©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
© NetBrain Technologies Inc. All rights reserved NetBrain In Action Real World Use Cases:
Ethernet Switch Features Important to EtherNet/IP
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Complete Event Log Viewing, Monitoring and Management.
Using Asterisk to Implement Intelligent Call Center Solutions James Kleckner AMTELCO.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
By Inquiry and By Popularity
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
Vodacom Microsoft Hosted Lync
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Introduction to Network Analysis and Sniffer Pro
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL 1.
Implementing a Highly Available Network
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
HiVision SNMP Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
COEN 252 Computer Forensics
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
LAN Switching and Wireless – Chapter 1
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
© 2006 Cisco Systems, Inc. All rights reserved. 3.5: Implementing QoS with Cisco AutoQoS.
Based on work by DoIT Network Services, UW-Madison The Network and the Role of Tools January 6, 2006 Ron Kraemer, Deputy CIO.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Confidential Rapid Troubleshooting for Data, VoIP, and Video VoIP Performance Manager.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
© 2015 LiveAction, Inc., All Rights Reserved. 1 AUTOMATION VISUALIZATION CONTROL LIVEACTION MANAGEMENT FOR CISCO INTELLIGENT WAN March 6, 2015.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
100% Exam Passing Guarantee & Money Back Assurance
Cisco Unified Operations Manager Proactive Voice Troubleshooting
Securing the Network Perimeter with ISA 2004
Chapter 4: Switched Networks
Based on work by DoIT Network Services, UW-Madison
Chapter 8: Monitoring the Network
File Transfer Issues with TCP Acceleration with FileCatalyst
Network Performance Manager
Chapter 3 VLANs Chaffee County Academy
Network Monitoring System
Presentation transcript:

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL #AvayaATF Tips & Tricks for Simplifying Network Management Jeff Buddington CSE, Network and Identity Management

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Agenda – What is the Need / Goal ? Deploy the Latest Network Management Technologies without Forklift Upgrade Detect Latency Jitter and Packet Loss Automate and Secure Edge and Core Configuration Determine Stability of Network Services Enable easy and successful Change Management Resolve Information Overload Eliminate Setup of Network Management Enable Reliable Alert Messaging 3

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Deploy the Latest Network Management Technologies –On Switch Benefits of having an Avaya Data Network: Lifetime Warranty SLAmon Agent – Synthetic Voice traffic generation to test QoE and network QoS treatment end to end 4 BYOD – Auto-Secure and self-setup of switch port VLAN by login or connected device type Built In flow connection display – IPFIX Sniffer- Like display of conversations Unified look and feel

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Detect Latency, Jitter, Packet Loss 5 SLAmon Agent On-Switch Embedded SLAmon Agent –Synthetic Voice traffice generation to test QoE and network QoS treatment end to end Switch to Phone, Switch to Switch, etc. Missing QoS setups on switch hops?

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Scalable Redundant HA Solution Identity-based Network Access Control Automate Wired / Wireless and Edge Auto Provisioned For access to VLANs and network services based on device type or user login Secure Network & Device security Network Access Protection Multi-Vendor Support Central Policies Automate and Secure Edge Identity Engines with your Switches Unified Wired / Wireless Guest Access & Captive Portal 6

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Automate and Secure Edge Identity Engines with your Switches Fingerprint Guest Devices Network Access Protection – Check and Validate Firewall, Antivirus, Updates on Guest Devices 7

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Determine Stability of Network Services Answer key business questions over time: 8 Routing Stability? Physical Stability? Link Flapping? Trunk Link & Switch Availability? Ongoing problems or isolated incidents? Key Resource Indicators

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Easy Configuration Change Management –COM Live central audit logs of any Element Management activities using the Enterprise Device Managers Historical Backup and Restore What has changed since things were working weeks ago? What is the difference between a working and non-working closet? Easily set Network Wide Configuration Baseline notifications to alert operator of any changes to baseline and what changed. Automate any type of network wide setting 9

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Resolve Information Overload Executive Summary from the Top: Trunks with the most Broadcast, Unicast, Multicast traffic Find areas in the network of most concern Key Performance Indicators The most important statistics and areas of concern are automatically highlighted and sorted to the top 10

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Eliminate Setup of Network Management Common Services make Network Management Administratively Easy: Changing device credentials with COM updates the central repository – reporting with VPFM doesn’t “skip a beat” Auto Trending and Thresholds for trunk links automatically. Single Web Sign On through System Manager 11

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Enable Reliable Alert Messaging Benefits of Configuring SNMPv3: Network switch events are acknowledged by the network management system. If a temporary network outage to a switch occurs, when connectivity resumes the events will be retransmitted. Authentication and Encryption of SNMPv3 communications to the switch. SNMPv1 communications can be intercepted and the READ/WRITE community strings can be used to take down the network. Very important on a network without Identity Engines that is not secured. 12

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Comprehensive yet Simple Management 13 Proper management of a data network with voice, video and other services running over it will require a comprehensive suite of Network Management Tools working together. Without a solution that provides all of the functions listed here your ability to effectively and quickly manage a network will be limited. Avaya provides the following capabilities in COM, VPFM, IPFM, VPS: Single Sign On To All Network Management Applications through a rich Web User Interface Shared Device Credentials All Network Management Apps Share SNMPv3, SNMP, SSH, CLI, Credentials. VoIP Quality Management – Quality of Experience, Latency, Packet Loss, Jitter measurement across the Data Network from point to point automatically* Auto Trending Trend Key Resource Indicators on just Important Links automatically. Auto Thresholding Built in “out of the box” thresholds automatically enabled for Key Performance Indicators Executive Level Exception Reports Instead of showing me hundreds of stats, show me the key problem areas, busiest devices, most utilized links with the Top-N reports.

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Comprehensive yet Simple Management Alerts Free me from sitting in front of the Network Management Console all day by ing me important service affecting traps. Physical Connectivity Topology Visualization Knowledge and visualization of where key network resources such as Call Servers, Media Gateways, Wireless Access Points, Servers, Internet Gateway allows optimization and protection of network services. Includes ability to search with and Innovative Network Management “GoTo Search Box” by NetBIOS or DNS Name, IP Address, MAC Address. – Export to Visio Diagram IPFIX / Netflow Collector with Reporting The very next question after why is there so much utilization on a network link is “what’s causing it”. Find out with IPFM. Summary reports across multiple switches to display a higher level view of how the network is being used by what application flows to and from what destination. Good for security and performance tuning. Use in conjunction with EPM to filter out undesired traffic. Element Management Not just a generic collection of management utilities UCM includes the actual element managers for Voice**, Wireless, Data. With an element manager such as EDM (or Enterprise Device Manager) you can configure all possible attributes of a specific devices such as VSP-9000, ERS8800, ERS8600, ERS5500, WLAN 8180 and 8120AP’s with a common experience and cartelized real time security audit logging of configuration changes. Configuration Backup and Restore What has changed between when the network was operating properly and now? Many organizations could not tell you with out a schedulable network device configuration file backup / restore feature with the ability to do a “SmartDiff” comparison of a configuration baseline versus the current running configuration. COM with BCM provides this functionality. 14

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Comprehensive yet Simple Management Centralized ACLs for Filtering and QoS With the ability to monitor the hundreds or thousands of links that connect your network together automatically for excessive utilization or error rates, and voice quality of experience - a perfect match for that functionality is EPM which allows the operator to set centralized policies for Network Level Filtering (by many different factors such as Source/Destination IP or Subnet, TCP/UDP Port Number, VLAN, etc.) or Quality of Service (QoS) to easily correct Quality of Experience Issues or maintain fast and reliable network services. EPM also includes Energy Savings Policies and Reporting. Centralized VLAN Management Simple Point and Click Capability across multiple switches for rapidly creating or extending multiple VLANs across the network. Energy Management In order to begin an Energy Management / Sustainability program within your organization, it’s necessary to understand your current energy consumption tends, heat generation, and carbon footprint. EPM and VPFM provide the ability to discover network devices such as PoE switches and PoE powered devices. EPM provides an energy consumption dashboard and the ability to implement Avaya Energy Saver Policies by Powered and Non-powered port types and PoE powered device type throughout your network. EPM then provides energy saving reports Quarter over Quarter and by several other criteria. VPFM provides a Top-N executive level report allowing you to quickly locate and identify the Top energy using “power hogging” devices on your network. 15

©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL Thank you! #AvayaATF