Love at Second Sight. Written by Drew Robb

Size: px
Start display at page:

Download "Love at Second Sight. Written by Drew Robb"

Transcription

1 Love at Second Sight Once limited to monitoring networking equipment at large organizations, a new generation of NetFlow and sflow monitoring tools are gaining ground with data centers large and small as an effective means of keeping tabs on network, as well as supplementing security. Written by Drew Robb Sometimes it is love at first sight: the ipod and iphone were both instant successes. Other times the affection slowly grows over time: Ray Tomlinson sent the first over ARPAnet in 1971, but it took another two decades or more before it became a common business tool. NetFlow and sflow network management technologies have taken the slow approach. Both have been around for years, but the early versions were somewhat cumbersome. As a result, data center managers are slow to take advantage of them. In 2008, network analysis software vendor Network Instruments, LLC, conducted a survey of 600 IT professionals. It found that 77% were unaware of NetFlow or were not using it to monitor their networks. Many who were earlier deterred by the cost and complexity of implementation are giving these networking tools a new look. When they do, they are often surprised at how much easier they are to use and the bang they can now get for their networking buck. Take the case of Timex Corporation, originally known as the Middlebury Clock Company. For 150 years, it has been helping people stay on schedule. While the train conductors in the 1850s would have been happy being able to track their stops to the minute, for Dave Edgecomb, Timex s Manager of Global Technical Operations, it is milliseconds that matter. He oversaw the move of the company s data center halfway around the world from the Middlebury, Conn. headquarters to a collocation facility in Singapore where it would be closer to Asian manufacturing sites. The main concern in moving the data center from Middlebury to Singapore was not allowing it to appear to end users as if we moved it, says Edgecomb. Corporate headquarters has much of the sensitive data, and we are used to having it readily available with quick access, so we would be the ones affected by the change.

2 He found that users noticed the difference when using a Virtual Private network (VPN) connection with a 274-millisecond latency. But using Multiprotocol Label Switching (MPLS), together with Riverbed network optimization appliances, dropped the latency to 250ms. We are talking about milliseconds here, but there was a noticeable difference in the user experience, he says. Management was very pleasantly surprised. But to keep the traffic moving smoothly, he needed to see both the optimized and unoptimized traffic that traveled over the WAN. Rather than continue to use the cumbersome sniffer technology he had grown accustomed to, Edgecomb decided to activate NetFlow reporting on his edge routers. I put it in place and it quickly became my number one tool within a matter of hours, he says. It gave me the valuable data I needed without having to know how to dissect an IP packet. It is the equivalent of a dashboard that gives me valuable information, very quickly, to resolve network problems. Although flow monitoring technologies are not new sflow has been around since 2001 and NetFlow is up to Version 9 the products and techniques for monitoring network flows have evolved into flexible and lower cost solutions that integrate better with broader aspects of IT management such as security and virtualization. Network Ping Pong For most companies, network monitoring means using a utility that pings critical devices. If there is no response, a notification is sent out. Since the early 90 s these utilities have become increasingly sophisticated whereby synthetic transactions are used to ensure the actual application is communicating. Response time and availability reports can also be generated from the polled data and most monitoring applications are even providing Simple Network Management Protocol (SNMP) trends. Hardware vendors are steadily improving the quality of their graphical interfaces for equipment configuration and network statistics, so network monitoring software (NMS) vendors have focused on how to make their applications more intuitive and flexible.

3 Until recently, however, few advances beyond SNMP have been made to allow NMS companies to come out with something truly innovative. That changed when Cisco Systems decided to make the NetFlow technology that is part of its Internet Operating System (IOS) available for free. NetFlow provides near real time data on every packet that traverses the network, including its port information, destination and origin, says Yankee Group senior analyst Phil Hochmuth. You are following the footprints of every packet that traverses your network. As such, NetFlow gives administrators data similar to what they would receive from a packet analyzer, but at a fraction of the cost. Many networking equipment vendors have followed Cisco s lead and incorporated NetFlow in their own equipment. Others, however, have taken a hardware approach to the problem called sflow (sflow.org), which uses a chip with embedded software to provide the packet information. Originally developed by InMon Corporation, it is now supported by firms such as Hitachi, Hewlett Packard, Foundry Networks and NEC. The latest development in flow technology came when Cisco released NetFlow v.9, which provided the basis for the IP Flow information Export (IPFIX) protocol. NetFlow v.9 introduced Flexible NetFlow. Flexible NetFlow is more scalable than traditional NetFlow and allows users to customize the data gathered. Traditional NetFlow uses seven key fields (source IP address, destination IP address, source port, destination port, Layer 3 protocol, Type of Service byte, and input interface) to identify a packet and determine if it belongs to a particular flow. Traditional SNMP monitoring solutions give you information about bandwidth utilization which is helpful, but doesn t have the information you need when you are trying to investigate what that traffic consists of, says Les Kent, president of Progent Corporation, a network consulting firm headquartered in San Jose, Cal. NetFlow is very powerful because you can easily see the details of what comprises that bandwidth. With Flexible NetFlow, the user doesn t need to track all seven of the key fields, if some are not needed, but can also track additional fields such as timestamps, next hop IP addresses and subnet masks. Since the user can define what type of data he wants to track and which parameters of that flow, it reduces the amount of data reported.

4 Separate caches can also be designated for different types of information. For example, network security can have its own data cache designed for network anomaly detection, while the network administrators could use a different cache optimized for detecting and troubleshooting VoIP Quality of Service issues. No Lost Packets Another key development has been that lower prices are bringing flow monitoring into the reach of organizations that previously could not afford it. Traditionally, only larger organizations could deploy NetFlow solutions because of the cost and complication of setting up the tools, says Kent. One thing that has changed is there are getting to be much better and less expensive software solutions to take that NetFlow information and make it presentable. AdventNet's ManageEngine NetFlow Analyzer, for instance, has a free version for monitoring a single device, and costs $795 and up for larger editions. Other free and/or low cost versions include Plixer International's Scrutinizer v6 and InMon's sflow toolkit. Scott Chapiewski, data communications consultant for the Denver Regional Transportation District (RTD), has a network consisting of four large Cisco routers, which use NetFlow, and about 50 Hewlett-Packard ProCurve 5400 and 8200 series high-end switches, which provide sflow data. The agency has a WAN and MAN connecting 70 locations in the metropolitan area, primarily over gigabit fiber. To gather the sflow data, he uses Scrutinizer to monitor about 2300 ports at main locations. He says he also has HP s ProCurve Manager Plus product which reports sflow data, but found Scrutinizer to be a lot more thorough as far as the features and functionality for drilling down into that data. Scrutinizer gives us visibility at six of the seven OSI layers, Chapiewski says. Instead of just having visibility into the network at Layer 2 and Layer 3, we can see who is using it, what applications they are using and where they are going. It answers the who, what, when and where questions. He uses this tool to collect and store information about historical data for use in trending, as well as for troubleshooting network slowdowns. Being able to track the users and applications has been particularly helpful in this regard. For example, backups are not

5 supposed to be running during business hours, but sometimes they would spill over and would monopolize the bandwidth over a particular link. Now when a user calls about a slow connection, he can easily see what is running over that link. Prior to having this level of visibility, users might claim that they weren t using the system that much, when it turns out that they were the heaviest users by a multiple in some cases, he says. Having this information allows me to allocate our resources better. Security Included NetFlow and sflow are also moving out of their traditional roles and being used to support newer time sensitive applications such as VoIP and videoconferencing. A lot of organizations that deploy VoIP solutions are disappointed with the quality, says Kent. NetFlow is an essential tool for characterizing traffic and solving problems with your infrastructure so you can successfully deploy VoIP. NetFlow is also increasingly being integrated into security toolkits. We are starting to see emergence of a lot more vendors in the security, risk analysis and compliance areas that are starting to use NetFlow, says Hochmuth. There is more recognition by mainstream enterprises of NetFlow s value in terms of finding out what is really going on in your network from a security point of view. He says that with budget constraints and security being in the forefront, enterprise operations and security operations teams being forced to collaborate more. As a result, NetFlow adopting is rising and vendors are offering NetFlow monitoring products that integrate with Network Access Control (NAC), firewall and Intrusion Protection System products. There are ways to turn NetFlow triggers into actionable security counter measures, says Hochmuth. If a certain type of activity is detected by the NetFlow monitoring product, it can send messages to the security product - firewall or NAC - to shut down

6 that port or block traffic. Instead of just generating a report, it is possible now to be a bit more proactive. One company using NetFlow for security is AirTran Airways. Headquartered in Orlando, Fla. AirTran uses Lancope s StealthWatch System appliances for network monitoring and behavioral analysis on a network connecting 55 locations and several campuses. The airline started using StealthWatch as a means of complying with the Payment Card Industry (PCI) Data Security Standard for credit card transactions. Previously we recognized the value of Network Behavior Analysis tools, and StealthWatch in particular, but we could not justify the cost of the technology, says Michelle Stewart, AirTrans's Manager of Data Security. Now StealthWatch s ability to help demonstrate PCI compliance enabled us to immediately purchase and deploy. During testing, StealthWatch detected unauthorized remote access, worm activity and root cause analysis of increases in WAN activity. The depth of network behavior information is far beyond what is available with SNMP tools, says Stewart. Before StealthWatch, we had to manually analyze log data. Now we can get targeted reporting of pertinent information through the StealthWatch Management Console. In addition to the networking professionals, StealthWatch is also used by IT security resources and the customer support team. With it, all support groups within IT have access common network behavior data and can more quickly identify and resolve issues related to network behavior or malicious events. While security may be the widest adopted new application of NetFlow, the monitoring tools are also being integrated with other types of systems. Hochmuth recommends that organizations look at tying their NetFlow data to identities, rather than just IP addresses. By tying it do Active Directory or an LDAP directory, you can tie network activity to an individual. People move around in networks a lot plugging in in one place and then the moving to another office so ports and IP addresses do not always tell the story of who is doing

7 what on the network, Hochmuth says. You can correlate that NetFlow data with an identity and further create rules where triggers are set when people do certain things on the network as opposed to just these IP addresses. Edgecomb says that with the newest version of Scrutinizer allows him to collect data from VMware, giving him enhanced visibility into utilization in the virtual environment. We are looking at collecting the data there so we can get it down, not just to the network, but to the system level, he says. NetFlow Future These new features, coupled with the lower software costs, make it more worthwhile than ever before for data center operators to look at making NetFlow or sflow part of their standard operations, especially for those who earlier thought it was out of their price range. The accessibility of NetFlow information and tools is coming down to the point where even smaller organizations can deploy it and get use out of it, says Kent.

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

Network Visibility Guide

Network Visibility Guide Network Visibility Guide Even Superman could only see through walls, not networks! We understand your lack of Network visibility. So we give you ManageEngine NetFlow Analyzer! Network visibility is the

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

NetQoS Delivers Distributed Network

NetQoS Delivers Distributed Network Behind the Scenes with MySQL NetQoS Delivers Distributed Network Management Solution with Embedded MySQL NetQoS delivers products and services that enable some of the world s most demanding enterprises

More information

Take the NetFlow Challenge!

Take the NetFlow Challenge! TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about

More information

Traffic Analysis with Netflow The Key to Network Visibility

Traffic Analysis with Netflow The Key to Network Visibility Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7

More information

NetFlow-Lite offers network administrators and engineers the following capabilities:

NetFlow-Lite offers network administrators and engineers the following capabilities: Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require

More information

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand

More information

How To Make A Network Safer With Stealthwatch

How To Make A Network Safer With Stealthwatch Netzwerkkonzept Informationsveranstaltung am 03.07.2007 Im Bristol Hotel Mainz Thema: Ideen zum Netzwerkdesign - Switching -WLAN - Security - VoIP Datum: 03.07.2007, Seite: 1 Network Behaviour Analysis

More information

with NetFlow Technology Adam Powers Chief Technology Officer apowers@lancope.com

with NetFlow Technology Adam Powers Chief Technology Officer apowers@lancope.com Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer apowers@lancope.com www.lancope.com com Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NtFl

More information

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision

More information

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Extending Network Visibility by Leveraging NetFlow and sflow Technologies Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks

More information

Beyond Monitoring Root-Cause Analysis

Beyond Monitoring Root-Cause Analysis WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based

More information

Traffic monitoring with sflow and ProCurve Manager Plus

Traffic monitoring with sflow and ProCurve Manager Plus An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Network Performance + Security Monitoring

Network Performance + Security Monitoring Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance

More information

Traffic Analysis With Netflow. The Key to Network Visibility

Traffic Analysis With Netflow. The Key to Network Visibility Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators

More information

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise

More information

NetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

NetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o. NetFlow: What is it, why and how to use it?, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow

More information

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended

More information

Traffic Monitoring using sflow

Traffic Monitoring using sflow Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can

More information

Securing and Monitoring BYOD Networks using NetFlow

Securing and Monitoring BYOD Networks using NetFlow Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine

More information

Enhancing Flow Based Network Monitoring

Enhancing Flow Based Network Monitoring Enhancing Flow Based Network Monitoring Flow-based technologies such as NetFlow, sflow, J-Flow, and IPFIX are increasingly popular tools used by network operators. The tools leverage the capabilities embedded

More information

NetFlow Tips and Tricks

NetFlow Tips and Tricks NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...

More information

Scrutinizer. Getting Started Guide. A message from Plixer International:

Scrutinizer. Getting Started Guide. A message from Plixer International: Scrutinizer Getting Started Guide A message from Plixer International: Thank you for taking the time to download and install Scrutinizer NetFlow & sflow Analyzer. We believe that Scrutinizer is a useful

More information

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Extending Network Visibility by Leveraging NetFlow and sflow Technologies Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks

More information

UKCMG Industry Forum November 2006

UKCMG Industry Forum November 2006 UKCMG Industry Forum November 2006 Capacity and Performance Management of IP Networks Using IP Flow Measurement Agenda Challenges of capacity and performance management of IP based networks What is IP

More information

Whitepaper. NetFlow vs. sflow: A Technical Review. plixer. International

Whitepaper. NetFlow vs. sflow: A Technical Review. plixer. International Whitepaper NetFlow vs. sflow: A Technical Review 1 plixer Table of Contents Abstract Introduction NetFlow sflow Lab Configuration Hardware Collection and Analysis Utilization Measurements Top Hosts Don

More information

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco

More information

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction

More information

Enterprise Network Traffic Informatics

Enterprise Network Traffic Informatics A CIO's hand guide White Paper Summary This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today's global enterprises. By harnessing the data contained in

More information

Distributed-Enterprise Network Traffic Informatics A CIO s hand guide >>WHITE PAPER

Distributed-Enterprise Network Traffic Informatics A CIO s hand guide >>WHITE PAPER >>WHITE PAPER Distributed-Enterprise Network Traffic Informatics A CIO s hand guide This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today s global enterprises.

More information

Best Practices for NetFlow/IPFIX Analysis and Reporting

Best Practices for NetFlow/IPFIX Analysis and Reporting WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management

More information

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope Maximize Network Visibility with NetFlow Technology Andy Wilson Senior Systems Engineer Lancope Agenda What is NetFlow Introduction to NetFlow NetFlow Examples NetFlow in Action Network Operations User

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

Managing Application Delivery from the User s Perspective

Managing Application Delivery from the User s Perspective Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

Network Management Back to the Basics. Brad Hale

Network Management Back to the Basics. Brad Hale Network Management Back to the Basics Brad Hale Table of Contents The Fundamental Protocols of Network Management... 3 Simple Network Management Protocol (SNMP)...4 Management Information Base (MIB)...6

More information

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Network Performance Management Solutions Architecture

Network Performance Management Solutions Architecture Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained

More information

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz 8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (

More information

Bringing Enterprise-class Network Performance and Security Management Together using NetFlow

Bringing Enterprise-class Network Performance and Security Management Together using NetFlow Bringing Enterprise-class Network Performance and Security Management Together using NetFlow An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Lancope November 2009 IT MANAGEMENT RESEARCH,

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

Elevating Data Center Performance Management

Elevating Data Center Performance Management Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

SolarWinds Network Performance Monitor powerful network fault & availabilty management

SolarWinds Network Performance Monitor powerful network fault & availabilty management SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004 Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7

More information

How To Manage A Network For A Small Business

How To Manage A Network For A Small Business Summary ManageEngine UK Distributor Ensuring optimal network performance 24/7 is critical to business success, irrespective of whether you are small or big. This paper examines the basic functionality

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Introduction to Network Discovery and Identity

Introduction to Network Discovery and Identity The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity

More information

Cisco Network Analysis Module Software 4.0

Cisco Network Analysis Module Software 4.0 Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application

More information

SolarWinds Network Performance Monitor

SolarWinds Network Performance Monitor SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,

More information

Detection of illegal gateways in protected networks

Detection of illegal gateways in protected networks Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

NetFlow The De Facto Standard for Traffic Analytics

NetFlow The De Facto Standard for Traffic Analytics NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine

More information

How-To Configure NetFlow v5 & v9 on Cisco Routers

How-To Configure NetFlow v5 & v9 on Cisco Routers How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,

More information

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand Whitepaper Controlling the Network Edge to Accommodate Increasing Demand February 2007 Introduction A common trend in today s distributed work environment is to centralize applications and the data previously

More information

How To Set Up Foglight Nms For A Proof Of Concept

How To Set Up Foglight Nms For A Proof Of Concept Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is

More information

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates

More information

Understanding Flow and Packet Deduplication

Understanding Flow and Packet Deduplication WHITE PAPER Understanding Flow and Packet Deduplication Riverbed Technical Marketing 2012 Riverbed Technology. All rights reserved. Riverbed, Cloud Steelhead, Granite, Interceptor, RiOS, Steelhead, Think

More information

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers

More information

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross tcross@lancope.com Charles Herring cherring@lancope.com 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Cisco NetFlow Generation Appliance (NGA) 3140

Cisco NetFlow Generation Appliance (NGA) 3140 Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance

More information

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.

More information

Unified network traffic monitoring for physical and VMware environments

Unified network traffic monitoring for physical and VMware environments Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers

More information

A message from Plixer International:

A message from Plixer International: Scrutinizer Getting Started Guide A message from Plixer International: Thank you for taking the time to download and install Scrutinizer. We believe that Scrutinizer is a useful tool for any Network industry

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

SOLARWINDS NETWORK PERFORMANCE MONITOR

SOLARWINDS NETWORK PERFORMANCE MONITOR DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

SonicOS 5.8: NetFlow Reporting

SonicOS 5.8: NetFlow Reporting SonicOS 5.8: NetFlow Reporting Document Scope Rapid growth of IP networks has created interest in new business applications and services. These new services have resulted in increases in demand for network

More information

Cisco Bandwidth Quality Manager 3.1

Cisco Bandwidth Quality Manager 3.1 Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.

More information

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into

More information

Network Security Monitoring: Looking Beyond the Network

Network Security Monitoring: Looking Beyond the Network 1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT iburke@headwallsecurity.com iburke@middlebury.edu February 8, 2011 2 Abstract Network security monitoring

More information

HP PCM Plus v4 Network Management Software Series

HP PCM Plus v4 Network Management Software Series HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

Observer Reporting Server Sample Executive Reports

Observer Reporting Server Sample Executive Reports Observer Reporting Server Sample Executive Reports Enterprise-wide monitoring and reporting with root-cause analysis Table of Contents Observer Reporting Server Introduction to the Observer Reporting Server

More information

HP E-PCM Plus Network Management Software Series

HP E-PCM Plus Network Management Software Series Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security

More information

OpManager MSP Edition

OpManager MSP Edition OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable

More information

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides

More information

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,

More information

Internet Content Provider Safeguards Customer Networks and Services

Internet Content Provider Safeguards Customer Networks and Services Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor

More information

Enhancing Network Monitoring with Route Analytics

Enhancing Network Monitoring with Route Analytics with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments

More information

A Guide to Understanding SNMP

A Guide to Understanding SNMP A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few

More information