Network Management Automated Intelligence

Size: px
Start display at page:

Download "Network Management Automated Intelligence"

Transcription

1 Network Management Automated Intelligence Open Source Based NMS solution bdnog November 2017 Dhaka, Bangladesh

2 p Network Management n Parameters n Components n Open Source Tools n Demonstration n Q & A

3

4 Parameters p p p p Operation: keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Administration: deals with keeping track of resources in the network and how they are assigned. Maintenance: concerned with performing repairs and upgrades. Maintenance also involves corrective and preventive measures to make the managed network run "ʺbetter. Provisioning: is concerned with configuring resources in the network to support a given service.

5 So Network Management is the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of outages via , SMS or other alarms. subset of the functions involved in network management.

6 Network Management p System & Service monitoring n Reachability, availability p Resource measurement/monitoring n Capacity planning, availability p Performance monitoring (RTT, throughput) p Stats & Accounting/Metering p Fault Management n Fault detection, troubleshooting, and tracking p Configuration/Change Management p Coordination

7 Expectations A network in operation needs to be monitored in order to: - Deliver projected SLAs (Service Level Agreements) - SLAs depend on policy p p p p What does your management expect? What do your users expect? What do your customers expect? What does the rest of the Internet expect? What s good enough? % Uptime? è There'ʹs no such thing as 100% uptime (as we ll see) à

8 Uptime Expectations What does it take to deliver 99.9 % uptime? 30.5 days x 24 hours = 732 hours a month (732 (732 x.999)) x 60 = 44 minutes only 44 minutes of downtime a month! Need to shutdown 1 hour / week? (732 4) / 732x 100 = 99.4 % Remember to take planned maintenance into account in your calculations, and inform your users/customers if they are included/excluded in the SLA How is availability measured? In the core? End-to-end? From the Internet?

9 Baselining What is normal for your network? If you ve never measured or monitored your network you will need to know things like: n Typical load on links (è Cacti) n Level of jitter between endpoints (è Smokeping) n Typical percent usage of resources (è LibreNMS) n Typical amounts of noise : p Network scans p Dropped data p Reported errors or failures

10 Why do all this? Know when to upgrade Is your bandwidth usage too high? Where is your traffic going? Do you need to get a faster line, or more providers? Is the equipment too old? Keep an audit trace of changes Record all changes Makes it easier to find cause of problems due to upgrades and configuration changes Maintain history of network operations n n Using a ticket system lets you keep a history of events. Allows you to defend yourself and verify what happened

11 Components p Availability p Reliability p Performance p Configuration Mgmt & Monitoring p Network Forensic p Intrusion Detection p. p.. p Coordination

12 Tools n Diagnostic tools used to test connectivity, ascertain that a location is reachable, or a device is up usually active tools n Monitoring tools tools running in the background ( daemons or services), which collect events, but can also initiate their own probes (using diagnostic tools), and recording the output, in a scheduled fashion.

13 Tools p Active tools n Ping test connectivity to a host n Traceroute show path to a host n MTR combination of ping + traceroute n SNMP collectors (polling) p Passive tools n log monitoring, SNMP trap receivers p Automated tools n SmokePing record and graph latency to a set of hosts, using ICMP (Ping) or other protocols n MRTG record and graph bandwidth usage on a switch port or network link, at regular intervals n So MANY More...

14 Tools Reliability p SmokePing n Keeps track of your network latency: n Best of breed latency visualisation. n Interactive graph explorer. n Wide range of latency measurment plugins. n Master/Slave System for distributed measurement. n Highly configurable alerting system. n Live Latency Charts with the most 'ʹinteresting'ʹ graphs. n Free and OpenSource Software written in Perl

15 Tools SmokePing

16 Tools SmokePing

17 Tools Performance p Cacti/MRTG n n n n n n n A tool to monitor, store and present network and system/server statistics Designed around RRDTool with a special emphasis on the graphical interface Almost all of Cacti'ʹs functionality can be configured via the Web. Uses RRDtool, PHP and stores data in MySQL Supports the use of SNMP and graphics with MRTG Authentication Scheme Large Network Deployment

18 Tools Cacti

19 Tools Weathermap

20 Tools Availability p Nagios n server and service availability monitoring p Can monitor pretty much anything p HTTP, SMTP, DNS, Disk space, CPU usage,... p BGP, OSPF, Switch Port, room temperature,.. p Easy to write new plugins (extensions) p Zabbix, ZenOSS, Hyperic,... Many more Open Source... Ø Log, Log, Log... Ø Notification mechanism

21 Tools. Nagios

22 Tools. Nagios

23 Tools. Nagios XI

24 Tools. Nagios

25 Tools Availability+ Reliability LibreNMS l l l l SNMP-based auto-discover network monitoring Derived from another project (Observium) Written in PHP as a web application Includes support for a wide range of hardware: Cisco, Linux, FreeBSD, Juniper, Brocade, Foundry, HP and many more See Over 100 supported! Routers, Switches, Access Points, Security gateways, Hosts, Printers,

26 LibreNMS Available metrics l l l l CPU, memory and storage statistics Interface traffic, packet and detailed error statistics (L2 and L3) Temperature, fan speed, voltage, amperage, power humidity and frequency sensors Users, processes, load average and uptime statistics

27 LibreNMS Available metrics cont. l l l l l l Linux distribution detection Real-time interface traffic graphing Device inventory collection (useful!) Detailed IPv4, IPv6, TCP and UDP stack statistics BGP and OSPF information MAC <-> IP address lookup l Find which port an IP/MAC was last seen on

28 LibreNMS

29 LibreNMS

30 Tools Configuration Mgmt & Monitoring The Really Awesome New Cisco config Differ p Rancid n Rancid is a configuration management tool that keeps track of changes in the configurations of any size network equipment (Cisco, HP, Juniper, Foundry, etc.). Works on routers and switches. Automates retrieval of the configurations and archives them as backup tool, audit tool, blame allocation.

31 Tools RANCID The Really Awesome New Cisco config Differ The data is stored in a VCS (Version Control System) which keeps n Track changes in the equipment configuration n Track changes in the hardware (S/N, modules) n Track version changes in the OS (IOS, CatOS versions) n Find out what your colleagues have done without telling you! n Recover from accidental configuration errors.

32 Tools RANCID

33 RANCID

34 Tools Net Forensic p Network Flow Analysis Tool n NetFlow (C), n cflowd (F), n FlowScan (F), n Sniffer Pro (C), n argus (F), n i-flow (C) n NFSen (F) n AS-STATS

35 Tools NFSen p Network Flow Analysis Tool n NFSen p Display netflow data: Flows, Packets and Bytes using RRD (Round Robin Database). p Easily navigate through the netflow data. p Process the netflow data within the specified time span. p Create history as well as continuous profiles. p Set alerts, based on various conditions.

36 Tools NFSen

37 Tools NFSen

38 Tools NFSen TCP UDP Flows Packets Bytes Flows Packets Bytes Rank Port Count Port Count Port Count Port Count Port Count Port Count

39 AS-STATS p A netflow/sflow collector p n Storing data in RRD files A cron program n order the ASNs by level of traffic exchanged p A web interface to : n See your traffic per ASN n See your traffic per LINK

40 How as-stats looks? (Peers)

41 How as-stats looks? (Link)

42 What it is good for? p BGP Traffic Engineering p Finding out who you should (try to) peer with p Knowing what's going on in your network p Planning for future expansion

43 Tools IDS & IPS Computer Security is not something that you can just add on when you need it. Proper planning, installation, monitoring and maintenance all become part of a successful IDS/IPS implementation. p Tri-Sentry (Host Sentry, NetSentry, Service Sentry) p Nessus, Snort p Checkpoint, Cisco IPS, UTM (Cyberoam, Barracuda) $$$ ARE YOU AWARE OF YOUR NETWORK POLLUTION.

44 Malicious Traffic Detection Tool

45 Tools Log Management Elasticsearch flexible and powerful open source, distributed real- time search and analytics engine for your log ( n n n n n n n n n n n Easy to scale (Distributed) Everything is one JSON call away (RESTful API) Unleashed power of Lucene under the hood Excellent Query DSL Multi-tenancy Support for advanced search features (Full Text) Configurable and Extensible Document Oriented Schema free Conflict management Active community

46 Tools Log Management commercial SIEM Logstash Kibana

47 Elastic Elasticity

48 Tools Log Management Elasticsearch, Logstash & Kibana (ELK)

49 Tools Collaboration So, we have many Open Source/Commercial deployments already to monitor our network. All the programs can generate alert/alarm on fault detection. Need to centralize all the information. We need to collaborate these programs Need NOC Its not a big Room/House it s a software Its RT (the ticketing system)

50 Tools RT Request Tracker p RT is a battle-tested issue tracking system which thousands of organizations use for n bug tracking, n help desk ticketing, n customer service, n workflow processes, n change management, n network operations, n And so on..

51 Tools RT Request Tracker Whenever, wherever and however there is a problem in the network the relevant monitoring software will send a ticket directly to RT system and system admins will know immediately via or SMS. This automation will keep track of the SLA. RT has its own Help Desk system and escalation procedure.

52 Tools... RT n Why are they important? p Track all events, failures and issues n Focal point for help desk communication n Use it to track all communications p Both internal and external n Events originating from the outside: p customer complaints n Events originating from the inside: p System outages (direct or indirect) p Planned maintenance, upgrades, etc.

53 Tools... RT l l l l l Why are they important? Track all events, failures and issues Focal point for help desk communication Use it to track all communications Both internal and external Events originating from the outside: customer complaints Events originating from the inside: System outages (direct or indirect) Planned maintenance, upgrades, etc.

54 Tools RT

55 Tools The Big Cycle

56 Conclusion RT Cacti SmokePing Nagios NFSen Weather Map Rancid ALL IN ONE NETWORK MANAGEMENT SYSTEM

57 ???

Network Management & Monitoring Overview

Network Management & Monitoring Overview Network Management & Monitoring Overview Campus Network Best Practices August 11-12, 2008 Kathmandu, Nepal Hervey Allen, Phil Regnauld, Dale Smith Introduction This is a big topic... We'll try to respond

More information

Network Management & Monitoring Overview

Network Management & Monitoring Overview Network Management & Monitoring Overview Network Design and Operations July 24, 2009 Eugene, Oregon, USA hervey@nsrc.org Introduction This is a big topic... There are a lot of tools to choose from: Open

More information

Network Monitoring and Management Introduction to Networking Monitoring and Management

Network Monitoring and Management Introduction to Networking Monitoring and Management Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Introduction to Networking Monitoring and Management

Introduction to Networking Monitoring and Management Introduction to Networking Monitoring and Management Part I: Overview Core concepts presented: What is network monitoring What is network management Getting started Why network management Attack detection

More information

Introduction to Network Monitoring and Management

Introduction to Network Monitoring and Management Introduction to Network Monitoring and Management Network Startup Resource Center nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Lanka Education and Research Network. Network Monitoring LEARN. 28 th November IT Center, University of Peradeniya Dilum Samarasinhe (LEARN)

Lanka Education and Research Network. Network Monitoring LEARN. 28 th November IT Center, University of Peradeniya Dilum Samarasinhe (LEARN) Lanka Education and Research Network Network Monitoring 28 th November 2017 IT Center, University of Peradeniya Dilum Samarasinhe () Overview Neywork Monitoring System Cacti LibreNMS What is Network Monitoring?

More information

Mohammad Fakrul Alam Bangladesh Network Operators Group April 2016, Dhaka, Bangladesh

Mohammad Fakrul Alam Bangladesh Network Operators Group April 2016, Dhaka, Bangladesh Mohammad Fakrul Alam Bangladesh Network Operators Group 7-11 April 2016, Dhaka, Bangladesh What is Observium Autodiscovering SNMP based network monitoring tool Written in PHP (web application) Includes

More information

Release Notes Version 3.2

Release Notes Version 3.2 Release Notes Version 3.2 WÜRTHPHOENIX NetEye 3.2 Release Notes Overview of the updates and newly introduced functionalities. Nagios The daemon Nagios represents the core component of the monitoring solution

More information

Linux Clusters Institute: Monitoring. Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln

Linux Clusters Institute: Monitoring. Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln Linux Clusters Institute: Monitoring Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln Why monitor? 2 Service Level Agreement (SLA) Which services must be provided

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan

10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan 10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network

More information

Monitoring tools and techniques for ICT4D systems. Stephen Okay

Monitoring tools and techniques for ICT4D systems. Stephen Okay Monitoring tools and techniques for ICT4D systems Stephen Okay Effective Monitoring Why do monitoring? Monitoring tools and Applications Monitoring:What,Where, Why,How, etc. Alerting Off-the-shelf vs.

More information

Network Management Standards Architectures & Applications. Network Management

Network Management Standards Architectures & Applications. Network Management Network Management Standards Architectures & Applications Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

Graphing and statistics with Cacti. AfNOG 11, Kigali/Rwanda

Graphing and statistics with Cacti. AfNOG 11, Kigali/Rwanda Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda A little bit of history MRTG: Monitor interfaces on routers/switches and generate graphs for interfaces/load/etc. Anything discoverable by SNMP.

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System

Unified Networks Administration & Monitoring System Specifications : YM - IT. YM Unified Networks Administration & Monitoring System 2115 YM Unified Networks Administration & Monitoring System 1. مواصفات نظام ادارة ومراقبة الشبكات الموحد: BOQ of Unified Networks Administration and Monitoring System: N 1 2 3 4 Item Main Network Monitoring

More information

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor

More information

CCIE SP Operations Written Exam v1.0

CCIE SP Operations Written Exam v1.0 Cisco 350-060 CCIE SP Operations Written Exam v1.0 Version: 5.0 QUESTION NO: 1 DRAG DROP Cisco 350-060 Exam Answer: Critical Section Loss of Signal (SLOS) Critical Section Loss of Frame (SLOF) Major Alarm

More information

Network Management Functions - Fault. Network Management

Network Management Functions - Fault. Network Management Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures

More information

Network and Server Statistics Using Cacti

Network and Server Statistics Using Cacti Network Management & Monitoring Network and Server Statistics Using Cacti These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring NfSen These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) What is NfSen

More information

Network Traffic Visibility and Anomaly October 27th, 2016 Dan Ellis

Network Traffic Visibility and Anomaly October 27th, 2016 Dan Ellis Network Traffic Visibility and Anomaly Detection @Scale: October 27th, 2016 Dan Ellis Introduction Network traffic visibility? Introduction Network traffic visibility? What data is available on your network

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

ITSM SERVICES. Delivering Technology Solutions With Passion

ITSM SERVICES. Delivering Technology Solutions With Passion ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past

More information

Connect. Communicate. Collaborate. Click to edit Master title style. Using the perfsonar Visualisation Tools

Connect. Communicate. Collaborate. Click to edit Master title style. Using the perfsonar Visualisation Tools Connect. Communicate. Collaborate Click to edit Master title style Using the perfsonar Visualisation Tools ITINERARY Wednesday 30 th May Using the perfsonar Visualisation Tools. Thursday 31 st May and

More information

XO Stats: User Guide. Monitor your circuit performance, troubleshoot, and plan future network capacity requirements

XO Stats: User Guide. Monitor your circuit performance, troubleshoot, and plan future network capacity requirements XO Stats: User Guide Monitor your circuit performance, troubleshoot, and plan future network capacity requirements XO Stats is a web-based portal that allows you, an XO Communications data and Internet

More information

NET311 Computer Network Management Tools, Systems and Engineering

NET311 Computer Network Management Tools, Systems and Engineering NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Network Monitoring & Management Using Cacti

Network Monitoring & Management Using Cacti Network Monitoring & Management Using Cacti Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Linux Clusters Institute: Monitoring

Linux Clusters Institute: Monitoring Linux Clusters Institute: Monitoring Nathan Rini -- National Center for Atmospheric Research (NCAR) nate@ucar.edu Kyle Hutson System Administrator for Kansas State University kylehutson@ksu.edu Why monitor?

More information

Copyright Link Technologies, Inc.

Copyright Link Technologies, Inc. Copyright 2013 -- Link Technologies, Inc. www.linktechs.net 9/19/2013 Mikrotik Certified Trainer / Engineer MikroTik Certified Dude Consultant Consulting Since 1997 Enterprise Class Networks WAN Connectivity

More information

A Survey on Open Source Tools - for Server Monitoring using SNMP

A Survey on Open Source Tools - for Server Monitoring using SNMP A Survey on Open Source Tools - for Server Monitoring using SNMP S. Priscilla Florence Persis, S. Bindiya B.Tech IT III year SNS College of Engineering,Coimbatore. Abstract:- This paper covers the scope

More information

Introduction to Netflow

Introduction to Netflow Introduction to Netflow Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Introducing MarWatch 5.1

Introducing MarWatch 5.1 Introducing MarWatch 5.1 Why MarWatch 5.1? Monitoring Mitel voice quality tells us there IS a problem. Now, monitoring the rest of the infrastructure tells us WHERE. Diagnosing network problems is hard.

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

QUICK INSTALLATION GUIDE Minder 4.2

QUICK INSTALLATION GUIDE Minder 4.2 QUICK INSTALLATION GUIDE Minder 4.2 1 Minder 4.2 Contents 1. Introducing MindArray Minder... 4 1.1 Gain Visibility into Server, Application, Virtualization and Network Infrastructure... 4 1.2. Why Minder?...

More information

BIG-IP Analytics: Implementations. Version 13.1

BIG-IP Analytics: Implementations. Version 13.1 BIG-IP Analytics: Implementations Version 13.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles... 5 Overview:

More information

GLOSSARY. See ACL. access control list.

GLOSSARY. See ACL. access control list. GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs

More information

6.2. Management & Administration Guide

6.2. Management & Administration Guide 6.2 Management & Administration Guide Netmon Management and Administration Guide 2 Contents Contents... 2 Introduction... 5 Settings Explorer... 5 Initial Setup... 6 Network Interfaces... 6 (Re)configuring

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

What s New in Release 9.2 Martin Adamčík

What s New in Release 9.2 Martin Adamčík CA SPECTRUM Infrastructure Manager What s New in Release 9.2 Martin Adamčík Agenda New IP Routing Management New Report Management Capabilities Network Configuration Management Enhancements in r9.2 Other

More information

An Introduction APRICOT 2008 Network Management Workshop February Taipei, Taiwan

An Introduction APRICOT 2008 Network Management Workshop February Taipei, Taiwan An Introduction APRICOT 2008 Network Management Workshop February 20 25 Hervey Allen & Phil Regnauld Where Does Nagios Fit? Nagios, in some ways, ties it all together. We've seen things like: SNMP MRTG

More information

Navigating Cisco Prime Internetwork Performance Monitor Tasks in LMS 4.1

Navigating Cisco Prime Internetwork Performance Monitor Tasks in LMS 4.1 CHAPTER 7 Navigating Cisco Prime Internetwork Performance Monitor Tasks in LMS 4.1 Cisco Prime Monitor (IPM) is a network troubleshooting application that gauges network response time and availability.

More information

Monitoring Large Scale Network by The Dude

Monitoring Large Scale Network by The Dude We Attend 173 th Monitoring Large Scale Network by The Dude Abdul Kader Linkon Network Engineer Fareast Islami Life Insurance Company Ltd. i m Abdul Kader Linkon Network engineer Grade of senior executive

More information

BIG-IP Analytics: Implementations. Version 12.1

BIG-IP Analytics: Implementations. Version 12.1 BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting

More information

Network Management and Monitoring

Network Management and Monitoring Network Management and Monitoring Introduction to Netflow These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Program documentation is constantly updated with every new build. It is also available on-line.

Program documentation is constantly updated with every new build. It is also available on-line. NetCrunch v9 NetCrunch Guide Program documentation is constantly updated with every new build. It is also available on-line. Please help us make it better. If you find any topic incomplete or missing -

More information

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

SolarWinds Engineer s Toolset Fast Fixes to Network Issues DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management

Level 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management Level 3 SM Enhanced Management - FAQs Frequently Asked Questions for Level 3 Enhanced Management 2015 Level 3 Communications, LLC. All rights reserved. 1 LAYER 3: CONVERGED SERVICES 5 Where can I find

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Configuring IP SLAs LSP Health Monitor Operations

Configuring IP SLAs LSP Health Monitor Operations Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to

More information

Always Keep IT Purely Simple

Always Keep IT Purely Simple Always Keep IT Purely Simple Network Monitoring Software Page 1 CEO Message AKiPS is a scalable, fully featured monitoring tool that collects, reports and alerts on the performance of your network infrastructure.

More information

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 1 FLOW FUNDAMENTALS 9 2 COLLECTORS AND SENSORS 21

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 1 FLOW FUNDAMENTALS 9 2 COLLECTORS AND SENSORS 21 CONTENTS IN DETAIL ACKNOWLEDGMENTS xv INTRODUCTION 1 Network Administration and Network Management... 3 Network Management Tools... 3 MRTG, Cricket, and Cacti... 3 RTG... 4 Nagios and Big Brother... 4

More information

Data Sheet. Monitoring Automation for Web-Scale Networks MONITORING AUTOMATION FOR WEB-SCALE NETWORKS -

Data Sheet. Monitoring Automation for Web-Scale Networks MONITORING AUTOMATION FOR WEB-SCALE NETWORKS - Data Sheet Monitoring Automation for Web-Scale Networks CLOUD-BASED MONITORING AUTOMATION FOR WEB-SCALE NETWORKS NetSpyGlass (NSG) is cloud-based, network monitoring automation for network operators seeking

More information

Cisco Unified Operating System Administration Web Interface for Cisco Emergency Responder

Cisco Unified Operating System Administration Web Interface for Cisco Emergency Responder Cisco Unified Operating System Administration Web Interface for Cisco Emergency Responder These topics describe the Cisco Unified Operating System (OS) Administration web interface for Cisco Emergency

More information

Systrome Next Gen Firewalls

Systrome Next Gen Firewalls N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security

More information

Configuring IP SLAs TCP Connect Operations

Configuring IP SLAs TCP Connect Operations This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices

More information

Managed Services OVERVIEW

Managed Services OVERVIEW Managed Services OVERVIEW overview 24/7 Support Services Tailored for large and small businesses MANAGED SERVICES 3 MONITORING AND ALERTING SERVICE 4 SUMMARY 4 DESCRIPTION 4 MONITORING 4 ALERTING 4 RESPONSIBILITY

More information

Received Snmp Response With Error Code Nosuchname

Received Snmp Response With Error Code Nosuchname Received Snmp Response With Error Code Nosuchname That particular response is generated by the remote device, not that nagios server. It is telling you that it received your request, but for some reason

More information

Network Documentation & Netdot

Network Documentation & Netdot Network Documentation & Netdot Network Startup Resource Center nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

Required Ports for Cisco Prime Collaboration

Required Ports for Cisco Prime Collaboration The following tables lists the required ports for the Cisco Prime Collaboration Assurance and Cisco Prime Collaboration Provisioning servers to communicate with the devices. Ports Used by Prime Collaboration

More information

Scalability Engine Guidelines for SolarWinds Orion Products

Scalability Engine Guidelines for SolarWinds Orion Products Scalability Engine Guidelines for SolarWinds Orion Products Last Updated: March 7, 2017 For a PDF of this article, click the PDF icon under the Search bar at the top right of this page. Your Orion Platform

More information

What s New in Fireware v12.3 WatchGuard Training

What s New in Fireware v12.3 WatchGuard Training What s New in Fireware v12.3 2 What s New in Fireware v12.3 Updates to Networking functionality: SD-WAN actions SD-WAN reporting enhancements NetFlow support Link monitor enhancements Centralized FireCluster

More information

Centerity Monitor User Guide

Centerity Monitor User Guide Centerity Monitor 4.10 User Guide July 2018 Page 2 End-User License Agreement (EULA) This guide and the use of Centerity software is subject to Centerity s End-User License Agreement (EULA). A copy of

More information

Network and Server Statistics using Cacti

Network and Server Statistics using Cacti Network and Server Statistics using Cacti APRICOT 2009 19 February 2009 Hervey Allen Introduction A tool to monitor, store and present network and system/server statistics Designed around RRDTool with

More information

Media Path Analysis. Analyzing Media Paths Using IP SLA. Before You Begin. This section contains the following:

Media Path Analysis. Analyzing Media Paths Using IP SLA. Before You Begin. This section contains the following: This section contains the following: Analyzing Media Paths Using IP SLA, page 1 Analyzing Media Paths Using VSAA, page 3 Managing a Video Test Call, page 6 Analyzing Media Paths Using IP SLA To start a

More information

OER Commands. November Cisco IOS Optimized Edge Routing Command Reference OER-3

OER Commands. November Cisco IOS Optimized Edge Routing Command Reference OER-3 OER-3 active-probe active-probe To configure an Optimized Edge Routing (OER) active probe for a target prefix, use the active-probe command in OER master controller configuration mode. To disable the active

More information

Multihoming Case Study

Multihoming Case Study Multihoming Case Study ISP Workshops Last updated 10 October 2007 Multihoming Case Study p Set of slides based on work assisting an ISP with their multihoming needs between 2000 and 2002 n Should be taken

More information

Case Study emagic a Complete Datacenter Management Solution

Case Study emagic a Complete Datacenter Management Solution Case Study emagic a Complete Datacenter Solution www.esds.co.in Product Overview emagic is an all-in-one solution to manage all the aspects of data center. It is an automated system designed to make data

More information

WhatsUpGold. v14. Getting Started Guide

WhatsUpGold. v14. Getting Started Guide WhatsUpGold v14 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold About WhatsUp Gold Available editions WhatsUp Gold optional plug-ins... 3 CHAPTER 2 Deploying Deploying WhatsUp

More information

KEMP 360 Vision. KEMP 360 Vision. Product Overview

KEMP 360 Vision. KEMP 360 Vision. Product Overview KEMP 360 Vision Product Overview VERSION: 1.0 UPDATED: SEPTEMBER 2016 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 2 Architecture... 4 3 Sample Scenarios...

More information

TSHOOT: Troubleshooting and Maintaining Cisco IP Networks

TSHOOT: Troubleshooting and Maintaining Cisco IP Networks 642-832 TSHOOT: Troubleshooting and Maintaining Cisco IP Networks Course Number: 642-832 Length: 5 Days Course Overview Troubleshooting and Maintaining Cisco IP Switched Networks (TSHOOT 642-832) is a

More information

PRODUCT BRIEF Cubro Vitrum Management Suite PRODUCT BRIEF. 1

PRODUCT BRIEF Cubro Vitrum Management Suite PRODUCT BRIEF.  1 PRODUCT BRIEF www.cubro.com 1 Introduction Cubro Vitrum is a server-based network management software. The visualisation of the software platform gives a better overview of the network and its traffic.the

More information

MARWATCH RELEASE NOTES RELEASE 5.1

MARWATCH RELEASE NOTES RELEASE 5.1 MARWATCH RELEASE NOTES RELEASE 5.1 DOCUMENT DATE: MARCH 9, 2016 Introduction Notice The information contained in this document is believed to be accurate in all respects but is not warranted by Martello

More information

N-Partner solution. VPN should be able to do AI and Abnormal Analysis, detect problems and solve them

N-Partner solution. VPN should be able to do AI and Abnormal Analysis, detect problems and solve them N-Partner solution VPN should be able to do AI and Abnormal Analysis, detect problems and solve them Headquarter Branch Office There will be huge loss if the intranet is disconnected for only an hour For

More information

NMS300 Network Management System Application

NMS300 Network Management System Application NMS300 Network Management System Application Quick Start Guide October 2013 202-11288-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing

More information

IPv6 netw ork m anagem ent

IPv6 netw ork m anagem ent IPv6 netw ork m anagem ent János Mohácsi (mohacsi@niif.hu) Central Asia workshop,ashgabat 1 Contributions Simon Muyal, RENATER Bernard Tuy, RENATER Jérôme Durand, RENATER Ralf Wolter, Cisco Patrick Grossetête,

More information

NetBrain POC Walk-Through

NetBrain POC Walk-Through NetBrain POC Walk-Through For OE 4.1 Dynamic Documentation Visual Troubleshooting NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Measuring Delay with These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Environmental monitoring of any facilities, control of security breaches, temperatures, smoke, water leakages, voltages and more.

Environmental monitoring of any facilities, control of security breaches, temperatures, smoke, water leakages, voltages and more. VT800 Environmental monitoring of any facilities, control of security breaches, temperatures, smoke, water leakages, voltages and more. Compatible with all VT or SC sensors, it provides a complete environmental,

More information

Cisco Performance Routing

Cisco Performance Routing Cisco Performance Routing As enterprise organizations grow their businesses, the demand for real-time application performance and a better application experience for users increases. For example, voice

More information

vrealize Operations Management Pack for NSX for vsphere 2.0

vrealize Operations Management Pack for NSX for vsphere 2.0 vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Cisco Prime Collaboration Deployment Configuration and Administration

Cisco Prime Collaboration Deployment Configuration and Administration Cisco Prime Collaboration Deployment Configuration and Administration Services, page 1 Limitations and Restrictions, page 5 Services After the installation of the Cisco Prime Collaboration Deployment platform,

More information

Cisco IOS Optimized Edge Routing Command Reference

Cisco IOS Optimized Edge Routing Command Reference First Published: 2007-01-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE

More information

Overview of Inventory Management

Overview of Inventory Management CHAPTER 1 Inventory Management in Cisco Prime LAN Management 4.1 groups the various activities in LMS involved in managing your inventory: your network devices. You can access these features from the Inventory

More information

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Monitor your containers with the Elastic Stack. Monica Sarbu

Monitor your containers with the Elastic Stack. Monica Sarbu Monitor your containers with the Elastic Stack Monica Sarbu Monica Sarbu Team lead, Beats team monica@elastic.co 3 Monitor your containers with the Elastic Stack Elastic Stack 5 Beats are lightweight shippers

More information

The Art of Container Monitoring. Derek Chen

The Art of Container Monitoring. Derek Chen The Art of Container Monitoring Derek Chen 2016.9.22 About me DevOps Engineer at Trend Micro Agile transformation Micro service and cloud service Docker integration Monitoring system development Automate

More information

Cisco Unified Operating System Administration Web Interface

Cisco Unified Operating System Administration Web Interface Cisco Unified Operating System Administration Web Interface ServerGroup, page 1 Hardware, page 2 Network Configuration, page 3 Software Packages, page 4 System, page 5 IP Preferences, page 6 Ethernet Configuration,

More information

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.

NetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience. NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility

More information

The securityprobe5es-x20 s software motion detection and a rich notification suite keeps you up to date 24 hours a day. securityprobe5es-x20

The securityprobe5es-x20 s software motion detection and a rich notification suite keeps you up to date 24 hours a day. securityprobe5es-x20 v.100.00x will monitor the physical environment and alert you of any disturbances, such as unauthorized intruders, security breaches, high temperatures, smoke, water leakages, power outages and much more.

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25

32-bit ASNs. Greg Hankins Chris Malayter APRICOT 2009 APRICOT /02/25 32-bit ASNs Greg Hankins ghankins@force10networks.com Chris Malayter cmalayter@switchanddata.com APRICOT 2009 APRICOT 2009 2009/02/25 ASN Terminology Soup What??? 2-octet, 2-byte, 16-bit, ASN16, and OLD

More information

WhatsUpGold. v14.1. Getting Started Guide

WhatsUpGold. v14.1. Getting Started Guide WhatsUpGold v14.1 Getting Started Guide Contents CHAPTER 1 Welcome Welcome to WhatsUp Gold About WhatsUp Gold Available editions WhatsUp Gold optional plug-ins... 3 CHAPTER 2 Deploying Deploying WhatsUp

More information

The securityprobe5e-x60 s rich notification suite keeps you up to date 24 hours a day. securityprobe5es-x60. securityprobe5es-x60

The securityprobe5e-x60 s rich notification suite keeps you up to date 24 hours a day. securityprobe5es-x60. securityprobe5es-x60 v.100.00x securityprobe5se-x60 will monitor the physical environment and alert you of any disturbances, such as unauthorized intruders, security breaches, high temperatures, smoke, water leakages, power

More information

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0

DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 DPtech IPS2000 Series Intrusion Prevention System User Configuration Guide v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help, please contact Hangzhou

More information

Network Traffic Analysis - Course Outline

Network Traffic Analysis - Course Outline Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have

More information

Navigating Cisco Prime Campus Manager Tasks in LMS 4.1

Navigating Cisco Prime Campus Manager Tasks in LMS 4.1 CHAPTER 4 Navigating Cisco Prime Campus Manager Tasks in LMS 4.1 CiscoWorsk Campus Manager (CM) is an integral component of Cisco Prime LAN Management Solution. As an enterprise solution for network management,

More information