C97-689918-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.

Slides:



Advertisements
Similar presentations
Topics Networking Concepts Storage Concepts Presentation by Anand Mewalal Vmware VI3 Concepts On networking and Storage.
Advertisements

Traffic Analyst Complete Network Visibility. © 2013 Impact Technologies Inc., All Rights ReservedSlide 2 Capacity Calibration Definitive Requirements.
By Inquiry and By Popularity
© 2010 VMware Inc. All rights reserved Confidential Performance Tuning for Windows Guest OS IT Pro Camp Presented by: Matthew Mitchell.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Unity Connection Qualification for Prime Collaboration Development Release.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Introduction to Network Analysis and Sniffer Pro
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
What is a Virtual Tap? Intelligent Access and Monitoring Architecture Solutions.
Server Access and Virtualization Business Unit Cisco Nexus 1010.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Net Optics Confidential and Proprietary Phantom Virtual Tap May 2011 Intelligent Access and Monitoring Architecture Solutions.
Network Management Microsoft System Center 2012 SP1 Virtual Machine Manager Greg Cusanza Senior Program Manager Microsoft Corporation MGT315.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. CCNA ACLs Deepdive February, 2012 Jaskaran Kalsi Assoc. Technical Manager.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Inter-VLAN Routing Chapter 6 Modified.
NMS LAB2 EXPENSES  Software  Hardware and OS for software  Training  Extra usage of work time (active use of SNMP - software etc.)  New SNMP enabled.
Virtual Local Area Networks. Should I V-LAN? 1. Security V-LANs can restrict access to network resources.
Virtualization Infrastructure Administration Network Jakub Yaghob.
 Configuring a vSwitch Cloud Computing (ISM) [NETW1009]
Virtual Infrastructure 3 Best Practices for a secure installation. Jeff Mayrand.
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Managing Microsoft Applications with Cisco UCS Manager & PowerTool.
Corporate Firewalls and DMZs By Matt Bertram ISQS 6342 (Spring 2003) Professor John Durrett.
Introduction to Wireshark Making Sense of the Matrix
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Port Forwarding in VM brief intro
Windows Azure Pack Service Provider Foundation 2012 R2 Windows Server 2012 R2 Virtual Machine Manager 2012 R2 Damian Flynn MVP System Center
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Chapter 6 1 Chap 6 – Implement Inter-VLAN Routing Learning Objectives Explain to the satisfaction of a qualified instructor how network traffic is routed.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. UC320W with SFE2000P Switch configuration July 06, 2012
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Step 1 1.) go up to the Layer menu in the Menu Bar at the top of the screen, choose New, and then choose Layer via Copy.
Chapter 4: Implementing Firewall Technologies
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against VLAN Attacks.
3-1 VMware vSphere 4: Install, Configure, Manage – Rev B Copyright © 2009 VMware, Inc. All rights reserved. Virtual Machines Physical Switches 1000 Mbps.
CPUMEMHDNIC Bare Metal OS: windows, Linux, … App: Typically 1 server External Switch Resources to support Applications Bare Metal OS: VMkernel/Hypervisor.
Microsoft Virtual Academy. System Center 2012 Virtual Machine Manager SQL Server Windows Server Manages Microsoft Hyper-V Server 2008 R2 Windows Server.
Chapter 3: Network Protocols and Communications
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Multicasting within UCS Qiese Dides.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
DPM - IPMI Product Support Engineering VMware Confidential.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
E Virtual Machines Lecture 5 Network Virtualization Scott Devine VMware, Inc.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
Australian Institute of Marine Science Jukka Pirhonen.
Cisco Study Guide
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Virtualization.
Virtual Local Area Networks In Security By Mark Reed.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Cisco Server Access and Virtualization Business Unit Cisco Nexus 1000 Series.
Subnetting Divide a network to smaller networks (subnets) Reasons
Now you don’t need to take any stress about the Cisco Exam
VSPHERE 6 FOUNDATIONS BETA Study Guide QUESTION ANSWER
100% Exam Passing Guarantee & Money Back Assurance
Instructor Materials Chapter 7: Access Control Lists
Advanced Troubleshooting with Cisco Prime NAM-3: Use Case
Cisco Dumps - Pass In First Attempt
Riverbed Dumps - Reduce Your Chance To Failure
Cisco Prime NAM Network Traffic Analysis Use Case
Designing Cisco Data Center Unified Fabric practice-questions.html.
Exam PDF | Free Questions Answers | Dumps4Download
Chapter 4: Access Control Lists (ACLs)
Exam Braindumps
Cisco Prime NAM for WAN Optimization Deployment
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Cisco Prime NAM for Application Performance Troubleshooting
Presentation transcript:

C © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

C © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Web Server Application Server DatabaseServerDatabaseServer OS Cisco Nexus ® 1000V VMware vMotion VLAN  Boundary of Network Visibility  Lack of visibility into inter-VM traffic  Lack of visibility into end-user performance impact from multi-tier application  Lack of visibility into impact on VM traffic during vMotion  Boundary of Network Visibility moved to virtual switching layer  Gain visibility into inter-VM traffic  Analyze Virtual NIC and Port channels on Virtual Switch  Monitor VM traffic during vMotion

C © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Move the boundary of the network to the Virtual Switching layer Move the boundary of the network to the Virtual Switching layer - Specify Filter: Site - Virtual Data Center (a combination of ERSPAN data source from Cisco Nexus ® 1000V Switch and IP subnet). Gain visibility into traffic to and from virtual machines Gain visibility into traffic to and from virtual machines - Select OracleDB, right-click, and choose Analyze Application Traffic. - For Filter, change the time range to match the time for which Oracle needs troubleshooting (1 day). - For top application traffic, specify the traffic mix in the virtual machine network. - Return to the original screen and zoom into the time period with the traffic spike. - Select the host that contributed to the spike, right-click, and choose Host Details.

C © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 - Choose Quick Filter > Application: OracleDB to help identify all hosts using the application. - Return to original screen, right-click the top host, and choose Analyze Host Traffic. - Zoom into spike and view the host conversation; then return to the original screen. Analyze vNIC and PortChannels on the Virtual Switch Analyze vNIC and PortChannels on the Virtual Switch - Choose Analyze > Managed Device > Interface. - Look at the virtual interface errors and discards. Monitor virtual machine traffic during Vmware vMotion migration and perform troubleshooting Monitor virtual machine traffic during Vmware vMotion migration and perform troubleshooting - Return to the original screen and click Home. - Select a host, right-click, and choose Real Time. - Return to the original screen, select Host, right-click, and choose Capture.

Thank you.