Cisco Prime NCS: Converged User, Access and Policy Management


Published on

Learn how Cisco Prime NCS provides converged wired, wireless, and security policy management in a single solution for faster troubleshooting and more efficient network operations. Learn more:

Published in: Technology
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Source: *Apple Inc. Quarterly Financial Report, ** The US PC Consumer Market in 2015 – Forrester Research
  • Based on Peggy Casey draft 3/22/11 v.8b (final)Fully ScriptedCisco Prime is a new strategy for innovative network management. Cisco Prime supports enterprise and service provider organizations. The strategy was announced in the Fall of 2010 for service providers and Cisco Prime for Enterprise will be announced in April 2011. The Cisco Prime portfolio ofmanagement products are based on a service-centric foundation and support integrated lifecycle management of Cisco architectures and technologies. Cisco Prime products are built on an intuitive workflow-oriented user experience. Benefits of Cisco Prime products include: Simplified and predictable network management through a set of common attributes that deliver operational advantages and control across architectures, networks and services Increased operations efficiencies through reduced network errors, faster troubleshooting, and improved delivery of services Lowered total cost of ownership by maximizing the value of the existing network investment and integration with existing operational systems and processesCisco Prime Websites:Internal CEC - NMTG: External (Live 4/19/11):
  • Here is a table of the Cisco Prime for Enterprise product features mapped to each product. Cisco Prime Network Control System (NCS) 1.0Cisco Prime LAN Management Solution (LMS) 4.1Cisco Prime Collaboration Manger (CM) 1.0. Cisco Prime Network Analysis Module (NAM) 5.1
  • A recent survey taken by Cisco users revealed that a majority of performance issues are caused at the endpoint [or user device].
  • Empower first-tier teams to resolve problems more often, without escalation, with intuitive workflows
  • Enable reliable and secure access to business services from anywhere with a single view of users, their devices and their access credentials
  • Unified and/or focused visibility of clients Detect wired and wireless endpoints connected to the networkView reports, lists and alarms associated Wired & wireless discovery and inventoryAdd / detect infrastructure devices such as switches, WLAN controllers and Access Points Comprehensive infrastructure reporting View the access infrastructure as a whole or as discrete technologies
  • Google Earth integration
  • Cisco Prime NCS: Converged User, Access and Policy Management

    1. 1. Unified Management for Borderless Networks<br />Cisco Prime Network Control System<br />
    2. 2. Disclaimer<br />Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.<br />
    3. 3. Agenda<br />Mobile devices created challenges when using focused tools<br />Understanding Cisco Prime <br />Cisco Prime Network Control System (NCS) <br />Addressing client access issues with Cisco Prime NCS<br />Cisco Prime NCS v1.0 deep dive<br />Comprehensive Wireless Lifecycle Management<br />Scalability, Deployment Options and Services<br />Summary<br />
    4. 4. Influx of Mobile Devices Creates IT Challenge <br />IT Consumerization: Now a Reality<br />Smartphone adoption is growing at 50%+ annually*<br />By 2015, tablets will constitute 50% of laptop sales**<br />ORGANIZATION<br />TIME<br />
    5. 5. The User to Device Ratio Has Changed<br />IT Resources Stay The Same<br />Borderless User<br /><ul><li>Anytime, Anywhere access
    6. 6. One user: Many devices</li></ul>Fixed User<br /><ul><li>Wired access
    7. 7. One user: One device</li></ul>Mobile User<br /><ul><li>Wireless access
    8. 8. One user: Local devices</li></ul>Access Evolution<br />Early 90’s <br />Today<br />Late 90’s<br />Effectively support users with box management<br />Need for policy & control<br />Need for operational efficiency<br />
    9. 9. What is Cisco Prime?<br />Cisco Prime …..<br /><ul><li>Is a strategy for innovative management
    10. 10. Supports enterprise and service providers
    11. 11. Delivers service-centric foundation and set of common operational attributes</li></ul>Cisco Prime offers…..<br /><ul><li>A portfolio of enterprise and service provider products
    12. 12. Integrated lifecycle management across Cisco architectures and technologies
    13. 13. Intuitive workflow-oriented user experience</li></ul>Cisco Prime benefits…<br /><ul><li>Simplified and predictable network management
    14. 14. Increased operations efficiencies
    15. 15. Lowered total cost of ownership </li></ul>For more information visit Cisco Prime Websites <br />
    16. 16. Cisco Prime for Enterprise Product Feature Summary<br />100% support<br />Partial support<br />1<br />1<br />2<br />3<br />1 Day-one support for selected products only<br />2 Includes sub-set of Smart Interactions features<br />3 In conjunction with Cisco Identity Services Engine (ISE)<br />
    17. 17. Cisco Prime Network Control System<br />Converged Access Management for Wired and Wireless Networks <br />Wireless | Wired | Security Policy | Network Services<br />Unified Management<br />Operations<br />Users<br />Policy<br />Improved Network Visibility  Faster Troubleshooting  Eliminate Configuration Errors <br />
    18. 18. Networks are Converging<br />Wireless considered as an EQUAL MEANS of ACCESS<br />Aligning to Today’s Operational Environment<br />Teams are Converging<br />Cost pressure requires a ”DO MORE WITH LESS” operational model <br />Visibility Must Converge<br />Focused solutions will deliver DIMINISHING RETURNS<br />
    19. 19. Aligning to Today’s Operational Environment<br />One Network  One Team One Solution <br />
    20. 20. Client Devices: Top Contributor to Network Performance Problems <br />A recent survey shows that respondents view client devices as the TOP contributor to wireless network performance problems<br />
    21. 21. From “Box Management” to “User-focused Management”<br />Integrated Wired & Wireless Monitoring and Troubleshooting <br />Any End-user Device<br />Any Location<br />Any Network<br />Wired<br />Access<br />Wireless<br />Access<br />Remote<br />Access<br />UNIQUE PERSPECTIVE <br />Extends to USERS and ENDPOINTS<br />
    22. 22. Evolving User Access Management<br />Traditional Approach<br />Cisco Prime NCS Approach<br />Network<br />Generalist<br />Wired <br />Expert<br />Wireless <br />Expert<br />Security <br />Expert<br />Converged<br />Access<br /> Visibility <br />Wireless<br /> Management <br />Security<br /> Policy <br />Wired<br />Devices<br /><ul><li>Less time and resources needed
    23. 23. Single view of critical data
    24. 24. Improves IT efficiency
    25. 25. Consumes lots of time and resources
    26. 26. Manual correlation of data
    27. 27. Inefficient operational model</li></li></ul><li>The Goal: Get Users Back On-line Faster<br />Answer the who, what, when, where and how access related questions<br />
    28. 28. Optimize Network Operations<br />Troubleshooting Laptop Connectivity Issues Example<br />Traditional Approach <br />Multiple teams/tools to provide resolution:<br />Wireless NetOps – WCS with MSE<br />Verify user credentials<br />Confirm laptop associates to network<br />Observe time laptop may connect<br />Validate current location<br />Wired NetOps – LMS <br />Check port and connectivity<br />Security Ops – NAC and ACS View<br />Check laptop conforms to AUP<br />Confirm access to VLAN for resource/application is permitted<br />Where?<br />LMS<br />MSE<br />?<br />?<br />How?<br />?<br />?<br />Who?<br />?<br />WCS<br />NAC<br />When?<br />What?<br />WCS<br />
    29. 29. Cisco Prime NCS Approach <br />One platform with consolidated view for immediate resolution:<br /><ul><li>Account verified
    30. 30. Connectivity confirmed
    31. 31. Endpoint complies with AUP
    32. 32. Permitted time of day
    33. 33. Impermissible location for laptop
    34. 34. Problem identified/Case closed</li></ul>How?<br />Where?<br />What?<br />When?<br />Who?<br />Optimize Network Operations<br />Troubleshooting Laptop Connectivity Issues Example<br />Unified Management<br />
    35. 35. Cisco Prime Network Control System v1.0<br />
    36. 36. Enhanced User Experience<br />Information architecture: Seamless navigation and workflows align to tasks<br />Modern interaction behavior: Maintains context while performing network management tasks<br />Smart tables & advanced filtering: Quickly view additional information without leaving the workflow<br />Ever-present alarm views & browser: Always-on visibility to potential end-user problems to speed remediation<br />Designed to Work With How IT Approaches Problems<br />Empower first-tier support teams to solve more problems<br />Release upper-tier teams to focus on strategic projects<br />
    37. 37. Single Integrated User and Access Dashboard<br />High-level View of Key Metrics with Contextual Drill-down to Detailed Data<br /><ul><li>Flexible platform: Accommodates new and experienced IT administrators
    38. 38. Simple, intuitive user interface: Eliminates complexity
    39. 39. User-defined customization: Display the the most relevant information</li></ul>19<br />© 2011 Cisco Systems, Inc. All rights reserved.<br />Lumos Features DRAFT<br />Cisco Confidential<br />
    40. 40. Unified User and Endpoint Services <br />Correlated and focused wired / wireless client visibility <br />Client health metrics<br />Client posture & profile<br />Client troubleshooting <br />Client Reporting<br />Unknown device ID input<br />Clear view of the end-user <br />landscape<br />Who is connecting<br />Using which device<br />Are they authorized<br />
    41. 41. Integrated Access Infrastructure Visibility<br />Wired & wireless discovery and inventory<br />Add / detect infrastructure devices such as switches, WLAN controllers and access points <br />Comprehensive access infrastructure reporting <br />View the access infrastructure as a whole or as discrete technologies<br />Stolen asset notification<br />Track when devices presumed stolen come back online <br />21<br />© 2011 Cisco Systems, Inc. All rights reserved.<br />Lumos Features DRAFT<br />Cisco Confidential<br />
    42. 42. Spatial Maps<br />Provides Context as to Where the Wired Endpoint Resides<br />Associate access wired infrastructure and clients with a floor or building <br />
    43. 43. Identity Services Engine Integration <br />Converged Security and Policy Monitoring and Troubleshooting<br />Streamline <br />Service <br />Operations<br />Enhance <br />Infrastructure <br />Security<br />Enforce Compliance<br />Shows where security & policy problems exist<br />Retrieves information directly from clients: Wired, wireless - authenticated, unauthenticated<br />Reduces the time to troubleshoot security & policy problems<br />Client posture status and client profiled views<br />Drill deeper into security & policy issue details<br />Direct linkage from Cisco NCS to Cisco ISE with contextual filtering<br />
    44. 44. Comprehensive Wireless Lifecycle Management<br />Full Range of Lifecycle Capabilities<br />
    45. 45. PlanningRF Prediction Tools Assist in Designing Optimal WLANs<br />Instant Access to Tools<br />Easily Visualize the Ideal RF Environment<br />Hierarchical Maps <br />Integrated Planning Tool<br /><ul><li>Import floor plans from 3rd-party tools
    46. 46. Configure access point placement, coverage, and other variables
    47. 47. Generate equipment proposal </li></ul>Hierarchical Maps<br /><ul><li>Design multiple buildings, floors, regions</li></ul>Location and Voice Readiness Tools<br /><ul><li>View performance and coverage estimates</li></ul>Planning Tool<br /><ul><li>Eliminate improper RF designs and coverage problems
    48. 48. Built-in tools perform site-surveys, RF reassessments and RF readiness evaluation </li></li></ul><li>DeploymentFlexible Configuration Templates Streamline Operations<br />Instant Additional Info.<br />Industry’s Broadest Array of Integrated Configuration Templates<br />Customizable Templates<br />Apply common configurations across one or more controllers and access points<br />Role-based access control and partitioning<br />Standalone access point monitoring and migration<br />Control power consumption with energy wise integration<br />Controlled wireless guest access<br />Easily Define Configuration Parameters<br />Fast creation and maintenance of configurations for WLAN controllers, APs, and MSE<br />Maximizes uptime and improves operational efficiency<br />Deploy large, multi-site networks and managed-service alike<br />
    49. 49. Monitoring and Troubleshooting Quickly Access the Information You Need – When You Need IT<br />Coverage Visualization<br />Centralized Monitoring of the entire WLAN and LAN<br />Identify and diagnose RF Interference events, air quality and interference security threats with Cisco CleanAir<br />Robust fault event and alarm management<br />Guided step-by-step client troubleshooting tools<br />Ever-present search for cross network historical information<br />Cisco ISE and ACS views for additional endpoint data <br />Color-Coded Icons<br />Ever-present Alarm Summary <br />Efficiently assess, prioritize and manage RF interference issues<br />Analyze problems and misconfigurations for all client devices across all connection media<br />Troubleshoot large-scale LAN and WLAN environments with minimal IT staffing<br />Quickly discover events occurring outside baseline parameters<br />
    50. 50. Ever-Present Search<br />Simplified Customization of Display<br />Mapping HierarchyandIcons <br />(Expandable)<br />Easily Monitor Each Location<br />Quick Access To Tools<br />Ever-Present Alarm Summary(Expandable)<br />Heat Map of Each Location<br />
    51. 51. Remediation Returning the Network to Optimal Performance<br />Streamlined Workflows <br />1<br />Integrated workflows and tools: <br />Receive performance degradation notices<br />Quickly asses service disruptions<br />Research resolution <br />Take action<br />CleanAir alerts summaries and reports identify where poor air quality and interferers exist<br />Security dashboard and index show current security status<br />Voice Tools for customized queries to address VoWLAN problems<br />2<br />3<br />Security Dashboard<br />Diagnose the RF environment and mitigate interference from Wi-Fi and non-WiFi sources<br />Quickly assess and understand ways to improve the security index of the network<br />Quickly discover events occurring outside baseline parameters<br />
    52. 52. OptimizeContinuous Improvement <br />Long term historical reporting and trend analysis<br />Extensive on-demand and automatic reporting<br />Fully customizable <br />Focused compliance reporting<br />Alarm and event forwarding to 3rd-party solutions<br />Output to CSV of PDF <br />Effectively plan for future capacity, while properly controlling costs <br />Align the reporting structure to your business or operational environment<br />Understand common trends and top users of resources to right-size the network environment<br />
    53. 53. Services Management and Integration<br />
    54. 54. Unprecedented Scalability <br />Complete lifecycle management of hundreds of wireless LAN controllers from a centralized location<br />Rich monitoring and troubleshooting for Cisco Catalyst Switches<br />Visibility into key performance metrics – interface ports, endpoints and users and switch inventory<br />
    55. 55. Virtual Appliance<br />Physical Appliance<br />Appliance Delivery Models<br />Physical and Virtual <br />Application & Components<br />Application & Components<br />Cisco Provided<br />Cisco Provided<br />OS<br />OS<br />Customer Provided<br />Cisco-branded Hardware <br />(1RU)<br />Virtual Infrastructure<br />Discontinuation of software binaries <br />- Replaced by new Complete Appliance Model - <br />
    56. 56. Cisco WCS to Cisco Prime NCS Migration<br />34<br />Cisco Prime NCS<br />Cisco WCS 7.0.X <br />Licenses<br />Multi-tier License Model<br />Singlei-tier License Model<br />WCS Base License<br />(Examples: WCS-APBASE-X or WCS-WLSE-APB-X)<br />Prime NCS License <br />(Example: L-NCS-1.0-X)<br />WCS Plus License<br />(Examples: WCS-Plus-X or WCS-WLSE-Plus-X)<br />Database* <br />Must be on WCS or<br />1:1 Upgrade <br />*Note: WCS 7.X is the last release running on CiscoWorks Wireless LAN Solution Engine (WLSE)<br />© 2011 Cisco Systems, Inc. All rights reserved.<br />Lumos Features DRAFT<br />Cisco Confidential<br />
    57. 57. Mission Critical Wireless<br />Wireless LAN Services Converged Management of Borderless Networks<br />Plan<br />Identify mobility solutions that align to your business strategy<br /><ul><li>Cisco Unified Wireless Network Readiness Assessment</li></ul>Optimize mobile connectivity with enhanced performance, security and reliability<br /><ul><li>Wireless LAN Network Assessment</li></ul>Ensure the architecture can support the solutions<br /><ul><li>Wireless LAN Architecture Design </li></ul>Build<br />Design a secure, high performance network for mobile collaboration<br /><ul><li>Wireless LAN Planning and Design</li></ul>Accelerate ROI with efficient migration and implementation<br /><ul><li>Wireless LAN Implementation</li></ul>Run<br />Lower TCO with out-tasked management and monitoring<br /><ul><li>Wireless LAN Remote Management Services</li></ul>Improve efficiency and performance with network intelligence<br /><ul><li>Wireless LAN Optimization</li></ul>Enable the Architecture<br />Enable Business Solutions<br />Enable a Smart Network<br />
    58. 58. One Network - One Solution<br />Converged Access Management for Borderless Networks<br />Improve IT Productivity<br />Enable the Workforce<br />Single Unified View<br /><ul><li>Provide reliable access to network services
    59. 59. Visibility at the access layer as networks become borderless
    60. 60. Address problems where most issues occur - The endpoint
    61. 61. Single viewpoint for wired, wireless, security& policy management
    62. 62. Unprecedented visibility and control
    63. 63. Direct access to Cisco support and services
    64. 64. Empower first-tier to address issues without escalation
    65. 65. Resolve problems faster with logical workflows
    66. 66. Improve resource productivity, lower TCO</li>