The ehealth Traffic Accountant Reporting Application

Size: px
Start display at page:

Download "The ehealth Traffic Accountant Reporting Application"

Transcription

1 Focus on Value The ehealth Traffic Accountant Reporting Application Understanding data (or traffic ) flow is essential for capacity planning and enabling a consistent level of performance particularly in dynamic networks that are subject to frequent upgrades and changes. The ehealth Traffic Accountant reporting application makes it easy to manage traffic for optimum performance by analyzing network traffic flows between the nodes in your network, and between autonomous systems. Enterprises can use this application for security, planning interdepartmental cost allocations, monitoring traffic, and diagnosing traffic problems. Traffic Accountant s autonomous system (AS) to AS support enables Service Providers to identify the most effective partners, incoming and outgoing traffic destinations, and the traffic that is simply passing through their network and not using the services that they provide. It shows how nodes and applications use your network. You can use this information to plan and implement network reconfiguration, growth, and security procedures and to relate network costs to the nodes and organizations that use the network. Traffic flow information is not only useful for understanding your network as part of capacity and performance planning, but it is also useful in assessing your infrastructure for its ability to handle applications requiring high performance and availability. Traffic management provides a detailed look at the environment in which the applications operate. Optimizing IT management by identifying the major users of the network. The Value of Traffic Accountant The ehealth Traffic Accountant offers the following benefits: Identify the Most Active Nodes By determining which nodes are most active in your network, you can easily isolate the source of network congestion and problems. Identify the Major Sources of Communication By determining which nodes communicate most with a particular department or location, you can provide additional bandwidth between high traffic areas to avoid congestion. Identify Your Dominant Applications By examining a breakdown of the total network traffic based on applications, you can allocate resources to provide the highest level of support and service for the applications being used most often. Effectively Manage Cost Allocations By analyzing the traffic distribution across the organization, you can determine which departments should share the cost burden. Monitor Variations in Traffic over Time By customizing a report, you can show variations in traffic over time, identify users who access an server or other application, and investigate traffic destinations. June 2005

2 Traffic Collection and Analysis Concepts ehealth Traffic Accountant discovers RMON2 probes installed in the network, collects traffic data from the probes, and consolidates the statistics. An RMON2 probe is a remote network monitoring device that analyzes traffic and summarizes the data by nodes, protocols, and applications. A probe can be a standalone device attached to the network segment or it can be imbedded into a network device such as a LAN switch or a router. In addition to supporting RMON2- compliant probes, ehealth Traffic Accountant also supports the Cisco NetFlow FlowCollector as a data source. A probe can only report on traffic that appears on the network segment to which it is attached. A probe can be used on both LAN and WAN segments. Thus, probes must be strategically placed throughout the network to provide coverage of the major conversations of interest. For example, a probe placed on the same segment as the Internet firewall can see and report on all traffic to and from the Internet. From a central site, a probe connected to the Frame Relay access port can report on all traffic on the PVCs coming into the central site. ehealth Traffic Accountant analyzes and breaks down the traffic as seen by each probe or Cisco FlowCollector according to three categories: nodes, conversations, and protocols. A node is any device in the network that has a network address (IP address, IPX address, or MAC address). A probe records the traffic volume generated by each node on the network segment. With this information, you can identify the top talkers of the network. A conversation is a data transfer between a pair of nodes. For example, the conversation between a workstation and a server might include a number of transactions such as file transfer, a TELNET session, and an HTTP transfer. For the probe to record the conversation, the traffic must pass through the probe segment. In other words, the sending node or the receiving node must reside on the probe segment, or the probe segment must be a transit segment (that is, a LAN or WAN line through which traffic passes). With information on the conversations, you can identify the top conversational partners of a specific node. A probe analyzes the traffic and accumulates statistics for each protocol, such as the number of bytes of IP versus IPX traffic. The upper-layer 2 protocol is usually associated with an application. In the case of IP, the application (for example, TELNET or FTP) is associated with a TCP or UDP port number. In the case of IPX, the application is usually associated with the socket number. With statistics for each application, you can identify the most prominent applications in the network. Figure 1 shows the deployment of probes in a typical network. In this example, Probe1 is a WAN probe connected to the Frame Relay port of the central router. It sees all traffic between the central site and branch offices. Probe2 sits on the server segment and sees all traffic to and from the servers. Probe3 sits on the Internet segment and sees all traffic to and from the Internet. If you place more probes on the remaining segments, you can collect more information about the network. The number of probes used usually represents a tradeoff between cost and the amount of information available to Traffic Accountant for analysis. Figure 1. Deployment of Probes in a Typical Network

3 Organizing Your Nodes to Analyze Traffic To report on the traffic statistics that your probes collect, you can organize your nodes into views and groups. A Traffic Accountant view contains groups of nodes associated with a particular location or department. Different views can offer different perspectives for analyzing the same traffic statistics. A Departmental view can include groups of nodes (or members ) that communicate with a particular department. This type of view allows you to compare the traffic volumes among departments within your organization, identify the departments that generate the most traffic, and those with which an organization communicates the most. For example, consider a network with nodes from A to Z. You can create a view called Department (Figure 2) to organize the nodes into groups based on departments that they support. These two views offer different perspectives for analyzing the same traffic statistics. When a report is generated, you can choose the view to use. In the departmental view, you can compare the traffic volumes of the different departments, or the departments with which the Engineering department communicates the most. In the location view, you can compare the traffic volumes of the different locations and pinpoint the location that generates the most traffic, or identify the locations with which one site communicates the most. In practice, a network typically has a large number of nodes. You can assign important nodes into groups based on subnet, IP address, or probe, and leave the rest as unassigned. The traffic statistics for these nodes will be added together and will appear in a group called Unassigned. As Traffic Accountant detects new nodes, it places them in the appropriate groups. The Traffic Accountant s large number of predefined reports combined with the ability to create customized reports provides IT/network managers with a powerful planning and troubleshooting tool. Figure 2. Departmental View You can then create a separate group for the same network called Location (Figure 3) by organizing the same nodes into groups based on their placement within your infrastructure. A Location view allows you to compare the traffic volumes among locations within your organization, identify the locations that generate the most traffic, and those with which an organization communicates the most. Generating Traffic Accountant Reports. You can generate reports to identify the nodes or groups that produce the most traffic and the organizations or locations that communicate the most often with each other. These reports can also identify the users who account for most of the traffic, the dominant applications, and the ways in which traffic varies over time. Traffic Accountant can generate a large number of reports grouped into three different categories: Quick Start Standard Customized Quick Start Reports. Quick Start reports are a predefined set of reports that you can run to answer the most commonly asked questions about network usage. Standard Reports. The standard reports are a comprehensive set of predefined reports that can provide detailed information about nodes, groups, views, probes, and the network. Figure 3. Location View Customized Reports. Customized Traffic Accountant reports can perform specific reporting tasks for your IT environment. You can create customized versions of the standard reports or new reports. For example, you can create a customized report that tracks the volume of Web (HTTP) traffic. 3

4 Identifying the Most Active Nodes If users experience slow response time, you can generate ehealth Health Reports to isolate the problem. In the sample report shown in Figure 4, the segment utilization was abnormally high. This caused excessive congestion and collisions. The Top Nodes For Group chart shown in Figure 5 displays the traffic volume generated by the most active nodes and the protocol breakdown of the traffic. A rarely used desktop server, jsmith, was one of the most active nodes. Since this is highly unusual, it is the likely cause of the network congestion in the group. In the scenario depicted in Figure 5, jsmith was identified as the node that generated an abnormal level of traffic. To investigate the problem further, we can identify the nodes with which jsmith communicated and the nature of the traffic, using the Most Active Nodes report. Figure 6 shows that a large percentage of the traffic was among jsmith, mailgw (the mail gateway), and dnsserver (the DNS server). This suggests that the high traffic volume was the result of an unusually high volume of traffic to and from jsmith. Note that this report can also be used to track and audit business-critical resources. For example, this report can be used to display the top conversations with the order processing server, allowing you to identify the main users of the server. You could also run a Node Conversation Log Text report to display the 50 largest node partners for a node and the applications used or the NodePartners For Node Trend chart to display the largest node partners for a node and when they communicated. Figure 4. Health Report Figure 5. Top Nodes for Group Chart Figure 6. Most Active Nodes Report 4

5 Identifying the Major Sources of Communication A common technique in network optimization is to identify the major communication partners and then provide additional bandwidth between high traffic areas. For example, to find out which groups communicate the most with the Engineering group, the GroupPartners For Group chart can be used. It shows the percentage of Engineering traffic with each of the group partners. Figure 7 shows that 61% of the traffic is intradepartment traffic (traffic from one Engineering node to another). Of the remaining traffic, 20% is between Engineering and Marketing. This information allows the network manager to optimize the network infrastructure by providing a direct communication path between them. You might want to connect the two groups with a bridge or router if they are in the same building or install a direct WAN link between the two groups if they are geographically separated. Another related report is the standard Group Conversation Log Text report that displays the 50 largest group partners for a specified group and the applications used. Identifying Dominant Applications In IT planning, it is very important to identify your dominant protocols and applications. This information allows the IT or network manager to allocate resources based on the nature of the traffic. The Quick Start Network Applications Used in Your Network report gives you a high-level view of the protocol distribution by showing a breakdown of the total network traffic by protocol. Figure 8 shows that the order processing application, a business-critical application, accounts for 28% of the total network traffic. The network must be designed in a way that provides the highest level of support and service for this application. This may include providing redundant servers or routing paths, dedicated bandwidth for this application, or applying QoS policies. Figure 7. Group Partners for Group Report Figure 8. Applications Used in Your Network 5

6 From a different perspective, it is also useful to determine the traffic breakdown by group. The TopGroups For View report displays the applications used by the most active groups. Figure 9 shows that Sales, Tech Support, and Finance are the three main users of the order processing application. To optimize the network, servers running the order processing application should be installed in each of the three main user groups. The chart also shows that as a group, Engineering generates the most network traffic. However, the composition of traffic may change depending on the time of day. To understand when an application is used the most, you can use the Application For Group Trend chart. The sample chart shown in Figure 10 was generated for the Engineering group. Figure 10 shows that even though FTP is the dominant application for Engineering, it is only used in the early hours after midnight. During the rest of the day, the dominant application is AppleTalk. This information can be very useful. For example, to speed up the response time of interactive traffic such as TELNET or order processing, a common technique is to use priority queuing in the router to assign TELNET or order processing traffic a higher priority at the expense of bulk transfer traffic such as FTP. However, the chart shows that since order processing and FTP traffic do not occur at the same time, this technique would be largely ineffective. Instead, lower priority should be assigned to bulk transfer traffic that occurs concurrently with order processing. Figure 9. Top Groups for View Bar Chart Figure 10. Applications For Group Trend Chart 6

7 Planning Cost Allocations Effectively In many companies, the cost of running the enterprise network is shared among departments based on the amount of traffic generated. Although Traffic Accountant is not a billing application, it is very useful for identifying the traffic distribution by groups to determine how monthly costs should be allocated. In Figure 11, the Allocation By Department report shows that the monthly cost of $527,894 could be split between the various departments based on the traffic distribution. In this example, Engineering consumed approximately 23% of the cost or $121,415. You can use Traffic Accountant to identify the major sources of traffic within a department by determining which servers are most frequently accessed. If some servers generate significantly more traffic than others, you might want to move them to dedicated switched ports to improve performance. To obtain this information, you can use the Group Activity Log Text report. Figure 12 shows that in the Engineering group, Server10, Mailgw, Server2, Server5, Dnsserver, and Figure 11. Allocation by Department Report Server1 are the busiest servers. You can use ehealth Health reports to determine if these servers have enough resources (bandwidth, processing power, memory, and disk space) to handle the load. Figure 12. Group Activity Log Report 7

8 Monitoring Variations in Traffic over Time If you are concerned about how your Web server is being used, you can track the users who frequently access it and ensure that they are using resources for the appropriate purposes during business hours only. To find out, you can create a customized report to show the variation of Web traffic over time for a particular Web application such as Microsoft Exchange. For example, the Daily Web Traffic report shown in Figure 13 indicates that traffic steadily increases throughout the day, but gets busy around noon and again from 8 p.m. to midnight. Most likely, most employees check their and reply to messages at lunchtime and again in the evening. This report can also be used to monitor compliance with corporate usage policies. For example, if the policy allows a particular application to be used during a certain time of day only, the chart shown in Figure 14 can be used to ensure that users adhere to the policy. To obtain more detailed information about the Web traffic destinations, you can use another customized report to list the top 10 servers. The chart shows that some users have been using excessively. Figure 13. Daily Traffic Report The Web Traffic Audit report provides more detail on Web access. It displays a record of the top 50 conversations that used HTTP. For each conversation, the report shows the node partners and the size of the conversation in bytes. The table shown in Figure 15 shows that jsmith is the top user and her traffic accounts for 20% of the total traffic. Figure 14. Top 10 Servers Report Figure 15. Web Traffic Audit Report 8

9 Traffic Accountant Report Summary Quick Start Reports Standard Reports Identify the nodes or groups that generate the most traffic: Probe - Top Talkers Seen Network - Top Talkers in Your Network Probe - Top Conversations Top Nodes For Group Bar Chart Top Nodes For Group Trend Chart Top Nodes Seen By Probe Trend Chart Top Nodes Among All Nodes Bar Chart TopGroups For View Bar Chart Top Nodes For View Bar Chart Identify who communicates with the node or group: GroupPartners For Group Pie Chart NodeToNodeConversations AllNodes Text Top Conversations Seen By Probe Text NodeToNodeConversations View Text Identify who accounts for what percentage of traffic: Node - Conversation with Other Nodes Allocation By Department Pie Chart Group Activity Log Text Group Conversation Log Text Node Conversation Log Text Identify the dominant applications: Node - Applications Seen Probe - Applications Seen Network - Applications Used in Your Network Applications For Group Trend Chart Applications For AllNodes Pie Chart Applications For Node Trend Chart Applications Seen By Probe Trend Chart Applications For View Pie Chart Identify who is using a critical resource: Node - Conversation with Other Nodes Web Traffic Audit GroupPartners For Node Pie Chart NodePartners For Node Trend Chart Analyze traffic variations over time: Network - TopTalkers in Your Network Network - Applications Used in Your Network Top Nodes For Group Trend Chart Top Nodes Seen By Probe Trend Chart Applications For Group Trend Chart Applications For Node Trend Chart Applications Seen By Probe Trend Chart NodePartners For Node Trend Chart Copyright 2005 Concord Communications, Inc. ehealth, the Concord Logo, Live Health, Live Status, SystemEDGE, AdvantEDGE and/or other Concord marks or products referenced herein are either registered trademarks or trademarks of Concord Communications, Inc. Other trademarks are the property of their respective owners. 9

Managing Cisco QoS Using ehealth

Managing Cisco QoS Using ehealth Focus Topic January 2006 Managing Cisco QoS Using ehealth Quality of Service (QoS) is a measure of performance that allows you to configure different levels of service for various types of traffic in your

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Optimize and Accelerate Your Mission- Critical Applications across the WAN

Optimize and Accelerate Your Mission- Critical Applications across the WAN BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization

More information

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description

More information

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge

Getting Started with ehealth for Voice Cisco Unity & Unity Bridge Focus on Setup Getting Started with ehealth for Voice Cisco Unity & Unity Bridge What s Inside About ehealth for Voice Cisco Unity. An overview of the product components. Requirements. Prerequisites for

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Yealink VCS Network Deployment Solution

Yealink VCS Network Deployment Solution Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating

More information

Advanced Application Reporting USER GUIDE

Advanced Application Reporting USER GUIDE Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS

More information

PassReview. PassReview - IT Certification Exams Pass Review

PassReview.   PassReview - IT Certification Exams Pass Review PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid

More information

Cisco IOS Switching Paths Overview

Cisco IOS Switching Paths Overview This chapter describes switching paths that can be configured on Cisco IOS devices. It contains the following sections: Basic Router Platform Architecture and Processes Basic Switching Paths Features That

More information

Distributed ehealth Concepts

Distributed ehealth Concepts Focus on Value ehealth Concepts Business networks often contain hundreds of thousands, or even millions, of manageable resources. These resources can include everything from LAN/ WAN interfaces, routers,

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

Getting Started with ehealth for Voice--Cisco CallManager

Getting Started with ehealth for Voice--Cisco CallManager Focus on Setup Getting Started with ehealth for Voice-- Cisco CallManager manages IP telephony devices and call services over a data network and manages call setup, controls call devices, and collects

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic;

Monitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic; NetVizura NetFlow Analyzer enables you to collect, store and analyze network traffic data by utilizing Cisco NetFlow, IPFIX, NSEL, sflow and compatible netflow-like protocols. It allows you to visualize

More information

Troubleshooting with Network Analysis Module

Troubleshooting with Network Analysis Module Troubleshooting with Network Analysis Module Introduction The Cisco Network Analysis Module (NAM) provides visibility into how the network is performing and how users experience the applications and services

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance

Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.

More information

Configuring AVC to Monitor MACE Metrics

Configuring AVC to Monitor MACE Metrics This feature is designed to analyze and measure network traffic for WAAS Express. Application Visibility and Control (AVC) provides visibility for various applications and the network to central network

More information

Monitoring UPS Devices and Environmental Sensors Using ehealth

Monitoring UPS Devices and Environmental Sensors Using ehealth Focus Topic August 2005 Monitoring UPS s and Environmental s Using ehealth Uninterruptible Power Supplies (UPS) and Environmental s are widely deployed in IT environments. A UPS provides reliable power

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Network-Based Application Recognition

Network-Based Application Recognition Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important

More information

Impact of TCP Window Size on a File Transfer

Impact of TCP Window Size on a File Transfer Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management

Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly

More information

PT Activity 8.6.1: CCNA Skills Integration Challenge Topology Diagram

PT Activity 8.6.1: CCNA Skills Integration Challenge Topology Diagram Topology Diagram All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7 Addressing Table for HQ Device Interface IP Address Subnet

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

The EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises

The EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises The / Product Suite Simplified Voice Networking for Distributed Enterprises Citel s mission is simple: To delight our customers and enrich our stakeholders by offering a world-class suite Citel s of products

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo

Exam : Title : Designing for Cisco Internetwork Solutions. Version : Demo Exam : 640-863 Title : Designing for Cisco nternetwork Solutions Version : Demo 1. Which statement accurately describes one difference between a small office and medium office topology? A. Small offices

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring SonicWALL VPN for Supporting H.323 Trunk and Station Traffic to Avaya Communication Manager and Avaya IP Office - Issue 1.0

More information

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing 1 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this

More information

CCNA Exam File with Answers. Note: Underlines options are correct answers.

CCNA Exam File with Answers. Note: Underlines options are correct answers. CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.

More information

PacketShaper WAN Application Performance Solutions

PacketShaper WAN Application Performance Solutions PacketShaper Family Datasheet Fast WAN. Fast Apps. Fast Business. PacketShaper WAN Application Performance Solutions Applications are the lifeblood of your enterprise. If they slow down, so does business.

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Avaya M770 and M-MLS SMON User Guide

Avaya M770 and M-MLS SMON User Guide Avaya M770 and M-MLS SMON User Guide April 2002 Avaya M770 and M-MLS SMON User Guide Copyright Avaya Inc. 2002 ALL RIGHTS RESERVED The products, specifications, and other technical information regarding

More information

First Steps to Using a PacketShaper

First Steps to Using a PacketShaper First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic...2 View the Class Tree...3 Problems?...4 Analyzing Network

More information

Voice, Video and Data Convergence:

Voice, Video and Data Convergence: : A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information

More information

Vishal Shirodkar Technology Specialist Microsoft India Session Code:

Vishal Shirodkar Technology Specialist Microsoft India Session Code: Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

Cisco Unified MeetingPlace Integration

Cisco Unified MeetingPlace Integration CHAPTER 14 This chapter covers system-level design and implementation of Cisco Unified MeetingPlace 5.4 in a Cisco Unified Communications Manager 5.x environment. The following aspects of design and configuration

More information

Quality of Service Commands policy-map. This command has no default behavior or values.

Quality of Service Commands policy-map. This command has no default behavior or values. Quality of Service Commands policy-map policy-map To create or modify a policy map that can be attached to one or more interfaces to specify a service policy, use the policy-map global configuration command.

More information

ehealth Administration Overview Guide

ehealth Administration Overview Guide ehealth Administration Overview Guide MN-EHADMOV-001 October 2006 This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as

More information

Broadband Traffic Report: Download Growth Slows for a Second Year Running

Broadband Traffic Report: Download Growth Slows for a Second Year Running Broadband Traffic Report: Download Growth Slows for a Second Year Running 1.1 Overview In this report, we analyze traffic over the broadband access services operated by IIJ and present the results each

More information

Inspection of Router-Generated Traffic

Inspection of Router-Generated Traffic Inspection of Router-Generated Traffic The Inspection of Router-Generated Traffic feature allows Context-Based Access Control (CBAC) to inspect traffic that is originated by or destined to the router on

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED

More information

Reaping the Benefits of Managed Services

Reaping the Benefits of Managed Services Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective

More information

CCNA MCQS with Answers Set-1

CCNA MCQS with Answers Set-1 CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.

More information

EdgeXOS Platform QuickStart Guide

EdgeXOS Platform QuickStart Guide EdgeXOS Platform QuickStart Guide EdgeXOS Functionality Overview The EdgeXOS platform is a Unified Bandwidth Management device, meaning that it has the ability to support multiple bandwidth management

More information

Transforming the Cisco WAN with Network Intelligence

Transforming the Cisco WAN with Network Intelligence Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using

More information

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140

More information

Flexible Netflow Configuration Guide, Cisco IOS Release 15S

Flexible Netflow Configuration Guide, Cisco IOS Release 15S Flexible Netflow Configuration Guide, Cisco IOS Release 15S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

User Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc.

User Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc. Executive Over view User Activities These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc. Session Log Summary This report helps you

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Connectivity to Cloud-First Applications

Connectivity to Cloud-First Applications Aruba and Riverbed Partner to Accelerate and Optimize Mobile-First Connectivity to Cloud-First Applications Today s workforce is more distributed, more mobile, and more demanding. Constant availability

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS

DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS WHITE PAPER DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS Maximize the efficiency of multiple network interfaces Abstract Dell EMC delivers dynamic interface groups to simplify the use of multiple

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Radware LinkProof Multi-WAN Switch connected to an Avaya Communication Manager and Avaya SIP Enablement Services in a Converged VoIP and

More information

Monitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved.

Monitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved. Monitor Qlik Sense sites Qlik Sense 2.1.2 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense,

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information

Managing Your IP Telephony Environment

Managing Your IP Telephony Environment Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Network Configuration Guide

Network Configuration Guide Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.

More information

Two-Tier Oracle Application

Two-Tier Oracle Application Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com

Cisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

Avaya Port Matrix: Avaya Diagnostic Server 3.0

Avaya Port Matrix: Avaya Diagnostic Server 3.0 Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring Your Business Entire Routing, Switching, Wireless, Security and Voice Network with a Single, Easy-to-Use Tool Today s businesses depend on network-based applications

More information

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

IBM Proventia Management SiteProtector Sample Reports

IBM Proventia Management SiteProtector Sample Reports IBM Proventia Management SiteProtector Page Contents IBM Proventia Management SiteProtector Reporting Functionality Sample Report Index 2-25 Reports 26 Available SiteProtector Reports IBM Proventia Management

More information

Managing the Growth of the ehealth Database

Managing the Growth of the ehealth Database Focus on Setup Managing the Growth of the ehealth Database The ehealth Suite of management tools collects a wide variety of information about your critical business resources. ehealth includes a database

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Installing, Configuring and Administering ISA Server 2000, Enterprise Edition

Installing, Configuring and Administering ISA Server 2000, Enterprise Edition 070-227 70-227 Installing, Configuring and Administering ISA Server 2000, Enterprise Edition Version 1-1 - Important Note Please Read Carefully This product will provide you questions and answers along

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved.

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved. 2004 by NETGEAR, Inc. All rights reserved. Trademarks @2004 NETGEAR, Inc. NETGEAR, the Netgear logo, The Gear Guy and Everybody s connecting are trademarks of Netgear, Inc. in the United States and/or

More information

Activity 6.4.1: Basic VLSM Calculation and Addressing Design

Activity 6.4.1: Basic VLSM Calculation and Addressing Design Activity 6.4.1: Basic VLSM Calculation and ing Design Topology Diagram ing Table Device Interface IP Subnet Default Gateway HQ Branch1 Branch2 All contents are Copyright 1992 2007 Cisco Systems, Inc. All

More information

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button CHAPTER26 The (QoS) Wizard allows a network administrator to enable (QoS) on the router s WAN interfaces. QoS can also be enabled on IPSec VPN interfaces and tunnels. The QoS edit windows enables the administrator

More information

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope

Maximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations

More information

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter

while the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also

More information