Love at Second Sight. Written by Drew Robb
|
|
- June Harris
- 8 years ago
- Views:
Transcription
1 Love at Second Sight Once limited to monitoring networking equipment at large organizations, a new generation of NetFlow and sflow monitoring tools are gaining ground with data centers large and small as an effective means of keeping tabs on network, as well as supplementing security. Written by Drew Robb Sometimes it is love at first sight: the ipod and iphone were both instant successes. Other times the affection slowly grows over time: Ray Tomlinson sent the first over ARPAnet in 1971, but it took another two decades or more before it became a common business tool. NetFlow and sflow network management technologies have taken the slow approach. Both have been around for years, but the early versions were somewhat cumbersome. As a result, data center managers are slow to take advantage of them. In 2008, network analysis software vendor Network Instruments, LLC, conducted a survey of 600 IT professionals. It found that 77% were unaware of NetFlow or were not using it to monitor their networks. Many who were earlier deterred by the cost and complexity of implementation are giving these networking tools a new look. When they do, they are often surprised at how much easier they are to use and the bang they can now get for their networking buck. Take the case of Timex Corporation, originally known as the Middlebury Clock Company. For 150 years, it has been helping people stay on schedule. While the train conductors in the 1850s would have been happy being able to track their stops to the minute, for Dave Edgecomb, Timex s Manager of Global Technical Operations, it is milliseconds that matter. He oversaw the move of the company s data center halfway around the world from the Middlebury, Conn. headquarters to a collocation facility in Singapore where it would be closer to Asian manufacturing sites. The main concern in moving the data center from Middlebury to Singapore was not allowing it to appear to end users as if we moved it, says Edgecomb. Corporate headquarters has much of the sensitive data, and we are used to having it readily available with quick access, so we would be the ones affected by the change.
2 He found that users noticed the difference when using a Virtual Private network (VPN) connection with a 274-millisecond latency. But using Multiprotocol Label Switching (MPLS), together with Riverbed network optimization appliances, dropped the latency to 250ms. We are talking about milliseconds here, but there was a noticeable difference in the user experience, he says. Management was very pleasantly surprised. But to keep the traffic moving smoothly, he needed to see both the optimized and unoptimized traffic that traveled over the WAN. Rather than continue to use the cumbersome sniffer technology he had grown accustomed to, Edgecomb decided to activate NetFlow reporting on his edge routers. I put it in place and it quickly became my number one tool within a matter of hours, he says. It gave me the valuable data I needed without having to know how to dissect an IP packet. It is the equivalent of a dashboard that gives me valuable information, very quickly, to resolve network problems. Although flow monitoring technologies are not new sflow has been around since 2001 and NetFlow is up to Version 9 the products and techniques for monitoring network flows have evolved into flexible and lower cost solutions that integrate better with broader aspects of IT management such as security and virtualization. Network Ping Pong For most companies, network monitoring means using a utility that pings critical devices. If there is no response, a notification is sent out. Since the early 90 s these utilities have become increasingly sophisticated whereby synthetic transactions are used to ensure the actual application is communicating. Response time and availability reports can also be generated from the polled data and most monitoring applications are even providing Simple Network Management Protocol (SNMP) trends. Hardware vendors are steadily improving the quality of their graphical interfaces for equipment configuration and network statistics, so network monitoring software (NMS) vendors have focused on how to make their applications more intuitive and flexible.
3 Until recently, however, few advances beyond SNMP have been made to allow NMS companies to come out with something truly innovative. That changed when Cisco Systems decided to make the NetFlow technology that is part of its Internet Operating System (IOS) available for free. NetFlow provides near real time data on every packet that traverses the network, including its port information, destination and origin, says Yankee Group senior analyst Phil Hochmuth. You are following the footprints of every packet that traverses your network. As such, NetFlow gives administrators data similar to what they would receive from a packet analyzer, but at a fraction of the cost. Many networking equipment vendors have followed Cisco s lead and incorporated NetFlow in their own equipment. Others, however, have taken a hardware approach to the problem called sflow (sflow.org), which uses a chip with embedded software to provide the packet information. Originally developed by InMon Corporation, it is now supported by firms such as Hitachi, Hewlett Packard, Foundry Networks and NEC. The latest development in flow technology came when Cisco released NetFlow v.9, which provided the basis for the IP Flow information Export (IPFIX) protocol. NetFlow v.9 introduced Flexible NetFlow. Flexible NetFlow is more scalable than traditional NetFlow and allows users to customize the data gathered. Traditional NetFlow uses seven key fields (source IP address, destination IP address, source port, destination port, Layer 3 protocol, Type of Service byte, and input interface) to identify a packet and determine if it belongs to a particular flow. Traditional SNMP monitoring solutions give you information about bandwidth utilization which is helpful, but doesn t have the information you need when you are trying to investigate what that traffic consists of, says Les Kent, president of Progent Corporation, a network consulting firm headquartered in San Jose, Cal. NetFlow is very powerful because you can easily see the details of what comprises that bandwidth. With Flexible NetFlow, the user doesn t need to track all seven of the key fields, if some are not needed, but can also track additional fields such as timestamps, next hop IP addresses and subnet masks. Since the user can define what type of data he wants to track and which parameters of that flow, it reduces the amount of data reported.
4 Separate caches can also be designated for different types of information. For example, network security can have its own data cache designed for network anomaly detection, while the network administrators could use a different cache optimized for detecting and troubleshooting VoIP Quality of Service issues. No Lost Packets Another key development has been that lower prices are bringing flow monitoring into the reach of organizations that previously could not afford it. Traditionally, only larger organizations could deploy NetFlow solutions because of the cost and complication of setting up the tools, says Kent. One thing that has changed is there are getting to be much better and less expensive software solutions to take that NetFlow information and make it presentable. AdventNet's ManageEngine NetFlow Analyzer, for instance, has a free version for monitoring a single device, and costs $795 and up for larger editions. Other free and/or low cost versions include Plixer International's Scrutinizer v6 and InMon's sflow toolkit. Scott Chapiewski, data communications consultant for the Denver Regional Transportation District (RTD), has a network consisting of four large Cisco routers, which use NetFlow, and about 50 Hewlett-Packard ProCurve 5400 and 8200 series high-end switches, which provide sflow data. The agency has a WAN and MAN connecting 70 locations in the metropolitan area, primarily over gigabit fiber. To gather the sflow data, he uses Scrutinizer to monitor about 2300 ports at main locations. He says he also has HP s ProCurve Manager Plus product which reports sflow data, but found Scrutinizer to be a lot more thorough as far as the features and functionality for drilling down into that data. Scrutinizer gives us visibility at six of the seven OSI layers, Chapiewski says. Instead of just having visibility into the network at Layer 2 and Layer 3, we can see who is using it, what applications they are using and where they are going. It answers the who, what, when and where questions. He uses this tool to collect and store information about historical data for use in trending, as well as for troubleshooting network slowdowns. Being able to track the users and applications has been particularly helpful in this regard. For example, backups are not
5 supposed to be running during business hours, but sometimes they would spill over and would monopolize the bandwidth over a particular link. Now when a user calls about a slow connection, he can easily see what is running over that link. Prior to having this level of visibility, users might claim that they weren t using the system that much, when it turns out that they were the heaviest users by a multiple in some cases, he says. Having this information allows me to allocate our resources better. Security Included NetFlow and sflow are also moving out of their traditional roles and being used to support newer time sensitive applications such as VoIP and videoconferencing. A lot of organizations that deploy VoIP solutions are disappointed with the quality, says Kent. NetFlow is an essential tool for characterizing traffic and solving problems with your infrastructure so you can successfully deploy VoIP. NetFlow is also increasingly being integrated into security toolkits. We are starting to see emergence of a lot more vendors in the security, risk analysis and compliance areas that are starting to use NetFlow, says Hochmuth. There is more recognition by mainstream enterprises of NetFlow s value in terms of finding out what is really going on in your network from a security point of view. He says that with budget constraints and security being in the forefront, enterprise operations and security operations teams being forced to collaborate more. As a result, NetFlow adopting is rising and vendors are offering NetFlow monitoring products that integrate with Network Access Control (NAC), firewall and Intrusion Protection System products. There are ways to turn NetFlow triggers into actionable security counter measures, says Hochmuth. If a certain type of activity is detected by the NetFlow monitoring product, it can send messages to the security product - firewall or NAC - to shut down
6 that port or block traffic. Instead of just generating a report, it is possible now to be a bit more proactive. One company using NetFlow for security is AirTran Airways. Headquartered in Orlando, Fla. AirTran uses Lancope s StealthWatch System appliances for network monitoring and behavioral analysis on a network connecting 55 locations and several campuses. The airline started using StealthWatch as a means of complying with the Payment Card Industry (PCI) Data Security Standard for credit card transactions. Previously we recognized the value of Network Behavior Analysis tools, and StealthWatch in particular, but we could not justify the cost of the technology, says Michelle Stewart, AirTrans's Manager of Data Security. Now StealthWatch s ability to help demonstrate PCI compliance enabled us to immediately purchase and deploy. During testing, StealthWatch detected unauthorized remote access, worm activity and root cause analysis of increases in WAN activity. The depth of network behavior information is far beyond what is available with SNMP tools, says Stewart. Before StealthWatch, we had to manually analyze log data. Now we can get targeted reporting of pertinent information through the StealthWatch Management Console. In addition to the networking professionals, StealthWatch is also used by IT security resources and the customer support team. With it, all support groups within IT have access common network behavior data and can more quickly identify and resolve issues related to network behavior or malicious events. While security may be the widest adopted new application of NetFlow, the monitoring tools are also being integrated with other types of systems. Hochmuth recommends that organizations look at tying their NetFlow data to identities, rather than just IP addresses. By tying it do Active Directory or an LDAP directory, you can tie network activity to an individual. People move around in networks a lot plugging in in one place and then the moving to another office so ports and IP addresses do not always tell the story of who is doing
7 what on the network, Hochmuth says. You can correlate that NetFlow data with an identity and further create rules where triggers are set when people do certain things on the network as opposed to just these IP addresses. Edgecomb says that with the newest version of Scrutinizer allows him to collect data from VMware, giving him enhanced visibility into utilization in the virtual environment. We are looking at collecting the data there so we can get it down, not just to the network, but to the system level, he says. NetFlow Future These new features, coupled with the lower software costs, make it more worthwhile than ever before for data center operators to look at making NetFlow or sflow part of their standard operations, especially for those who earlier thought it was out of their price range. The accessibility of NetFlow information and tools is coming down to the point where even smaller organizations can deploy it and get use out of it, says Kent.
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
More informationGaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
More informationNetwork Visibility Guide
Network Visibility Guide Even Superman could only see through walls, not networks! We understand your lack of Network visibility. So we give you ManageEngine NetFlow Analyzer! Network visibility is the
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationNetQoS Delivers Distributed Network
Behind the Scenes with MySQL NetQoS Delivers Distributed Network Management Solution with Embedded MySQL NetQoS delivers products and services that enable some of the world s most demanding enterprises
More informationTake the NetFlow Challenge!
TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about
More informationTraffic Analysis with Netflow The Key to Network Visibility
Traffic Analysis with Netflow The Key to Network Visibility > WHITEPAPER Executive Summary Enterprises today, know that the WAN is one of their most important assets. It needs to be up and running 24x7
More informationNetFlow-Lite offers network administrators and engineers the following capabilities:
Solution Overview Cisco NetFlow-Lite Introduction As networks become more complex and organizations enable more applications, traffic patterns become more diverse and unpredictable. Organizations require
More informationCISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
More informationHow To Make A Network Safer With Stealthwatch
Netzwerkkonzept Informationsveranstaltung am 03.07.2007 Im Bristol Hotel Mainz Thema: Ideen zum Netzwerkdesign - Switching -WLAN - Security - VoIP Datum: 03.07.2007, Seite: 1 Network Behaviour Analysis
More informationwith NetFlow Technology Adam Powers Chief Technology Officer apowers@lancope.com
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer apowers@lancope.com www.lancope.com com Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NtFl
More informationSLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationBeyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
More informationTraffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationNetwork Performance + Security Monitoring
Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance
More informationTraffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
More informationwhitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
More informationNetFlow: What is it, why and how to use it? Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
More informationplixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
More informationSTEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
More informationNetwork Instruments white paper
Network Instruments white paper EXTENDING NETWORK VISIBILITY BY LEVERAGING NETFLOW AND SFLOW TECHNOLOGIES This paper shows how a network analyzer that can leverage and sflow technologies can provide extended
More informationTraffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
More informationSecuring and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
More informationEnhancing Flow Based Network Monitoring
Enhancing Flow Based Network Monitoring Flow-based technologies such as NetFlow, sflow, J-Flow, and IPFIX are increasingly popular tools used by network operators. The tools leverage the capabilities embedded
More informationNetFlow Tips and Tricks
NetFlow Tips and Tricks Introduction... 2 NetFlow and other Flow Technologies... 2 NetFlow Tips and Tricks... 4 Tech Tip 1: Troubleshooting Network Issues... 4 Tech Tip 2: Network Anomaly Detection...
More informationScrutinizer. Getting Started Guide. A message from Plixer International:
Scrutinizer Getting Started Guide A message from Plixer International: Thank you for taking the time to download and install Scrutinizer NetFlow & sflow Analyzer. We believe that Scrutinizer is a useful
More informationExtending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
More informationUKCMG Industry Forum November 2006
UKCMG Industry Forum November 2006 Capacity and Performance Management of IP Networks Using IP Flow Measurement Agenda Challenges of capacity and performance management of IP based networks What is IP
More informationWhitepaper. NetFlow vs. sflow: A Technical Review. plixer. International
Whitepaper NetFlow vs. sflow: A Technical Review 1 plixer Table of Contents Abstract Introduction NetFlow sflow Lab Configuration Hardware Collection and Analysis Utilization Measurements Top Hosts Don
More informationCisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services
Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services What You Will Learn In today s economy, IT departments are challenged to decide
More informationNetwork Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
More informationCisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
More informationOverview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco
More informationNetwork Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
More informationEnterprise Network Traffic Informatics
A CIO's hand guide White Paper Summary This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today's global enterprises. By harnessing the data contained in
More informationDistributed-Enterprise Network Traffic Informatics A CIO s hand guide >>WHITE PAPER
>>WHITE PAPER Distributed-Enterprise Network Traffic Informatics A CIO s hand guide This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today s global enterprises.
More informationBest Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
More informationMaximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope
Maximize Network Visibility with NetFlow Technology Andy Wilson Senior Systems Engineer Lancope Agenda What is NetFlow Introduction to NetFlow NetFlow Examples NetFlow in Action Network Operations User
More informationSolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
More informationNetwork Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
More informationManaging Application Delivery from the User s Perspective
Managing Application Delivery from the User s Perspective Essential Monitoring Capabilities and Metrics for Assessing End-User Experience Network managers are tasked with monitoring end-user experience,
More informationSolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
More informationSNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
More informationNetwork Management Back to the Basics. Brad Hale
Network Management Back to the Basics Brad Hale Table of Contents The Fundamental Protocols of Network Management... 3 Simple Network Management Protocol (SNMP)...4 Management Information Base (MIB)...6
More informationPlugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationNetwork Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
More information8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz
8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (
More informationBringing Enterprise-class Network Performance and Security Management Together using NetFlow
Bringing Enterprise-class Network Performance and Security Management Together using NetFlow An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Lancope November 2009 IT MANAGEMENT RESEARCH,
More informationScalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
More informationElevating Data Center Performance Management
Elevating Data Center Performance Management Data Center innovation reduces operating expense, maximizes employee productivity, and generates new sources of revenue. However, many I&O teams lack proper
More informationSolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
More informationSolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
More informationCisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
More informationHow To Manage A Network For A Small Business
Summary ManageEngine UK Distributor Ensuring optimal network performance 24/7 is critical to business success, irrespective of whether you are small or big. This paper examines the basic functionality
More informationSTEALTHWATCH MANAGEMENT CONSOLE
System STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
More informationWhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More informationNetwork Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
More informationIntroduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
More informationCisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
More informationSolarWinds Network Performance Monitor
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose,
More informationDetection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia firstname.lastname@ccdcoe.org 1. Introduction In this
More informationFail-Safe IPS Integration with Bypass Technology
Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive
More informationNetFlow The De Facto Standard for Traffic Analytics
NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine
More informationHow-To Configure NetFlow v5 & v9 on Cisco Routers
How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,
More informationWhitepaper. Controlling the Network Edge to Accommodate Increasing Demand
Whitepaper Controlling the Network Edge to Accommodate Increasing Demand February 2007 Introduction A common trend in today s distributed work environment is to centralize applications and the data previously
More informationHow To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
More informationpt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
More informationUnderstanding Flow and Packet Deduplication
WHITE PAPER Understanding Flow and Packet Deduplication Riverbed Technical Marketing 2012 Riverbed Technology. All rights reserved. Riverbed, Cloud Steelhead, Granite, Interceptor, RiOS, Steelhead, Think
More informationNetwork-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
More informationHUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross tcross@lancope.com Charles Herring cherring@lancope.com 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationCisco NetFlow Generation Appliance (NGA) 3140
Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance
More informationRecommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
More informationUnified network traffic monitoring for physical and VMware environments
Unified network traffic monitoring for physical and VMware environments Applications and servers hosted in a virtual environment have the same network monitoring requirements as applications and servers
More informationA message from Plixer International:
Scrutinizer Getting Started Guide A message from Plixer International: Thank you for taking the time to download and install Scrutinizer. We believe that Scrutinizer is a useful tool for any Network industry
More informationForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
More informationSOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
More informationSonicOS 5.8: NetFlow Reporting
SonicOS 5.8: NetFlow Reporting Document Scope Rapid growth of IP networks has created interest in new business applications and services. These new services have resulted in increases in demand for network
More informationCisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
More informationKaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
More informationNetwork Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT iburke@headwallsecurity.com iburke@middlebury.edu February 8, 2011 2 Abstract Network security monitoring
More informationHP PCM Plus v4 Network Management Software Series
HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network
More information- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
More informationObserver Reporting Server Sample Executive Reports
Observer Reporting Server Sample Executive Reports Enterprise-wide monitoring and reporting with root-cause analysis Table of Contents Observer Reporting Server Introduction to the Observer Reporting Server
More informationHP E-PCM Plus Network Management Software Series
Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security
More informationOpManager MSP Edition
OpManager MSP Edition Product Overview (6.5) June 2007 Agenda MSP Edition Architecture And Features About OpManager MSP Demo (https://mspdemo.opmanager.com) MSP Edition Architecture And Features Scalable
More informationQuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
More informationRedefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
More informationInternet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
More informationEnhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
More informationA Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
More information