Cisco Prime NAM for Application Performance Troubleshooting

Slides:



Advertisements
Similar presentations
Web Center Certification Administration Web Center Certification Training Intuit Financial Services University.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Introduction to Network Analysis and Sniffer Pro
1 © Fluke networks 2004 Everett WAMonday, May 18, 2015 Application Performance & Network Analysis Improving the end user experience.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Fluke Networks Enterprise Solutions for WAN Enterprise Monitoring And Troubleshooting Tools.
Diagnostics. Module Objectives By the end of this module participants will be able to: Use diagnostic commands to troubleshoot and monitor performance.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
REMOTE MONITORING RMON1 (RFC DRAFT) TOKEN RING EXTENSIONS TO RMON (RFC PROPOSED) RMON2 (RFC PROPOSED) SMON (RFC PROPOSED) Copyright.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Module 1: Reviewing the Suite of TCP/IP Protocols.
IDS Mike O’Connor Eric Tallman Matt Yasiejko. Overview IDS defined IDS defined What it does What it does Sample logs Sample logs Why we need it Why we.
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
NMS LAB2 EXPENSES  Software  Hardware and OS for software  Training  Extra usage of work time (active use of SNMP - software etc.)  New SNMP enabled.
How to Use a Network Analyzer Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
ONETOUCH™ AT NETWORK ASSISTANT EVALUATION GUIDE May 14, 2012.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Introduction to Wireshark Making Sense of the Matrix
Fluke Networks N E T W O R KS U P E RV I S I O N.
Cisco – Semester 4 – Chapter 7
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Integrating and Troubleshooting Citrix Access Gateway.
Sniffer, tcpdump, Ethereal, ntop
Network Analyzer :- Introduction to Wireshark. What is Wireshark ? Ethereal Formerly known as Ethereal GUINetwork Protocol Analyzer Wireshark is a GUI.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Page 1 Monitoring, Optimization, and Troubleshooting Lecture 10 Hassan Shuja 11/30/2004.
Application Control. Module Objectives By the end of this module participants will be able to: Define application control lists Define firewall policies.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
11 MAINTAINING A NETWORK INFRASTRUCTURE Chapter 9.
Distributed Network Monitoring in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Network Analyzer :- Introduction to Ethereal Computer Networking (Graduate Class)
C © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
Voice Performance Measurement and related technologies
Solving Real-World Problems with Wireshark
Cisco Exam Questions Dumps
Cisco Unified Operations Manager Proactive Voice Troubleshooting
Infrastructure Health Assessment
OptiView™ XG Network Analysis Tablet
Advanced Troubleshooting with Cisco Prime NAM-3: Use Case
Cisco Prime NAM Network Traffic Analysis Use Case
Top-Down Network Design Chapter Four Characterizing Network Traffic
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
RMON.
Securing the Network Perimeter with ISA 2004
3 | Analyzing Server, Network, and Client Health
Traffic Analysis with Ethereal
Network and Services Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Monitoring for institutions
Network Administration CNET-443
Borderless Networks Services Supported
Flowmon Overview for MAMI Management and Measurement Summit
Roaming Interval Measurements
Cisco Prime LMS: Getting Started
Cisco Prime NAM for WAN Optimization Deployment
Network Analyzer :- Introduction to Wireshark
TCP Protocol Analysis Access UMKC Home Page.
Network Analyzer :- Introduction to Wireshark
Chapter 11: Network Address Translation for IPv4
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Cisco Prime NAM for Application Performance Troubleshooting

Intelligent Application Performance Analysis Cisco Prime™ NAM Applications Server Client Client Delay Server Network Client Client Network Delay Server Network Delay Application Delay Network Delay Client Total Delay Identify sites, hosts, and applications with poor performance Isolate the problem to the network, server, or application Trigger packet captures based on response-time alarms Validate quality-of-service (QoS) planning assumptions Analyze application behavior and trends for capacity planning

Adobe Flash Demonstration Outline (1 of 3) Identify site and application with response-time degradation Choose Monitor > Alarm Summary Select Data Center in Top N Sites by Alarm Count and right-click Alarm Details. Choose Monitor > Response Time Summary Choose Filter: Site - Data Center Select http in Top N Applications by Server Response Time and right-click Analyze Application Response Time. Review baseline and determine whether degradation is due to network or server Choose Filter: Time – 1 Day and zoom into last spike in transaction time. Scroll down. Choose Other Metric: Metric 1 - Avg Round Trip Time, and Metric 2 - Number of Transactions. Select Top Server in Top N Servers by Avg Server Response Time and right-click Analyze Host Traffic. Click Host Conversations

Adobe Flash Demonstration Outline (2 of 3) Create alarm-threshold-based triggered packet capture Choose Capture > Sessions and click Create. Specify Name: http_capture. Uncheck External and click Create. Specify Name: http, Application or Port: Application, and Application: http. Click Apply and then click Submit. Choose Setup > Alarms > Actions. Choose Create and specify Name: http_rise, Trigger Capture: http_capture, and Start. Then click Submit. Choose Create and specify Name: http_fall, Trigger Capture: http_capture, and Stop. Then click Submit. Choose Setup > Alarms > Thresholds Choose Create > Response Time. Specify Name: http_alarm, Application: http, Server Site: Data Center, Actions Rising: http_rise, Actions Falling: http_fall, Response Time Metrics Rising: 1000, and Response Time Metrics Falling: 2000. Then click Submit. Click Home. Choose Capture > Files. Apply Error Scan.

Adobe Flash Demonstration Outline (3 of 3) Validate QoS planning assumptions Click Home. Choose Analyze > DSCP Select quake3 in Top N Application . Right-click Application Traffic by Hosts. Select quake3 in Top N Application. Right-click Analyze Application Traffic. Select the top host in Top N Host – Traffic In. Right-click Host Conversations. Analyze NetFlow for capacity planning Choose Analyze > NDE Interface. Select the first NetFlow Data Export (NDE) instance and the first interface. For Filter: Time, specify 04/18/2011 14:00 to 04/20/2011 14:00. View details of the first spike.