding. As a result, you get a more sophisticated assessment of availability. -> Distributed PacketShaper appliances can serve as local clearinghouses for availability information, forwarding situations of interest or concern to central locations via , SNMP traps or syslog messages, thus eliminating the need for long-distance polling by central management platforms. Sharing Reports: The End User Portal Sometimes network and application managers want to share PacketShaper reports with their own users. But they can t compromise security and privacy by giving everyone access to their PacketShaper data. In addition, they want to continually publish up-to-date reports in an accessible place and format. Using the portal feature, you can offer your end-users or subscribers customized Web pages with network and application status 10 < >
12 reports. Information such as TCP efficiency, application peak and average bandwidth rates, response times and other reports can be presented through customizable HTML templates. By delivering these detailed reports to end users and subscribers, you enable them to check their own status and reduce the volume of help-desk calls. Adaptive Response PacketShaper s adaptive response feature automatically monitors the network for particular conditions or performance factors, detects potential problems, notifies administrators if a problem is detected, and can take corrective actions that you prescribe. You decide what constitutes a problem, whether you want to be notified, conditions that warrant corrective actions and which actions are appropriate. PacketShaper offers many preconfigured conditions or you can define your own. Examples include: -> Send an SNMP alert to a central management system when retransmissions rise to occupy 15 percent of your network. -> Dedicate more bandwidth to SAP or boost SAP s MPLS service class whenever 10 percent or more of its transactions fail to respond within two seconds. -> Send yourself an whenever a new application appears on the network that claims more than eight percent of capacity. -> Temporarily or permanently contain and quarantine greedy users who consume an unfair portion of bandwidth. Monitor Conditions and Respond Automatically When PacketShaper monitors a situation of interest, an agent checks the condition and scrutinizes its status. Several groups of predefined agents include categories for the health of the network, applications and the appliance itself. Each adaptive response agent belongs to one of the following categories: -> Unit health agents monitor capacity and load on a PacketShaper. -> Network health agents monitor traffic efficiency and how much of a bandwidth partition is utilized. 11 < >
13 -> Application health agents monitor new network traffic and traffic that is classified into /default. -> Host agents detect hosts that use a disproportionate share of the link. -> Custom agents monitor the value of any PacketShaper metric to detect a variety of conditions for traffic classes, links and partitions. Because acceptable behavior on one network or unit might be considered unacceptable on another, you can customize each agent to reflect your own preferences. By tailoring an agent s definition, you can monitor precisely the condition you have in mind and respond in the way you prefer. Items you can specify include: -> Condition or metric to monitor Example: Check for individual hosts using unreasonable amounts of bandwidth -> Threshold that indicates a problem Example: Specify 12 percent as the percentage of capacity one host must use to be considered unreasonable -> Threshold that indicates a return to normalcy Example: Specify five percent as the maximum percentage of capacity each host can use and still be considered reasonable -> Frequency to check the metric or condition Example: Check host usage every two minutes -> Determine if notification is needed, and, if so, which method ( , a Syslog server message or an SNMP trap) Example: Yes, notification is needed. Send an to IT that explains the problem and includes the offending host s IP address -> Determine if automatic corrective actions are needed, and, if so, which actions Example: Yes, corrective actions are needed. Enter the offending IP address in a host list, and limit the bandwidth to these hosts. 12 < >
14 Results at a Glance Once you have configured automatic monitoring and response, PacketShaper provides an easy way to see the status and results at a glance. Adaptive response provides a color-coded summary to spot potential problems quickly. Five colored status indicators show the status of the five categories of agents. Green, yellow or red indicators reflect optimal, marginal or unacceptable levels of performance. When the mouse hovers over any colored indicator, a drilldown status display appears listing the status of each agent in the group with links to additional information. Blue Coat PacketShaper: Optimizing application performance with greater network visibility PacketShaper s visibility features help you optimize application performance across your federal network. Rather than simply collect data, PacketShaper s monitoring capabilities help you organize findings, synthesize conclusions and flag problems early to help manage your network more effectively. With PacketShaper, you can see all the applications on the network, what portion of network bandwidth they consume, how well they perform and where delays originate. As a result, PacketShaper enables you to: -> Automatically detect and classify hundreds of critical and recreational applications -> Identify top applications, users, servers, remote sites and Web destinations -> Analyze bandwidth usage, response times, the impact of configuration changes and sources of delay -> Track response times and break them into time spent on the network and server -> Set standards for service levels and track their compliance -> Monitor conditions of interest, and when thresholds are exceeded, automatically take action to correct, document and notify someone of the problem -> Measure, graph and export more than 100 metrics describing usage, availability, efficiency, response times, errors and diagnostics 13 < >
15 About Blue Coat Blue Coat is the technology leader in Application Delivery Networking (ADN). The ADN infrastructure provides the visibility, acceleration and security capabilities required to optimize and secure the flow of information to any user, on any network, anywhere. This application intelligence enables government agencies to tightly align network investments with mission requirements, speed decision-making and secure critical applications for long-term competitive advantage. To learn more, please visit us at 14 < >
16 Blue Coat Systems, Inc BCOAT Direct Fax Copyright 2010 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use. Blue Coat, ProxySG, PacketShaper, IntelligenceCenter and BlueTouch are registered trademarks of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners. v.wp_fedappvisibilitymon-v2-0110
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
More informationVoice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationIs Your Network Ready for VoIP? > White Paper
> White Paper Tough Questions, Honest Answers For many years, voice over IP (VoIP) has held the promise of enabling the next generation of voice communications within the enterprise. Unfortunately, its
More informationWhite Paper. Optimizing Video Performance Across the Distributed Enterprise >
White Paper Optimizing Video Performance Across the Distributed Enterprise > High-Quality Videoconferencing to Any User, On Any Network, Anywhere Do more with less: that s the message echoing through corporate
More informationFirst Steps to Using a PacketShaper
First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic... 2 View the Class Tree... 3 Problems?... 4 Analyzing Network
More informationWAN Optimization for Microsoft SharePoint BPOS >
White Paper WAN Optimization for Microsoft SharePoint BPOS > Best Practices Table of Contents Executive Summary 2 Introduction 3 SharePoint BPOS performance: Managing challenges 4 SharePoint 2007: Internal
More informationCiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
More informationCisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
More informationAlcatel-Lucent VitalSuite Performance Management Software for the Enterprise
Alcatel-Lucent VitalSuite Performance Management Software for the Enterprise Monitor, measure and enhance delivery of carrier-class business services across your multi-vendor, multi-service infrastructure
More informationLab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
More informationGetting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
More informationApplication Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper
Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security > White Paper Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security
More informationCisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
More informationNetwork Instruments white paper
Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended
More informationKaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
More informationCisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationSapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationWhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
More informationManaging User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006
Managing User Website Experience: Comparing Synthetic and Real Monitoring of Website Errors By John Bartlett and Peter Sevcik January 2006 The modern enterprise relies on its web sites to provide information
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More informationWHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
More informationWAN Optimization in MPLS Networks- the Transparency Challenge!
DATE OF ISSUE May 2005 AUTHOR Efi Gat mor 103 Eisenhower Parkway Roseland, NJ 07068 USA TEL +1.888.892.1250 +1.973.618.9000 FAX +1.973.618.9254 www.expand.com WAN Optimization in MPLS Networks- the Transparency
More informationpt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
More informationWAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS
WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages
More informationThe Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
More informationNetwork Management. 8.1 Centralized Monitoring, Reporting, and Troubleshooting. 8.1.1 Monitoring Challenges and Solutions CHAPTER
CHAPTER 8 The Cisco WAN and application optimization solution provides a powerful set of WAN optimization features. To translate these features into verifiable user benefits, effective network management
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationHow To Create A Qos
WHITE PAPER Three Steps to Success with QoS A Riverbed White Paper Introduction: QoS ensures predictable application performance QoS is one of the most widely deployed networking technologies. It is a
More informationWHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
More informationSolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
More informationBlue Coat Security First Steps Solution for Streaming Media
Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBest Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
More informationNetwork Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationCisco Prime Network Analysis Module Software 5.1 for WAAS VB
Cisco Prime Network Analysis Module Software 5.1 for WAAS VB Network administrators need multifaceted visibility into the network and application to help ensure consistent and cost-effective delivery of
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More informationCover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
More informationNetwork Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
More informationVisualization, Management, and Control for Cisco IWAN
Visualization, Management, and Control for Cisco IWAN Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether that connection is Multiprotocol Label
More informationHuawei esight Brief Product Brochure
Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service
More informationmbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
More informationplixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
More informationSecure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
More informationTesting VoIP on MPLS Networks
Application Note Testing VoIP on MPLS Networks Why does MPLS matter for VoIP? Multi-protocol label switching (MPLS) enables a common IP-based network to be used for all network services and for multiple
More informationLiveAction Visualization, Management, and Control for Cisco IWAN Overview
LiveAction Visualization, Management, and Control for Cisco IWAN Overview Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether that connection is
More informationCisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
More informationReverse Proxy for Trusted Web Environments > White Paper
> White Paper ProxySG for Reverse Proxy Web-based solutions are being implemented for nearly every aspect of business operations, and increasingly for trusted environments with mission-critical business
More informationThe Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com Sveronese@networkphysics.com September 2003 1 Agenda Today s IT challenges Introduction to Network
More informationALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software
ALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software MONITOR, MEASURE AND ENHANCE DELIVERY OF MISSION CRITICAL BUSINESS SERVICES ACROSS A MULTIVENDOR, MULTI-SERVICE INFRASTRUCTURE
More informationMasters Project Proxy SG
Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the
More informationObserver Reporting Server Sample Executive Reports
Observer Reporting Server Sample Executive Reports Enterprise-wide monitoring and reporting with root-cause analysis Table of Contents Observer Reporting Server Introduction to the Observer Reporting Server
More informationHow To: Diagnose Poor VoIP Calls through diagnostics.
How To: Diagnose Poor VoIP Calls through diagnostics. When problems arise with poor VoIP phone calls, where do you start looking to troubleshoot the issue? This is one of the many challenges of managing
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationVoice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
More informationwhitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
More informationHP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet
Data sheet HP Intelligent Management Center Enterprise Software Platform Key features Highly flexible and scalable deployment options Powerful administration control Rich resource management Detailed performance
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationHow To Choose A Network Firewall
Critical Considerations in Choosing a Network Firewall Version 5.4.3 July 2014 Why today s Firewalls are broken Visibility No visibility into user behavior No control over applications Manageability No
More informationUNIFIED PERFORMANCE MANAGEMENT
UNIFIED PERFORMANCE MANAGEMENT VISIBILITY CONTROL OPTIMIZATION COMPLETE WAN OPTIMIZATION Increase the speed and efficiency of your wide area network. Exinda s Unified Performance Management (UPM) solution
More informationAbout Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
More informationCHAPTER. Monitoring and Diagnosing
CHAPTER 20. This chapter provides details about using the Diagnostics & Monitoring system available through ShoreTel Director. It contains the following information: Overview... 661 Architecture... 661
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationChapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
More informationMonitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
More informationNetwork Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationMonitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
More informationBarracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More informationCisco Branch Routers Series Network Analysis Module
Cisco Branch Routers Series Network Analysis Module The Cisco Branch Routers Series Network Analysis Module (NAM) is a powerful integrated network monitoring solution that delivers unparalleled insight
More informationIntelligent Control with an Application Delivery Network >
White Paper Intelligent Control with an Application Delivery Network > BlueCoat ProxySG and PacketShaper Work Together For Secure and Reliable Application Delivery Across the Enterprise WAN Executive Summary
More informationRIVERBED APPRESPONSE
RIVERBED APPRESPONSE REAL-TIME APPLICATION PERFORMANCE MONITORING BASED ON ACTUAL END-USER EXPERIENCE BUSINESS CHALLENGE Problems can happen anywhere at the end user device, on the network, or across application
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationTest Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com. Application Advisor
Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - TestEquipmentDepot.com NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites
More informationWhite Paper: Application and network performance alignment to IT best practices
Unpublished White Paper: Application and network performance alignment to IT best practices This white paper briefly describes best practices; highlights IT best practices; and discusses in detail IT business
More informationUsing LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks
LiveAction Application Note Using LiveAction Software for Successful VoIP Deployments How to quickly and accurately deploy QoS for VoIP networks September 2012 http://www.actionpacked.com Table of Contents
More informationA TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
More informationHow To Get Started With Whatsup Gold
WhatsUp Gold v16.2 Getting Started Guide Co Welcome Welcome to WhatsUp Gold... 1 About WhatsUp Gold... 1 WhatsUp Gold Editions... 2 Deploying Deploying WhatsUp Gold... 4 STEP 1: Prepare the network...
More informationEnterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
More informationWAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
More informationQuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
More information5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
More informationALCATEL-LUCENT VITALSUITE APPLICATION PERFORMANCE MANAGEMENT SOFTWARE RELEASE 12.5
ALCATEL-LUCENT VITALSUITE APPLICATION PERFORMANCE MANAGEMENT SOFTWARE RELEASE 12.5 Alcatel-Lucent VitalSuite Applications Performance Management software () provides real-time visibility for tracking,
More informationHP PCM Plus v4 Network Management Software Series
HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network
More informationAccessing Remote Devices via the LAN-Cell 2
Accessing Remote Devices via the LAN-Cell 2 Technote LCTN0017 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com
More informationTen Best Practices for Optimizing ADC Deployments
EXTRAHOP WHITE PAPER Ten Best Practices for Optimizing ADC Deployments Abstract Application Delivery Controllers (ADCs) are critical control points in the application environment. This paper examines the
More informationRadware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
More informationPATROL Internet Server Manager Technical Brief
PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server
More informationTransaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM
Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows Reference IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to V8.1.3
More informationTraffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationThe Broadband Service Optimization Handbook Chapter 3
Gaining detailed information about the traffic on your network and the behavior of your subscribers is crucial to achieving success in the highly competitive service provider market. The latest breed of
More information