Network Visiblity and Performance Solutions Online Demo Guide



Similar documents
TOTAL VIEW ONE Technical FAQ

Edge Configuration Series Reporting Overview

Chapter 8 Monitoring and Logging

Configuration Information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Sonicwall Reporting Server

Quick Start Guide Sendio Hosted

Configuration Information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition

Preparing for GO!Enterprise MDM On-Demand Service

SonicWALL Global Management System Reporting User Guide. Version 2.5

Network Probe User Guide

Core Protection Suite

F-Secure Messaging Security Gateway. Deployment Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide

Configuring Security for SMTP Traffic

Websense Web Security Gateway: What to do when a Web site does not load as expected

Orientation Course - Lab Manual

ShadowControl ShadowStream

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

Kaseya Server Instal ation User Guide June 6, 2008

Getting Started with WPM

Firewall Defaults and Some Basic Rules

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Pure1 Manage User Guide

About Firewall Protection

SecuraLive ULTIMATE SECURITY

How To Log On To The Help Desk On Manageengine Service Desk Plus On Pc Or Mac Or Macbook Or Ipad (For Pc Or Ipa) On Pc/ Mac Or Ipo (For Mac) On A Pc Or Pc Or Mp

Service Overview & Installation Guide

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan

Network Agent Quick Start

Quick Start Guide. Ignite for SQL Server. Confio Software 4772 Walnut Street, Suite 100 Boulder, CO CONFIO.

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Next Generation Network Firewall

State Health Repository Tool (SHRT) Testing Instructions

SonicWALL Global Management System ViewPoint Guide. Version 2.1

Integrating LANGuardian with Active Directory

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0


CARL : Cyberoam Aggregated Reporting and Logging :: User Guide. Table Of Contents INTRODUCTION... 4

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

NEFSIS DEDICATED SERVER

imanage V2.0 Overview

SonicWALL GMS Custom Reports

Setting Up Scan to SMB on TaskALFA series MFP s.

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

Comprehensive Anti-Spam Service

HP Load Balancing Module

SolarWinds Technical Reference

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

NetSpective Global Proxy Configuration Guide

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

ClicktoFax Service Usage Manual

NetFlow Analytics for Splunk

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

Installing and Configuring vcenter Support Assistant

Customer Service Description Next Generation Network Firewall

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

Citrix EdgeSight User s Guide. Citrix EdgeSight for Endpoints 5.4 Citrix EdgeSight for XenApp 5.4

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

CTERA Agent for Mac OS-X

Salesforce Opportunities Portlet Documentation v2

Palo Alto Networks User-ID Services. Unified Visitor Management

Filter Avoidance and Anonymous Proxy Guard

Help Desk Web User Guide

How to set up popular firewalls to work with Web CEO

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP)

Chapter 8 Router and Network Management

freesshd SFTP Server on Windows

Corporate Telephony Toolbar User Guide

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

USER GUIDE: MaaS360 Services

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

WhatsUpGold. v NetFlow Monitor User Guide

Eucalyptus User Console Guide

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Table of Contents INTRODUCTION - FIREWALL ANALYZER DISTRIBUTED EDITION ADMIN SERVER... 3

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

Chapter 10 Encryption Service

Broadband Phone Gateway BPG510 Technical Users Guide

Chapter 6 Virtual Private Networking Using SSL Connections

OneLogin Integration User Guide

HP IMC Firewall Manager

SonicOS 5.8.1: Configuring the Global Bandwidth Management Service

Chapter 9 Monitoring System Performance

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

Monitoring Replication

NMS300 Network Management System

Configuring Security for FTP Traffic

5nine Cloud Monitor for Hyper-V

Transcription:

Network Visiblity and Performance Solutions Online Demo Guide Organizations rely heavily upon their networks and their ability to deliver business services and information. Any degradation or interruption in service delivery can negatively impact business productivity and even the bottom line. To ensure that services run smoothly, you need real-time tools to help manage the performance of your network, its applications, and its users. PresiNET s Network Visibility Portal is the window into a wealth of information and reports collected by the PresiNET Sensors and Firewalls. This portal provides intelligence tools that offer an unparalleled look at the way your enterprise uses its Internet and network resources. Network Visibility Portal takes the invisible complexities of your Internet and network transactions and makes them visible. The way your enterprise's employees and applications use the network and Internet can have a big impact on your bottom line. PresiNET's technology gives you the information you need to turn Internet and network resource inefficiencies into models of optimized resource allocation. Proactive enterprise leaders have begun to realize the solid financial benefits of making their network more visible. Reliable network reporting can help you: Save time and money; Increase application efficiency; Improve enterprise efficiency; Create and enforce constructive Internet and network usage policies; Compliance with legislation; Increase employee productivity; Decrease costs for Internet and Network bandwidth; Decrease downtime for mission-critical processes; Identify network and application lag and bottlenecks; The following guidelines will give you easy navigation of PresiNET s online demo portal. Note that some features are not available for demonstration purposes. Please feel free to browse around, drill down, sample the reporting and features. Portal Categories There are several main sections in the Portal. These sections are broken into sub-sections for more detailed information. In every network and internet transaction, we track the connection (who, where, when and what application) and how much bandwidth is being consumed. The main sections are as follows:

BANDWIDTH Section: The Bandwidth section contains information related to bandwidth on your network. Bandwidth is broken down into Overview, Summary, Applications, User Stats, Throughput, VPN Stats, VPN Users, Reports and Capacity Planning. CONNECTIONS Section: The Connections section contains connection information related to the IP transaction. Each connection is tracked and the header information is recorded. The Connection section is broken down into Web Usage, Content Filtering, Latency and Connections. SECURITY Section: The Security section contains event information for transactions that exceed security policies. The Security section is broken down into Summary and Security Events. CONFIGURATION Section: The Configuration section contains setting information related to the appliance. The Configuration section is broken down into Edit Config, Current Config, Alert Thresholds, Preferences, and Downloads. Generating Reports The top of every section contains fields that allow you to select a location/appliance and a specific date. Pressing the Generate button will display statistics for that particular day and location/appliance. The search criteria will move with you when you change to a new section/tab. If you need to modify the criteria, change the fields and select Generate. Units and Measurements The units are as follows: k = Kilobytes mb = Megabytes of data (1024 times that of Bytes) m = Megabytes gb = Gigabytes of data (1024 times that of Megabytes) g = Gigabytes t = Terabytes of data (1024 times that of Gigabytes) The guide below will use the Bandwidth category to show how to navigate the different categories in the portal. For a more in depth demonstration, contact us at solutions@presinet.com to schedule a personal demonstration

Bandwidth Section The Bandwidth section contains information related to bandwidth on the network. Bandwidth can be broken down by Source, Application, Port, Protocol, Total Bytes, Inbound Bytes, Outbound Bytes and Time. Source can be broken down by IP address, Assigned Name, MAC address or Active Directory Login name. The Bandwidth section is broken down into additional subsections or tabs where you will find different reporting options. Summary (And General Navigation): The Summary tab contains 2 drillable graphs outlining bandwidth usage. The first graph displays bandwidth by type. The main types are: User: Is defined by connection requests originating from within the monitored network. For example, if we are monitoring an Internet link, this would represent users surfing the web. External: Is defined by connection requests originating from outside the monitored network coming into the network. For example, if we are monitoring an Internet link, this would be traffic originating from the Internet coming to head-office servers like mail servers or corporate Web servers. VPN: If the appliance is terminating VPN traffic, this would represent the VPN bandwidth. System: This is traffic that the appliance generates such as log traffic and time traffic. This traffic is specific to the PresiNET appliance. Total: This is the combination of all traffic types. Daily Avg. (Tan bar in the background): This is the average used over the last 30 days. The GREEN graph bars are drillable. For more information on USER type traffic, click on the USER bar.

Summary Bandwidth Usage by Application After clicking on the USER bar, a popup appears detailing the Ports/Applications used. We can see here that HTTP (or Web) is the number one used application. The data is displayed by Usage-In, Usage-Out and Total. For each Port/Application, there are three option buttons to expand on. Identifies the USERS for this application Displays the hourly Bandwidth used by time of day for this Application/Port. Displays the Bandwidth used over the last 30 days. The totals at the bottom display the total for the ports listed in this screen and the total for all applications, all types. There is an Order field that changes the listing from descending to ascending. At the very bottom of the screen there is a Graph These Ports by Hour button which displays only the top applications by hour. Lets click on the Users button to display the users for this HTTP (80) application (Web). The 80 represents Port 80.

Summary Bandwidth Usage by Application and by User After clicking on the Users button, another popup appears detailing the Users for this application (HTTP). We can see here that B Rupt is the number one user of Port 80 traffic (HTTP). The data is displayed by Inbound, Outbound and Total for each User. In the User column, the data can be displayed in several formats and can be set in the Preferences Tab: IP Address IP address of the source machine Assigned Name Names can be assigned to IP or MAC address. Active Directory Login with the Active Directory module, we can display the login user in brackets. MAC Address Source MAC address of the connection. For example, the first User has an assigned name (to IP address) of B Rupt and an Active Directory Login of (brupt) For each User, there are three option buttons to expand on. Audit displays detailed connection information like destination (where did the connection go). Displays all the Applications/Ports for this User Displays the hourly Bandwidth used by time of day for this User. The totals at the bottom display the total for the bandwidth columns listed in this screen and the total for all applications, all types. There is an Order field that changes the listing from descending to ascending. Press the Top 20, Next 20 or Previous 20 to scroll through additional Users.

Summary Bandwidth Usage by Application and by User by Destination (Audit) After clicking on the Audit button, another popup appears detailing the Destination for this User (B Rupt) for this application (HTTP Port 80). The data is displayed by number of Visits for each Destination. In the Destination column, the data is displayed by IP address or for HTTP traffic, by URI. If the Destination is displayed by IP address, the systems will try to automatically resolve the IP addresses. A Resolving IP will appear after the Destination heading while it tries to resolve the addresses to DNS names. After it resolves the IP, the Destination address will like the following: For each Destination, there are three option buttons to expand on. Performs a Whois lookup for the Destination address. Tries to take you to that Destination address using standard Web connection. If the address does not have a Web site, this connection will fail. Displays the hourly connection visits by time of day. There is an Order field that changes the listing from descending to ascending. Press the Top 20, Next 20 or Previous 20 to scroll through additional Connections.

Summary Hourly Bandwidth I/O: Back at the Main page under the Bandwidth section - Summary tab, the second graph displays bandwidth by type and time of day. The main types are: User: Is defined by connection requests originating from within the monitored network. For example, if we are monitoring an Internet link, this would represent users surfing the web. External: Is defined by connection requests originating from outside monitored network coming into the network. For example, if we are monitoring an Internet link, this would be traffic originating from the Internet coming to head-office servers like mail servers or corporate Web servers. VPN: If the appliance is terminating VPN traffic, this would represent the VPN bandwidth. Total: This is the combination of all traffic types. This graph is great at finding bandwidth spikes on the network, and allowing you to determine what caused the spike. In the above graph, we can see a large User spike at 12:00 and 13:00. To analyse what caused these spikes, reference the table below the graph and click on the intersection of hour 12:00 and Users. The number represents the number of megabyte or gigabytes that was recorded during this time period. Clicking on the 74 will allow us to generate more details about this spike.

Summary Hourly Bandwidth I/O Hourly Review After clicking on the Hourly review number 74, a popup appears detailing the Users who generated traffic during this period. We can see here that the machine R Catnip with the Active Directory user (catnip) caused this spike. The data is displayed by Inbound, Outbound and Total for each User For each User, there are Two option buttons to expand on. Displays the Applications/Ports for this User during this time period. Displays the hourly Bandwidth used by time of day for this User. The totals at the bottom display the total for the ports listed in this screen and the total for all applications, all types. There is an Order field that changes the listing from descending to ascending. Press the Top 20, Next 20 or Previous 20 to scroll through additional Users. Let s click on the Apps button beside R Catnip to analyze cause of this spike. What s interesting here is that the majority of the traffic was Outbound (leaving my organization). Notice that the Users are displayed by IP address, Assigned Name and Active Directory Login Name.

Summary Hourly Bandwidth I/O Hourly by User Review After clicking on the Apps button, a popup appears detailing the Ports/Applications used by this User during the hour of 12:00. We can see here that HTTPS (or Secure Web) is the number one used application. For each Port/Application, there are two option buttons to expand on. Audit displays detailed connection information like destination Displays the hourly Bandwidth used by time of day for this Application/Port. After clicking on the Audit button, a popup appears detailing the Destinations visited by this User during the hour 12:00.

Navigate the rest of the sections the same fashion. Most of the reports and details are drillable down to the user level, allowing you to view your network from many angles and depths. Our development team is continually adding new functionality and reporting metrics, in response to the growing and changing needs of our customers. If you are looking for functionality that you don t see, it could be in development now. Please contact us at solutions@presinet.com to schedule a more in depth demonstration, or with any other questions.