The ehealth Traffic Accountant Reporting Application
|
|
- Hillary Lyons
- 6 years ago
- Views:
Transcription
1 Focus on Value The ehealth Traffic Accountant Reporting Application Understanding data (or traffic ) flow is essential for capacity planning and enabling a consistent level of performance particularly in dynamic networks that are subject to frequent upgrades and changes. The ehealth Traffic Accountant reporting application makes it easy to manage traffic for optimum performance by analyzing network traffic flows between the nodes in your network, and between autonomous systems. Enterprises can use this application for security, planning interdepartmental cost allocations, monitoring traffic, and diagnosing traffic problems. Traffic Accountant s autonomous system (AS) to AS support enables Service Providers to identify the most effective partners, incoming and outgoing traffic destinations, and the traffic that is simply passing through their network and not using the services that they provide. It shows how nodes and applications use your network. You can use this information to plan and implement network reconfiguration, growth, and security procedures and to relate network costs to the nodes and organizations that use the network. Traffic flow information is not only useful for understanding your network as part of capacity and performance planning, but it is also useful in assessing your infrastructure for its ability to handle applications requiring high performance and availability. Traffic management provides a detailed look at the environment in which the applications operate. Optimizing IT management by identifying the major users of the network. The Value of Traffic Accountant The ehealth Traffic Accountant offers the following benefits: Identify the Most Active Nodes By determining which nodes are most active in your network, you can easily isolate the source of network congestion and problems. Identify the Major Sources of Communication By determining which nodes communicate most with a particular department or location, you can provide additional bandwidth between high traffic areas to avoid congestion. Identify Your Dominant Applications By examining a breakdown of the total network traffic based on applications, you can allocate resources to provide the highest level of support and service for the applications being used most often. Effectively Manage Cost Allocations By analyzing the traffic distribution across the organization, you can determine which departments should share the cost burden. Monitor Variations in Traffic over Time By customizing a report, you can show variations in traffic over time, identify users who access an server or other application, and investigate traffic destinations. June 2005
2 Traffic Collection and Analysis Concepts ehealth Traffic Accountant discovers RMON2 probes installed in the network, collects traffic data from the probes, and consolidates the statistics. An RMON2 probe is a remote network monitoring device that analyzes traffic and summarizes the data by nodes, protocols, and applications. A probe can be a standalone device attached to the network segment or it can be imbedded into a network device such as a LAN switch or a router. In addition to supporting RMON2- compliant probes, ehealth Traffic Accountant also supports the Cisco NetFlow FlowCollector as a data source. A probe can only report on traffic that appears on the network segment to which it is attached. A probe can be used on both LAN and WAN segments. Thus, probes must be strategically placed throughout the network to provide coverage of the major conversations of interest. For example, a probe placed on the same segment as the Internet firewall can see and report on all traffic to and from the Internet. From a central site, a probe connected to the Frame Relay access port can report on all traffic on the PVCs coming into the central site. ehealth Traffic Accountant analyzes and breaks down the traffic as seen by each probe or Cisco FlowCollector according to three categories: nodes, conversations, and protocols. A node is any device in the network that has a network address (IP address, IPX address, or MAC address). A probe records the traffic volume generated by each node on the network segment. With this information, you can identify the top talkers of the network. A conversation is a data transfer between a pair of nodes. For example, the conversation between a workstation and a server might include a number of transactions such as file transfer, a TELNET session, and an HTTP transfer. For the probe to record the conversation, the traffic must pass through the probe segment. In other words, the sending node or the receiving node must reside on the probe segment, or the probe segment must be a transit segment (that is, a LAN or WAN line through which traffic passes). With information on the conversations, you can identify the top conversational partners of a specific node. A probe analyzes the traffic and accumulates statistics for each protocol, such as the number of bytes of IP versus IPX traffic. The upper-layer 2 protocol is usually associated with an application. In the case of IP, the application (for example, TELNET or FTP) is associated with a TCP or UDP port number. In the case of IPX, the application is usually associated with the socket number. With statistics for each application, you can identify the most prominent applications in the network. Figure 1 shows the deployment of probes in a typical network. In this example, Probe1 is a WAN probe connected to the Frame Relay port of the central router. It sees all traffic between the central site and branch offices. Probe2 sits on the server segment and sees all traffic to and from the servers. Probe3 sits on the Internet segment and sees all traffic to and from the Internet. If you place more probes on the remaining segments, you can collect more information about the network. The number of probes used usually represents a tradeoff between cost and the amount of information available to Traffic Accountant for analysis. Figure 1. Deployment of Probes in a Typical Network
3 Organizing Your Nodes to Analyze Traffic To report on the traffic statistics that your probes collect, you can organize your nodes into views and groups. A Traffic Accountant view contains groups of nodes associated with a particular location or department. Different views can offer different perspectives for analyzing the same traffic statistics. A Departmental view can include groups of nodes (or members ) that communicate with a particular department. This type of view allows you to compare the traffic volumes among departments within your organization, identify the departments that generate the most traffic, and those with which an organization communicates the most. For example, consider a network with nodes from A to Z. You can create a view called Department (Figure 2) to organize the nodes into groups based on departments that they support. These two views offer different perspectives for analyzing the same traffic statistics. When a report is generated, you can choose the view to use. In the departmental view, you can compare the traffic volumes of the different departments, or the departments with which the Engineering department communicates the most. In the location view, you can compare the traffic volumes of the different locations and pinpoint the location that generates the most traffic, or identify the locations with which one site communicates the most. In practice, a network typically has a large number of nodes. You can assign important nodes into groups based on subnet, IP address, or probe, and leave the rest as unassigned. The traffic statistics for these nodes will be added together and will appear in a group called Unassigned. As Traffic Accountant detects new nodes, it places them in the appropriate groups. The Traffic Accountant s large number of predefined reports combined with the ability to create customized reports provides IT/network managers with a powerful planning and troubleshooting tool. Figure 2. Departmental View You can then create a separate group for the same network called Location (Figure 3) by organizing the same nodes into groups based on their placement within your infrastructure. A Location view allows you to compare the traffic volumes among locations within your organization, identify the locations that generate the most traffic, and those with which an organization communicates the most. Generating Traffic Accountant Reports. You can generate reports to identify the nodes or groups that produce the most traffic and the organizations or locations that communicate the most often with each other. These reports can also identify the users who account for most of the traffic, the dominant applications, and the ways in which traffic varies over time. Traffic Accountant can generate a large number of reports grouped into three different categories: Quick Start Standard Customized Quick Start Reports. Quick Start reports are a predefined set of reports that you can run to answer the most commonly asked questions about network usage. Standard Reports. The standard reports are a comprehensive set of predefined reports that can provide detailed information about nodes, groups, views, probes, and the network. Figure 3. Location View Customized Reports. Customized Traffic Accountant reports can perform specific reporting tasks for your IT environment. You can create customized versions of the standard reports or new reports. For example, you can create a customized report that tracks the volume of Web (HTTP) traffic. 3
4 Identifying the Most Active Nodes If users experience slow response time, you can generate ehealth Health Reports to isolate the problem. In the sample report shown in Figure 4, the segment utilization was abnormally high. This caused excessive congestion and collisions. The Top Nodes For Group chart shown in Figure 5 displays the traffic volume generated by the most active nodes and the protocol breakdown of the traffic. A rarely used desktop server, jsmith, was one of the most active nodes. Since this is highly unusual, it is the likely cause of the network congestion in the group. In the scenario depicted in Figure 5, jsmith was identified as the node that generated an abnormal level of traffic. To investigate the problem further, we can identify the nodes with which jsmith communicated and the nature of the traffic, using the Most Active Nodes report. Figure 6 shows that a large percentage of the traffic was among jsmith, mailgw (the mail gateway), and dnsserver (the DNS server). This suggests that the high traffic volume was the result of an unusually high volume of traffic to and from jsmith. Note that this report can also be used to track and audit business-critical resources. For example, this report can be used to display the top conversations with the order processing server, allowing you to identify the main users of the server. You could also run a Node Conversation Log Text report to display the 50 largest node partners for a node and the applications used or the NodePartners For Node Trend chart to display the largest node partners for a node and when they communicated. Figure 4. Health Report Figure 5. Top Nodes for Group Chart Figure 6. Most Active Nodes Report 4
5 Identifying the Major Sources of Communication A common technique in network optimization is to identify the major communication partners and then provide additional bandwidth between high traffic areas. For example, to find out which groups communicate the most with the Engineering group, the GroupPartners For Group chart can be used. It shows the percentage of Engineering traffic with each of the group partners. Figure 7 shows that 61% of the traffic is intradepartment traffic (traffic from one Engineering node to another). Of the remaining traffic, 20% is between Engineering and Marketing. This information allows the network manager to optimize the network infrastructure by providing a direct communication path between them. You might want to connect the two groups with a bridge or router if they are in the same building or install a direct WAN link between the two groups if they are geographically separated. Another related report is the standard Group Conversation Log Text report that displays the 50 largest group partners for a specified group and the applications used. Identifying Dominant Applications In IT planning, it is very important to identify your dominant protocols and applications. This information allows the IT or network manager to allocate resources based on the nature of the traffic. The Quick Start Network Applications Used in Your Network report gives you a high-level view of the protocol distribution by showing a breakdown of the total network traffic by protocol. Figure 8 shows that the order processing application, a business-critical application, accounts for 28% of the total network traffic. The network must be designed in a way that provides the highest level of support and service for this application. This may include providing redundant servers or routing paths, dedicated bandwidth for this application, or applying QoS policies. Figure 7. Group Partners for Group Report Figure 8. Applications Used in Your Network 5
6 From a different perspective, it is also useful to determine the traffic breakdown by group. The TopGroups For View report displays the applications used by the most active groups. Figure 9 shows that Sales, Tech Support, and Finance are the three main users of the order processing application. To optimize the network, servers running the order processing application should be installed in each of the three main user groups. The chart also shows that as a group, Engineering generates the most network traffic. However, the composition of traffic may change depending on the time of day. To understand when an application is used the most, you can use the Application For Group Trend chart. The sample chart shown in Figure 10 was generated for the Engineering group. Figure 10 shows that even though FTP is the dominant application for Engineering, it is only used in the early hours after midnight. During the rest of the day, the dominant application is AppleTalk. This information can be very useful. For example, to speed up the response time of interactive traffic such as TELNET or order processing, a common technique is to use priority queuing in the router to assign TELNET or order processing traffic a higher priority at the expense of bulk transfer traffic such as FTP. However, the chart shows that since order processing and FTP traffic do not occur at the same time, this technique would be largely ineffective. Instead, lower priority should be assigned to bulk transfer traffic that occurs concurrently with order processing. Figure 9. Top Groups for View Bar Chart Figure 10. Applications For Group Trend Chart 6
7 Planning Cost Allocations Effectively In many companies, the cost of running the enterprise network is shared among departments based on the amount of traffic generated. Although Traffic Accountant is not a billing application, it is very useful for identifying the traffic distribution by groups to determine how monthly costs should be allocated. In Figure 11, the Allocation By Department report shows that the monthly cost of $527,894 could be split between the various departments based on the traffic distribution. In this example, Engineering consumed approximately 23% of the cost or $121,415. You can use Traffic Accountant to identify the major sources of traffic within a department by determining which servers are most frequently accessed. If some servers generate significantly more traffic than others, you might want to move them to dedicated switched ports to improve performance. To obtain this information, you can use the Group Activity Log Text report. Figure 12 shows that in the Engineering group, Server10, Mailgw, Server2, Server5, Dnsserver, and Figure 11. Allocation by Department Report Server1 are the busiest servers. You can use ehealth Health reports to determine if these servers have enough resources (bandwidth, processing power, memory, and disk space) to handle the load. Figure 12. Group Activity Log Report 7
8 Monitoring Variations in Traffic over Time If you are concerned about how your Web server is being used, you can track the users who frequently access it and ensure that they are using resources for the appropriate purposes during business hours only. To find out, you can create a customized report to show the variation of Web traffic over time for a particular Web application such as Microsoft Exchange. For example, the Daily Web Traffic report shown in Figure 13 indicates that traffic steadily increases throughout the day, but gets busy around noon and again from 8 p.m. to midnight. Most likely, most employees check their and reply to messages at lunchtime and again in the evening. This report can also be used to monitor compliance with corporate usage policies. For example, if the policy allows a particular application to be used during a certain time of day only, the chart shown in Figure 14 can be used to ensure that users adhere to the policy. To obtain more detailed information about the Web traffic destinations, you can use another customized report to list the top 10 servers. The chart shows that some users have been using excessively. Figure 13. Daily Traffic Report The Web Traffic Audit report provides more detail on Web access. It displays a record of the top 50 conversations that used HTTP. For each conversation, the report shows the node partners and the size of the conversation in bytes. The table shown in Figure 15 shows that jsmith is the top user and her traffic accounts for 20% of the total traffic. Figure 14. Top 10 Servers Report Figure 15. Web Traffic Audit Report 8
9 Traffic Accountant Report Summary Quick Start Reports Standard Reports Identify the nodes or groups that generate the most traffic: Probe - Top Talkers Seen Network - Top Talkers in Your Network Probe - Top Conversations Top Nodes For Group Bar Chart Top Nodes For Group Trend Chart Top Nodes Seen By Probe Trend Chart Top Nodes Among All Nodes Bar Chart TopGroups For View Bar Chart Top Nodes For View Bar Chart Identify who communicates with the node or group: GroupPartners For Group Pie Chart NodeToNodeConversations AllNodes Text Top Conversations Seen By Probe Text NodeToNodeConversations View Text Identify who accounts for what percentage of traffic: Node - Conversation with Other Nodes Allocation By Department Pie Chart Group Activity Log Text Group Conversation Log Text Node Conversation Log Text Identify the dominant applications: Node - Applications Seen Probe - Applications Seen Network - Applications Used in Your Network Applications For Group Trend Chart Applications For AllNodes Pie Chart Applications For Node Trend Chart Applications Seen By Probe Trend Chart Applications For View Pie Chart Identify who is using a critical resource: Node - Conversation with Other Nodes Web Traffic Audit GroupPartners For Node Pie Chart NodePartners For Node Trend Chart Analyze traffic variations over time: Network - TopTalkers in Your Network Network - Applications Used in Your Network Top Nodes For Group Trend Chart Top Nodes Seen By Probe Trend Chart Applications For Group Trend Chart Applications For Node Trend Chart Applications Seen By Probe Trend Chart NodePartners For Node Trend Chart Copyright 2005 Concord Communications, Inc. ehealth, the Concord Logo, Live Health, Live Status, SystemEDGE, AdvantEDGE and/or other Concord marks or products referenced herein are either registered trademarks or trademarks of Concord Communications, Inc. Other trademarks are the property of their respective owners. 9
Managing Cisco QoS Using ehealth
Focus Topic January 2006 Managing Cisco QoS Using ehealth Quality of Service (QoS) is a measure of performance that allows you to configure different levels of service for various types of traffic in your
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationOptimize and Accelerate Your Mission- Critical Applications across the WAN
BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization
More informationThe Total Network Volume chart shows the total traffic volume for the group of elements in the report.
Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description
More informationGetting Started with ehealth for Voice Cisco Unity & Unity Bridge
Focus on Setup Getting Started with ehealth for Voice Cisco Unity & Unity Bridge What s Inside About ehealth for Voice Cisco Unity. An overview of the product components. Requirements. Prerequisites for
More informationSeven Criteria for a Sound Investment in WAN Optimization
Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationYealink VCS Network Deployment Solution
Yealink VCS Network Deployment Solution Oct. 2015 V10.6 Yealink Network Deployment Solution Table of Contents Table of Contents... iii Network Requirements... 1 Bandwidth Requirements... 1 Calculating
More informationAdvanced Application Reporting USER GUIDE
Advanced Application Reporting USER GUIDE CONTENTS 1.0 Preface: About This Document 5 2.0 Conventions 5 3.0 Chapter 1: Introducing Advanced Application Reporting 6 4.0 Features and Benefits 7 5.0 Product
More informationHTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS
More informationPassReview. PassReview - IT Certification Exams Pass Review
PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid
More informationCisco IOS Switching Paths Overview
This chapter describes switching paths that can be configured on Cisco IOS devices. It contains the following sections: Basic Router Platform Architecture and Processes Basic Switching Paths Features That
More informationDistributed ehealth Concepts
Focus on Value ehealth Concepts Business networks often contain hundreds of thousands, or even millions, of manageable resources. These resources can include everything from LAN/ WAN interfaces, routers,
More information6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay
6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may
More informationEMC Celerra Replicator V2 with Silver Peak WAN Optimization
EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN
More informationGetting Started with ehealth for Voice--Cisco CallManager
Focus on Setup Getting Started with ehealth for Voice-- Cisco CallManager manages IP telephony devices and call services over a data network and manages call setup, controls call devices, and collects
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationMonitoring network bandwidth on routers and interfaces; Monitoring custom traffic on IP subnets and IP subnets groups; Monitoring end user traffic;
NetVizura NetFlow Analyzer enables you to collect, store and analyze network traffic data by utilizing Cisco NetFlow, IPFIX, NSEL, sflow and compatible netflow-like protocols. It allows you to visualize
More informationTroubleshooting with Network Analysis Module
Troubleshooting with Network Analysis Module Introduction The Cisco Network Analysis Module (NAM) provides visibility into how the network is performing and how users experience the applications and services
More informationMonitoring and Analysis
CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze
More informationConfiguring a Zone-Based Firewall on the Cisco ISA500 Security Appliance
Application Note Configuring a Zone-Based Firewall on the Cisco ISA500 Security Appliance This application note describes how to configure a zone-based firewall on the Cisco ISA500 security appliance.
More informationConfiguring AVC to Monitor MACE Metrics
This feature is designed to analyze and measure network traffic for WAAS Express. Application Visibility and Control (AVC) provides visibility for various applications and the network to central network
More informationMonitoring UPS Devices and Environmental Sensors Using ehealth
Focus Topic August 2005 Monitoring UPS s and Environmental s Using ehealth Uninterruptible Power Supplies (UPS) and Environmental s are widely deployed in IT environments. A UPS provides reliable power
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationNetwork-Based Application Recognition
Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important
More informationImpact of TCP Window Size on a File Transfer
Impact of TCP Window Size on a File Transfer Introduction This example shows how ACE diagnoses and visualizes application and network problems; it is not a step-by-step tutorial. If you have experience
More informationCCNA Exploration Network Fundamentals
CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing
More informationCisco Wide Area Application Services: Secure, Scalable, and Simple Central Management
Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly
More informationPT Activity 8.6.1: CCNA Skills Integration Challenge Topology Diagram
Topology Diagram All contents are Copyright 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7 Addressing Table for HQ Device Interface IP Address Subnet
More informationTrisul Network Analytics - Traffic Analyzer
Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationThe EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises
The / Product Suite Simplified Voice Networking for Distributed Enterprises Citel s mission is simple: To delight our customers and enrich our stakeholders by offering a world-class suite Citel s of products
More informationNETWORKING COMPONENTS
1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION
More informationExam : Title : Designing for Cisco Internetwork Solutions. Version : Demo
Exam : 640-863 Title : Designing for Cisco nternetwork Solutions Version : Demo 1. Which statement accurately describes one difference between a small office and medium office topology? A. Small offices
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SonicWALL VPN for Supporting H.323 Trunk and Station Traffic to Avaya Communication Manager and Avaya IP Office - Issue 1.0
More informationUnderstanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps
Configuration Guide 5991-2121 May 2006 Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps This Configuration Guide explains the concepts behind configuring your Secure Router Operating
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More information5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing
1 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this
More informationCCNA Exam File with Answers. Note: Underlines options are correct answers.
CCNA Exam File with Answers. Note: Underlines options are correct answers. 1. Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port /TELNET C.
More informationPacketShaper WAN Application Performance Solutions
PacketShaper Family Datasheet Fast WAN. Fast Apps. Fast Business. PacketShaper WAN Application Performance Solutions Applications are the lifeblood of your enterprise. If they slow down, so does business.
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationAvaya M770 and M-MLS SMON User Guide
Avaya M770 and M-MLS SMON User Guide April 2002 Avaya M770 and M-MLS SMON User Guide Copyright Avaya Inc. 2002 ALL RIGHTS RESERVED The products, specifications, and other technical information regarding
More informationFirst Steps to Using a PacketShaper
First Steps to Using a PacketShaper Table of Contents Table of Contents Overview... 1 Classifying Traffic on the Network... 2 Discover Traffic...2 View the Class Tree...3 Problems?...4 Analyzing Network
More informationVoice, Video and Data Convergence:
: A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
More informationVishal Shirodkar Technology Specialist Microsoft India Session Code:
Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing
More informationTracking Packet Flow Using Path Analysis
CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationCisco Unified MeetingPlace Integration
CHAPTER 14 This chapter covers system-level design and implementation of Cisco Unified MeetingPlace 5.4 in a Cisco Unified Communications Manager 5.x environment. The following aspects of design and configuration
More informationQuality of Service Commands policy-map. This command has no default behavior or values.
Quality of Service Commands policy-map policy-map To create or modify a policy map that can be attached to one or more interfaces to specify a service policy, use the policy-map global configuration command.
More informationehealth Administration Overview Guide
ehealth Administration Overview Guide MN-EHADMOV-001 October 2006 This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as
More informationBroadband Traffic Report: Download Growth Slows for a Second Year Running
Broadband Traffic Report: Download Growth Slows for a Second Year Running 1.1 Overview In this report, we analyze traffic over the broadband access services operated by IIJ and present the results each
More informationInspection of Router-Generated Traffic
Inspection of Router-Generated Traffic The Inspection of Router-Generated Traffic feature allows Context-Based Access Control (CBAC) to inspect traffic that is originated by or destined to the router on
More informationForeScout CounterACT. Configuration Guide. Version 5.0
ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5
More informationAvaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0
Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED
More informationReaping the Benefits of Managed Services
Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective
More informationCCNA MCQS with Answers Set-1
CCNA MCQS with Answers Set-1 http://freepdf-books.com CCNA MCQS with Answers Set-1 Question 1# - Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B.
More informationEdgeXOS Platform QuickStart Guide
EdgeXOS Platform QuickStart Guide EdgeXOS Functionality Overview The EdgeXOS platform is a Unified Bandwidth Management device, meaning that it has the ability to support multiple bandwidth management
More informationTransforming the Cisco WAN with Network Intelligence
Transforming the Cisco WAN with Network Intelligence Introduction Branch office networks and the enterprise WAN are in a state of dramatic transformation, driven by three key trends. Enterprises are using
More informationCompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]
s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140
More informationFlexible Netflow Configuration Guide, Cisco IOS Release 15S
Flexible Netflow Configuration Guide, Cisco IOS Release 15S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationUser Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc.
Executive Over view User Activities These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc. Session Log Summary This report helps you
More informationChapter 2. Switch Concepts and Configuration. Part I
Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationConnectivity to Cloud-First Applications
Aruba and Riverbed Partner to Accelerate and Optimize Mobile-First Connectivity to Cloud-First Applications Today s workforce is more distributed, more mobile, and more demanding. Constant availability
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationDELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS
WHITE PAPER DELL EMC DATA DOMAIN BOOST AND DYNAMIC INTERFACE GROUPS Maximize the efficiency of multiple network interfaces Abstract Dell EMC delivers dynamic interface groups to simplify the use of multiple
More informationModular Policy Framework. Class Maps SECTION 4. Advanced Configuration
[ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Radware LinkProof Multi-WAN Switch connected to an Avaya Communication Manager and Avaya SIP Enablement Services in a Converged VoIP and
More informationMonitor Qlik Sense sites. Qlik Sense Copyright QlikTech International AB. All rights reserved.
Monitor Qlik Sense sites Qlik Sense 2.1.2 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense,
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationS5 Communications. Rev. 1
S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed
More informationManaging Your IP Telephony Environment
Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationNetwork Configuration Guide
Cloud VoIP Network Configuration PURPOSE This document outlines the recommended VoIP configuration settings for customer provided Firewalls and internet bandwidth requirements to support Mitel phones.
More informationTwo-Tier Oracle Application
Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationCisco Optimizing Converged Cisco Networks. Practice Test. Version 2.6. https://certkill.com
Cisco 642-845 642-845 Optimizing Converged Cisco Networks Practice Test Version 2.6 QUESTION NO: 1 Cisco 642-845: Practice Exam Refer to the exhibit. NBAR is to be configured on router R1 to limit outgoing
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More informationAvaya Port Matrix: Avaya Diagnostic Server 3.0
Avaya Matrix: Avaya Diagnostic Server 3.0 Issue 2.0 February 208 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES, EITHER
More informationCisco Configuration Assistant
Cisco Configuration Assistant Configuring Your Business Entire Routing, Switching, Wireless, Security and Voice Network with a Single, Easy-to-Use Tool Today s businesses depend on network-based applications
More informationAvaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.
Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationIBM Proventia Management SiteProtector Sample Reports
IBM Proventia Management SiteProtector Page Contents IBM Proventia Management SiteProtector Reporting Functionality Sample Report Index 2-25 Reports 26 Available SiteProtector Reports IBM Proventia Management
More informationManaging the Growth of the ehealth Database
Focus on Setup Managing the Growth of the ehealth Database The ehealth Suite of management tools collects a wide variety of information about your critical business resources. ehealth includes a database
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationInstalling, Configuring and Administering ISA Server 2000, Enterprise Edition
070-227 70-227 Installing, Configuring and Administering ISA Server 2000, Enterprise Edition Version 1-1 - Important Note Please Read Carefully This product will provide you questions and answers along
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationTrademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved.
2004 by NETGEAR, Inc. All rights reserved. Trademarks @2004 NETGEAR, Inc. NETGEAR, the Netgear logo, The Gear Guy and Everybody s connecting are trademarks of Netgear, Inc. in the United States and/or
More informationActivity 6.4.1: Basic VLSM Calculation and Addressing Design
Activity 6.4.1: Basic VLSM Calculation and ing Design Topology Diagram ing Table Device Interface IP Subnet Default Gateway HQ Branch1 Branch2 All contents are Copyright 1992 2007 Cisco Systems, Inc. All
More informationCounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance
CounterACT 7.0 Quick Installation Guide for a Single Virtual CounterACT Appliance Table of Contents Welcome to CounterACT Version 7.0... 3 Overview... 4 1. Create a Deployment Plan... 5 Decide Where to
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationQuality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button
CHAPTER26 The (QoS) Wizard allows a network administrator to enable (QoS) on the router s WAN interfaces. QoS can also be enabled on IPSec VPN interfaces and tunnels. The QoS edit windows enables the administrator
More informationMaximize Network Visibility with NetFlow Technology. Adam Powers Chief Technology Officer Lancope
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer Lancope Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NetFlow in Action h Network Operations
More informationwhile the LAN interface is in the DMZ. You can control access to the WAN port using either ACLs on the upstream router, or the built-in netfilter
When the LAN interface is in a private IP DMZ, you can write the firewall rule-set to restrict the number of hosts the VBP can communicate with to only those devices. This enhances security. You can also
More information