Your SlideShare is downloading. ×
0
The Next Giant Leap in OperationalEfficiency: Intelligent Management Center Rob Haviland Technical Marketing Engineer Augu...
HP MANAGEMENT PORTFOLIO                                               BSM Foundation                         Common Data M...
Intelligent Management            Managing to achieve Efficiency, Productivity and Availability 3   ©2009 HP Confidential ...
The State of Management Today … Obstacles !!               General Management Tools                                       ...
Critical Elements of an Integrated Management SolutionThe Silver Bullets          Unified resource                        ...
Intelligent Management Center (IMC) – What ?: IMC is a Fully integrated management platform that not   only delivers full ...
IMC– Resource, Service and User integration                                                                               ...
The IMC Product SuitePlatforms                                                                 IMC Enterprise             ...
Solving the Visibility Problem9   ©2009 HP Confidential template rev. 12.10.09
The Problem …              After any enterprise network is constructed, every              administrator will face the fol...
The Solution … NTA         Packet                  Port mirroring                    DIG probe                 Cooperation...
Traffic Reporting› A traffic report allows you to analyze and observe the inbound and outbound  traffic trends, max/min/av...
Application ReportingAn application report allows you toanalyze how the usage of an applicationon an interface varies with...
Top 10 Traffic Report by Source HostView the hosts with top rankingand traffic statistics information,including source hos...
Solving the SecurityProblemSubtitle Placeholder15   ©2009 HP Confidential template rev. 12.10.09
The Problem– Internal networks are facing various                   › Current security devices can’t protect internal  thr...
Policies and Regulations – SOX Act                                                      From June of 2004 on, all public c...
Network Access Management                                                          Device / User                          ...
Support for Various Access Control Methods›     Support 802.1x and VPN, multiform binding based authentication,      domai...
Centralized, Easy Access Management  › Provide “service”-based user classification and management.  › Provide centralized ...
Network Access Management with Health Check                                                      Device / User            ...
Endpoint Admission Defense                  The Endpoint Admission              Defense (EAD) solution focuses on         ...
The Four Steps for Secure Access                                                     Are you                              ...
Under the Covers of IMC24   ©2009 HP Confidential template rev. 12.10.09
The Framework for Intelligent Management                                                         Value Added Solutions    ...
IMC Deployment ModelsTo meet the requirements of scale,performance and high availability. IMCsupports Distributed as well ...
Summary27   ©2009 HP Confidential template rev. 12.10.09
HP IMC is not just a hardware configuration                                                      tool - but a single pane ...
HP IMC is highly scalable, with distributive                                                    and hierarchical modes and...
Thank You30   ©2009 HP Confidential template rev. 12.10.09
Upcoming SlideShare
Loading in...5
×

HP Networking Tech Day: Intelligent Management Center Demo

4,077

Published on

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,077
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
165
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "HP Networking Tech Day: Intelligent Management Center Demo "

  1. 1. The Next Giant Leap in OperationalEfficiency: Intelligent Management Center Rob Haviland Technical Marketing Engineer August 2010 1 ©2009 HP Confidential template rev. 12.10.09 ©2009 HP Confidential template rev. 12.10.09
  2. 2. HP MANAGEMENT PORTFOLIO BSM Foundation Common Data Model | Actual State DB | PMDB | Shared Services Consolidated Operations Bridge Business Services, Event Consolidation | Service Health | Analytics | SLM | Reporting | Dashboards Operations and OMi | SH | PI | SLM | BSMR | myBSM Automation Application System Storage Network Management Management Management Management EUM / BTM OM Storage NNM Packaged Apps SiteScope Essentials NA Infrastructure Element Management Simple, Advanced Intelligent Management Center, IMC Service Modules Element Procurve Manager, PCM modules Management2 ©2009 HP Confidential template rev. 12.10.092
  3. 3. Intelligent Management Managing to achieve Efficiency, Productivity and Availability 3 ©2009 HP Confidential template rev. 12.10.09 3
  4. 4. The State of Management Today … Obstacles !! General Management Tools Vendor Management Tools The Future of Infrastructure Management Nagios CLI Syslog CiscoWorks Enterasys -EMS IronView nTop RingMaster Junoscope Epicenter Force 10 - FTMS NAC A Single Pane of Management ManageEngine Nortel EMS Alcatel MRTG Open NMS 4 ©2009 HP Confidential template rev. 12.10.09
  5. 5. Critical Elements of an Integrated Management SolutionThe Silver Bullets Unified resource IMC helps enterprises meet the stringent demands of today’s business-critical IT management applications Single pane visibility Unified traffic analysis and change management providing full visibility into business-critical networks Integrated access & Improving endpoint defense, control and user management visibility through integrated management and enforcement 5 ©2009 HP Confidential template rev. 12.10.09
  6. 6. Intelligent Management Center (IMC) – What ?: IMC is a Fully integrated management platform that not only delivers full FCAPS functionality, but through its Service Orientated Architecture (SOA) & modular design enables highly integrated modules to deliver new functionality to control resources, services and users – Why?: The IMC provides a single common platform for which HP can rapidly introduce new technologies and products – Positioning: The various platform offerings and modules allow IMC to be sold to ANY and ALL customers from the SMB to the Service Provider – Benefits: • Lower TCO • Business Continuity • Defense in Depth management and enforcement 6 ©2009 HP Confidential template rev. 12.10.09 6
  7. 7. IMC– Resource, Service and User integration Users Homepage UserOverview of network, user and service information Integrated management of user access and security Services Resource Service Integrated management of network resources, faults and performance information Process management of service flows Resources S 7 ©2009 HP Confidential template rev. 12.10.09
  8. 8. The IMC Product SuitePlatforms IMC Enterprise IMC StandardTools Integration Kit Network Traffic Analyzer User Access ManagementModules Endpoint Admission Defense Wireless Services Manager Qos/SLA MPLS/VPLS/VPN Voice Services Manager 8 And More to come … 8 ©2009 HP Confidential template rev. 12.10.09
  9. 9. Solving the Visibility Problem9 ©2009 HP Confidential template rev. 12.10.09
  10. 10. The Problem … After any enterprise network is constructed, every administrator will face the following problems: › What applications are running in the network? › What traffic affects the running of the network? › What applications are unrelated to services? How to ensure important services? › How to deploy the resources in the network? How to change the deployment with the change of services? › Who or what is consuming bandwidth? › Whether more bandwidths are needed? › Which users need to be controlled, and how?10 ©2009 HP Confidential template rev. 12.10.09
  11. 11. The Solution … NTA Packet Port mirroring DIG probe Cooperation with multiple models of HP traffic Obtains device mirrored A Series routers, switches and all the data, and generates network devices supporting port NetStream logs mirroring Support for multiple log formats such as NetStream/sFlow NetStream and sFlow Automatic generation of four types of reports based on traffic, application, node, and session Intelligent traffic baseline and abnormalNetwork device NTA server traffic detection P2P application traffic monitoring and Analyzes network analysis packets Resolves packets sent Picks up statistics from the network device MAC address and host name based information of the Collects statistics traffic monitoring traffic that matches to the database the conditions Analyzes the data Cooperate with UAM component to Outputs the provide access details query statistics information and generates traffic reports 11 ©2009 HP Confidential template rev. 12.10.09
  12. 12. Traffic Reporting› A traffic report allows you to analyze and observe the inbound and outbound traffic trends, max/min/average rate, traffic summary, and traffic details in a given period. Traffic information is taken at a glance Short-term data is used as a reference of abnormal traffic detection Long-term traffic trend provides a basis for network optimization 12 ©2009 HP Confidential template rev. 12.10.09
  13. 13. Application ReportingAn application report allows you toanalyze how the usage of an applicationon an interface varies with time and thechange details within a given period. Who’s consuming bandwidth and what destinations are they going to access? 13 ©2009 HP Confidential template rev. 12.10.09
  14. 14. Top 10 Traffic Report by Source HostView the hosts with top rankingand traffic statistics information,including source hosts anddestination hosts What protocols are they using ? and whom are they communicating with? What ports are being frequently used? 14 ©2009 HP Confidential template rev. 12.10.09
  15. 15. Solving the SecurityProblemSubtitle Placeholder15 ©2009 HP Confidential template rev. 12.10.09
  16. 16. The Problem– Internal networks are facing various › Current security devices can’t protect internal threats: networks effectively, they … › External users access the internal › Can’t check the security status of hosts on an network illegally internal network. 网络终端的 › Internal users bypass firewalls to › Can’t control access of legal hosts to the internal 安全威胁 network. access external networks › Can’t protect hosts against attacks, such as ARP › Internal users access confidential data attacks. without permission › Internal networks contain large amounts of hosts and › Not all users have their operating are hard to mange, there is … systems patched properly in time › Not all users‘ virus definitions are up- › No effective solution for centralized management of network assets. to-date. › No monitoring of peripherals such as USB devices. …… › No monitoring of user network access behaviors. › No way to track software and hardware changes on hosts in time. …… 16 ©2009 HP Confidential template rev. 12.10.09
  17. 17. Policies and Regulations – SOX Act From June of 2004 on, all public companies in America must submit annual reports that include the following contents: 1- A statement of managements responsibility for establishing and maintaining effective internal control framework and procedures for financial reporting of the company. 2- Managements assessment of the effectiveness of the internal control framework and procedures as of the end of the companys most recent fiscal year.How does a company comply with the above internalcontrol policies and regulations for enterpriseseffectively? 17 ©2009 HP Confidential template rev. 12.10.09
  18. 18. Network Access Management Device / User Identification Identify UAM Enforcement • User or Device •Quarantine, Block, Alert Access User / Device Access Rights18 ©2009 HP Confidential template rev. 12.10.09
  19. 19. Support for Various Access Control Methods› Support 802.1x and VPN, multiform binding based authentication, domain integrated authentication, and LDAP authentication 19 ©2009 HP Confidential template rev. 12.10.09
  20. 20. Centralized, Easy Access Management › Provide “service”-based user classification and management. › Provide centralized display of access user management actions. 20 ©2009 HP Confidential template rev. 12.10.09
  21. 21. Network Access Management with Health Check Device / User Identification Identify UAM/EAD Enforcement Pre • User, Device, Flow •Quarantine, Block, Alert Posture Device Health Check Access User / Device Access Rights21 ©2009 HP Confidential template rev. 12.10.09
  22. 22. Endpoint Admission Defense The Endpoint Admission Defense (EAD) solution focuses on Security Secure client policy the security control at network management Cooperative access points. Through the User authentication network devices cooperation between secure management EAD solution System clients, security policy servers, patches management network access devices, and ...... Anti-virus third-party software, the EAD Network access management rights solution can force users trying to management access a network to comply with the security policies of the network, improving the active defense ability of all user terminals and helping control network resource usage of users. 22 ©2009 HP Confidential template rev. 12.10.09
  23. 23. The Four Steps for Secure Access Are you What can secure? you do? Identity authentication Security authentication Dynamic authorization Access requests Legal users Qualified users Corporate network Unqualified Illegal users users are Different users are rejected quarantined enjoy different and forced to access rights Improve their terminals’ securityWho are you? Quarantined area Behavior audit What are you doing? 23 ©2009 HP Confidential template rev. 12.10.09
  24. 24. Under the Covers of IMC24 ©2009 HP Confidential template rev. 12.10.09
  25. 25. The Framework for Intelligent Management Value Added Solutions Deployed as SLA Desktop Asset NAC solutions User Behavior needed Value Added Services Guest Services MPLS VPN ETTH Provisioning Voice Service Mgmt Modularized Authentication & Wireless Services Traffic Analysis EPON Authorization Communications Bus Unified Resource Management ACL/QoS Performance Monitoring VLAN Management Network Warning Management Topology Management Attack Control Configuration Management Platform- based Device/File/DB Access Device Resource User Resource Adaptation Layer Management Management Device/Terminal File System Database 25 ©2009 HP Confidential template rev. 12.10.09
  26. 26. IMC Deployment ModelsTo meet the requirements of scale,performance and high availability. IMCsupports Distributed as well asHierarchical deployment models. Slave 1 Slave 2 Slave 3–Distribution allows components of IMC to be deployedas Master or Slave to different servers to implementload balancing and improve the performance and Distributedavailability,. Master–Hierarchical deployment provides scale by utilizing a Hierarchical ParentParent /Child model with each child IMC managing itsown domain, This model provides infinite scalability 1 Using the various deployment models, IMC is managing some of the largest enterprises in the world • SNCF - 15,000+ nodes Child Child IMC Child IMC IMC • China Bank – 63,000 users • Israeli Govt – 11,000 nodes • Taser – 240,000 nodes 1 Based on 5k nodes with 300k 26 ©2009 HP Confidential template rev. 12.10.09 monitoring units per IMC server
  27. 27. Summary27 ©2009 HP Confidential template rev. 12.10.09
  28. 28. HP IMC is not just a hardware configuration tool - but a single pane of glass for fault, configuration, accounting, performance and security with visibility not just into the networking infrastructure, but users, endpoints, and services used on the network HP IMC is not exclusive to HP products. HP IMC provides over 3000 templates for 3rd party products to provide single-pane FCAPS management for the entire network HP IMC is modular, allowing customers to build a solution set appropriate for their organization with the ability to grow in the future without learning new management tools28 ©2009 HP Confidential template rev. 12.10.09
  29. 29. HP IMC is highly scalable, with distributive and hierarchical modes and customizable administration to work for any topology regardless of size or geography Next Generation of HP IMC will offer deep visibility into virtual networks unlike any other tool of its kind. NG HP IMC supports visibility into VMware resources and will be able to build out that virtual topology29 ©2009 HP Confidential template rev. 12.10.09
  30. 30. Thank You30 ©2009 HP Confidential template rev. 12.10.09
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×