Distributed-Enterprise Network Traffic Informatics A CIO s hand guide >>WHITE PAPER



Similar documents
Enterprise Network Traffic Informatics

UKCMG Industry Forum November 2006

NetFlow Tips and Tricks

Gaining Operational Efficiencies with the Enterasys S-Series

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Fluke Networks NetFlow Tracker

Network Instruments white paper

Flow Analysis Versus Packet Analysis. What Should You Choose?

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Network Monitoring Comparison

Enhancing Flow Based Network Monitoring

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

QRadar Security Intelligence Platform Appliances

Traffic Analysis with Netflow The Key to Network Visibility

and reporting Slavko Gajin

Scalable Extraction, Aggregation, and Response to Network Intelligence

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Traffic Analysis With Netflow. The Key to Network Visibility

Unified network traffic monitoring for physical and VMware environments

Securing and Monitoring BYOD Networks using NetFlow

NetFlow The De Facto Standard for Traffic Analytics

Beyond Monitoring Root-Cause Analysis

NetFlow-Lite offers network administrators and engineers the following capabilities:

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management

How To Understand The Difference Between Network Analysis And Network Monitoring

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Application Visibility and Monitoring >

Cisco and Visual Network Systems: Implement an End-to-End Application Performance Management Solution for Managed Services

Best Practices for NetFlow/IPFIX Analysis and Reporting

Network Visibility Guide

Ranch Networks for Hosted Data Centers

Cisco NetFlow Generation Appliance (NGA) 3140

Love at Second Sight. Written by Drew Robb

with NetFlow Technology Adam Powers Chief Technology Officer

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

Observer Probe Family

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

QRadar Security Management Appliances

Understanding Flow and Packet Deduplication

OpManager MSP Edition

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

Application Monitoring and Network Visibility A complete view of your network

Comparison of Costs and Return on Investments of IT Investments

White Paper. Jim Frey, Enterprise Management Associates

Network Performance Monitoring at Minimal Capex

Cisco IOS Flexible NetFlow Technology

Beyond Monitoring Root-Cause Analysis

QRadar SIEM 6.3 Datasheet

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Data Center Networking Managing a Virtualized Environment

Application-Centric Analysis Helps Maximize the Value of Wireshark

Traffic monitoring with sflow and ProCurve Manager Plus

Application Performance Management

Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept

Study of Network Performance Monitoring Tools-SNMP

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

How To Make A Network Safer With Stealthwatch

Flow Based Traffic Analysis

Network Management Back to the Basics. Brad Hale

Leveraging SDN and NFV in the WAN

February Considerations When Choosing a Secure Web Gateway

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

Secure and Effective IT Infrastructure

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones

Network Management Deployment Guide

End-to-End Network Centric Performance Management

How To Set Up Foglight Nms For A Proof Of Concept

Worldwide WAN Optimization Management Forecast and Analysis

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

Traffic Monitoring using sflow

What Makes The Large Enterprise, Large? A Network Management Perspective

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Get Your FIX: Flow Information export Analysis and Visualization

How-To Configure NetFlow v5 & v9 on Cisco Routers

Technical Note. ForeScout CounterACT: Virtual Firewall

Riverbed SteelCentral. Product Family Brochure

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

5View NetFlow Powerful Real-time Application Flow Monitoring and Analysis

Huawei esight Brief Product Brochure

Managing Central Monitoring in Distributed Systems

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

SDN and NFV in the WAN

NetFlow Analytics for Splunk

WAN Optimization. Riverbed Steelhead Appliances

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

Ipswitch WhatsUp Gold vs. Solarwinds Orion Comparing Product Offerings

Network audit Campina UK Horsham November 10th, 2004

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Transcription:

>>WHITE PAPER Distributed-Enterprise Network Traffic Informatics A CIO s hand guide This paper puts forth the importance of having an enterprise wide network traffic analysis tool in today s global enterprises. By harnessing the data contained in the flow exports (NetFlow / sflow/cflowd / jflow / Netstream / IpFix) from the routers/switches one can get deep insights in to the network traffic especially the who, what, why aspects of the bandwidth usage. Such knowledge is vital for IT heads to take the right strategic decisions that can benefit the whole organization. In discussing the various methodologies, this paper brings out the advantages of deploying a flow-based pure-software solution that uses distributed-collection technique. Unlike the hardware probe-based monitoring, the flowbased software-solution has the advantage of lower investment, easiness of installation, and delivery of value in a matter of hours.

Table of Contents 1. The end of Business, as we know it...3 2. Enterprise Bandwidth Monitoring - A Strategic Requirement...4 3. Typical Approaches to Bandwidth Monitoring...5 4. The Flow-based software solution...7 5. The Flow-based distributed monitoring solution...8 6. Conclusion...9 2

1. The end of Business, as we know it In today s world, where the business landscape is changing fast, computer networks play a vital role. No longer is business confined to the four walls of the enterprise. Large enterprises today, need to pursue strategies like offshoring, outsourcing, smart-sourcing etc to be competitive. Under this, the nature of work gets globalized and work gets done across geographies and time zones. Welcome to the Distributed Enterprise! Figure 1: The Distributed Enterprise Some of the strategies pursued by today s enterprises: It is common to see enterprises have their headquarters based out of UK, the suppliers of raw materials (supply chain) based out of China, Brazil and Norway, the knowledge workforce based out India, its roadwarriors (sales & marketing staff) spread across the globe, and have all its sales happen the e-commerce way To avoid legal hassles and to comply with the growing emphasis on data integrity and security, (thanks to HIPAA, SOX and the like), enterprises today prefer to have their entire database on all aspects of their business in a secure central data center, mostly based in the US To overcome the cost associated with deploying skilled network administrators at various distributed office locations and also to overcome the challenge of skilled finding personnel, enterprises prefer a centralized monitoring of their global networks 3

Every enterprise that wants to cut costs and remain competitive is doing away with the costs associated with acquiring proprietary software/applications. The emerging trend is enterprises moving towards the hosted or the SaaS (Software as a Service) model. This includes web-based applications like Salesforce.com for sales force automation, Zoho for enterprise productivity, etc. In such conditions facilitating access/communication between the various constituents of the distributed network and ensuring access to the datacentre/saas application from the remote offices becomes crucial. Also to monitor the whole network from a centralized location having a unified view of the entire network becomes indispensable. Enterprise bandwidth monitoring is today an indispensable core requirement, and quite a strategic one at that. 2. Enterprise Bandwidth Monitoring - A Strategic Requirement With such sweeping changes embracing the enterprises, has the network administrator s responsibility to ensure high level of WAN availability all the time, become very critical. Especially as enterprises get global, there comes the challenge of managing the health and performance of the entire network including the remote/branch office. Any degradation in the network performance anywhere in the network, could lead to significant productivity loss and employee frustration. It gets all the more important to be sure that no unwanted traffic / network abuse /network attack is happening at any point in time. The main challenges in such a scenario include: Ensuring strong network connectivity and bandwidth availability at all times Bandwidth should not be a limiting factor to a business success Ensuring optimal bandwidth for critical applications ensure revenue generating applications take precedence over trivial applications Being able to prioritize critical applications like access to SAP HRMS, Oracle Financials, Zoho CRM, Salesforce.com or access to the company s IBM mainframe at head office over trivial things like streaming videos, music downloads etc Quickly troubleshooting any network incidents pinning down the root cause of problem to fix it fast In the event of a capacity planning doing it accurately as the costs involved are huge when it comes to large enterprises Having a tab on the globally spanning network Be in the Know: is your enterprise network bandwidth being used or abused and also to be able to charge back to remote offices if needed. The lack of availability of qualified network administrators need to be overcome by a centralized monitoring delivered to the Network manager Ensuring the quality of the service delivered by the ISP is in line with the terms of the agreement 4

The only way to address these problems is by having a very strong enterprise wide bandwidth monitoring and traffic analysis tool. By having a knowledge of the traffic patterns in similar departments across offices / geographies and the causes of bandwidth consumption a Network Admin / CIO can take educated decisions. This information enables the network admin to enforce appropriate policies to restrict undesired bandwidth usage like downloading music files or watching videos off you-tube during business hours. At the CIO level, a unified collective view of the bandwidth consumption across the distributed enterprise can help in taking an accurate strategic decision - capacity planning (ordering more bandwidth), for instance. Also, having access to historic data of traffic usage pattern helps to benchmark current usage levels. 3. Typical Approaches to Bandwidth Monitoring A cursory look at the solutions available in the market shows that there are solutions of various types to choose from. In general they can be classified based on the underlying technology (data acquisition technique) Based on the data acquisition technique: The solutions available in the market adopt one of these techniques: SNMP query, Test Access Ports (TAPs) or SPAN Ports, Packet Sniffing and analyzing Flow exports like NetFlow / sflow / cflowd / jflow / Netstream / IPFIX. SNMP or Simple Network Management Protocol uses SNMP queries on SNMP agents running in the network device, to get information on the bandwidth usage in the network. SNMP query gives a consolidated or bulk traffic figure. So, this needs to be complemented with in depth network traffic analysis that answers questions like who, when, what aspects of the bandwidth usage. Also, as it uses the pull-technology it may cause considerable load on the enterprise bandwidth. Span ports (Switched Ports Analyzer) is a port designated on switches to mirror traffic received on other ports. Test access ports are traffic replicators placed in between two routers, firewalls or enterprise switches that sends a copy of all the network traffic flowing through them. Span or Tap ports can be used to forward network traffic to Software applications or hardware probes for traffic analysis. Network traffic can be tapped via them. The downside is the cost involved in procurement, deployment and management of these probes. Packet Sniffer intercepts and collects the local traffic by capturing the packets from the network that the sniffer is attached to. A "sniffer" is useful in network troubleshooting, network intrusion detection, monitoring network usage. The advantage is the ability it lends to account the actual traffic by IP address and the protocol. The downside is the heavy load caused on the monitoring system. Flow based technology harness the information contained in the flow exports like NetFlow, sflow, cflowd, jflow, Netstream, IpFix and present an in depth view of the traffic flow. They offer a scalable and a low cost approach to have deep insight into the network traffic based on layer 3 and layer 4 level, packet information. With them one can 5

know the - who, what when aspects of bandwidth usage. Using the data extracted from the flows the following can be known: Who are the top talkers in the network? When did the traffic peak and why? How long was the bandwidth hit and why? The source- and destination involved in a Conversation This approach provides the information necessary to make capacity planning decisions and to detect any form of network abuse, in monitoring QoS and to certain extent in identifying security attacks. The below table lists the vendors, whose devices are capable of exporting one of Cisco NetFlow, sflow, cflowd, jflow, NetStream, IPFIX. Type of Flow NetFlow sflow cflowd /jflow Netstream IPFIX Supporting Vendor Devices Cisco Devices, Enterasys, Extreme Networks, Foundry Networks, 3com, Riverbed Alcatel, Extreme Networks, Foundry Networks, Hitachi, NEC, Alaxala Networks, Allied Telesis, Hewlett Packard, Comtec Systems, Force10 Networks Juniper Huawei, H3C Nortel devices Table 1: Various Flows & Supporting Vendors Let us consider the case of a software solution that is based on harnessing the data contained in the Flows to monitor an enterprise network bandwidth. 6

4. The Flow-based software solution When a global enterprise decides to use a flow based software solution for the purpose of monitoring its distributed global enterprise, the setup looks like the figure below. The software has to be deployed in each of the remote locations and the data gathered from the location is visible to the network admin at that level/ location only. Figure 2: A typical Flow based monitoring The report on the bandwidth usage in each of the office is visible only to the network administrator at that level. Here the data is in silos. For a consolidated overall view the data available with each network admin has to be collated by the chief Network Administrator / CIO. Drawback of this solution: Lack of an unified view A distributed monitoring solution can fix the drawback in the above model. By collating data from all the distributed locations and presenting it in a unified fashion, it brings greater control to the Chief Network Administrator/ Network Manager. 7

5. The Flow-based distributed monitoring solution Case In Point: The NetFlow Analyzer Enterprise Edition Figure 2: Flow based monitoring with Distributed collection The NetFlow Analyzer Enterprise Edition is a flow based scalable software solution from AdventNet, ideal for large corporations with tens of thousands of interfaces. It uses distributed collectors (shown in the diagram), which are installed, in remote offices. The remote collectors collect the flow information from all the routers in the location. It processes the data and after compression sends it to the central server through a secure https link. This way the bandwidth that is consumed is just a fraction of what would be consumed otherwise. The central server receives the compressed data exported by all collectors and does further analysis for the purpose of reporting. The central server is ideally located at the Head Quarters. A chief network administrator or CIO can access the reports generated by the Central Server through a web-client and get a unified view of the entire network. Benefits of the NetFlow Analyzer Enterprise Edition: Suited for large enterprises with distributed networks Scalable architecture to support thousands of routers and switches Supports centralized unified view for easy management Supports Cisco NetFlow v5/v7/v9 and sflow technologies Supports TOS, DSCP and TCP_Flag Https based secure communication 8

All-software solution and does not require complex hardware probes Runs on Windows & Linux - both 32-bit and 64-bit Pricing starts as low as $ 17,995 Backed by a responsive support Free 30-day evaluation with no restriction on features made available 6. Conclusion Take in to consideration the below key points before choosing your traffic analysis / bandwidth monitoring solution, in order to ensure that the investment delivers value, as expected. 9 Key Points for the CIO/Network Manager to consider in choosing the right solution Consider what kind of solution it is Hardware / Probe / Packet Analyzer based or Pure-Software Based Consider the cost of the solution demand to know the likely cash out-flow to own the software over atleast a 5-year horizon Clarify the cost associated with software upgrades, telephonic support Costs associated with having a personnel deployed in case of eventualities See the cash-outlay Vs ROI metrics. A product that far outweighs the ROI it generates is never the right solution. Bandwidth Monitoring is a function that is meant to add value to the enterprise bottom line. It should not end-up casting the Network department the cost-center image Evaluate the kind of support you are likely to get Often more than the number of PhDs / Masters a company has on its rolls it is the number of responsive staff available that makes difference to you as the end-customer Demand to know the legacy of the company/product Typically a company that has been in the business for more than a decade and has managed to remain profitable is a good choice to go with Typically a product / base-product that has had the support of thousands of customers from across the globe is a testimony to strong engineering ability and a rock-solid support Factor the above two points when you have narrowed down to almost two vendors/solutions Choosing the vendor - See beyond today Do not buy a solution considering today s requirement alone. Typically opting for a company that has a whole range of network-management-allied products is a very good decision. In addition to monitoring your whole enterprise network bandwidth, you may want to monitor the performance of applications in your network or analyze your firewall logs etc tomorrow Visualize the future needs of your network and chose the competent vendor 9

Evaluate at your pace Seek extension of trial license as and when you need A company that does not oblige to extend license or has cumbersome procedures may not be the best bet going forward The Forums is the ultimate index See how active and vibrant the forums is It is an index of how popular and how responsive the product and the product teams respectively are Finally don t fall prey to consultants and marketing gimmicks! 10