Tapping Into The Health of Your Network<br />Intelligent Network Access and Monitoring Solutions<br />
Presenter<br />Peter Ingebrigtsen<br />Field Application Engineer, Net Optics, Inc.<br />Peter joined Net Optics after run...
Agenda<br />Why monitor the health of your network?<br />Common network monitoring tools<br />Where Network Taps fit in<br...
Why monitor the health of your network?<br />For Many Organizations, Network Performance Directly Impacts:<br />Customer e...
Many Devices for Monitoring Your Network<br />Intrusion Detection Systems (IDS)<br />Intrusion Prevention Systems (IPS)<br...
ESX Stack<br />vm 1<br />Vm 2<br />Vm 3<br />Network Layer<br />Core Network<br />Data Center<br />User Access<br />Virtua...
Applications Layer<br />Protocol Analyzers<br />IPS<br />Forensics<br />Performance<br />Data Loss Prevention<br />VoIP An...
Applications Layer<br />Protocol Analyzers<br />IPS<br />Forensics<br />Performance<br />Data Loss Prevention<br />VoIP An...
Requirement for Total Visibility
Need for Multiple Tool Deployment
Network Scalability
Visibility into Virtualization
High Availability & Tool Redundancy</li></ul>Indigo Pro™<br />Director xStream Pro™<br />Bypass Switches<br />Director™<br...
Net Optics Products<br />Control<br />Management<br />Access<br />Bypass Switches<br />Director™ Family<br />Indigo Pro™<b...
Net Optics Products<br />Control<br />Management<br />Access<br />Bypass Switches<br />Director™ Family<br />Indigo Pro™<b...
Where Network Taps Fit In<br />Before<br />Analyzer<br />?<br />Analyzer<br />Switch<br />Switch<br />Firewall<br />Switch...
Regeneration Taps<br />RMON<br />Analyzer<br />Forensic<br />IDS<br />Regeneration Tap<br />Switch<br />Switch<br />Firewa...
Upcoming SlideShare
Loading in …5
×

Tap Into the Health of Your Network

1,158 views
1,063 views

Published on

Best practice network deployments make use of Taps to route, aggregate, and regenerate traffic that is then sent to these tools to make use of their full capabilities. In addition, bypass Taps are used to ensure a failed monitoring appliance doesn’t bring your network traffic to a standstill. Taps form the foundation for implementing an intelligent access and monitoring infrastructure.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,158
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • [CHRIS] [Will hand off to Peter after this information]Our Presenter today is Aaron Janssen, Net Optics’ Field Application Engineer. Aaron brings over 15 years experience deploying and configuring security &amp; networking equipment, including Juniper Networks, Network Associates, McAfee, and Patchlink Inc.So without further ado, I’ll turn our presentation over to Aaron.
  • [CHRIS]Today’s Webinar AgendaWhy monitor the health of your network? – what are the driving forces behind the need to monitor your networkCommon network monitoring tools – what tools are network admins currently deploying to monitor and protect the networkWhere Network Taps fit in to the monitoring picture – we’ll what a network tap is and how it fits into the monitoring architectureTypes of Network Taps and their application Network TapsRegeneration TapsAggregator TapsBypass SwitchesData Monitoring Switches
  • [ AJ ]So why do we monitor the health of our networks?In today’s IT-driven organizations, network performance is key to providing excellent customer experiences, driving business process efficiencies, growing revenue, and maintaining competitive advantage. Network administrators, charged with keeping networks responsive to the needs of both internal and external customers, rely on network monitoring tools for a continuous stream of information to baseline and assess the network’s health. These tools enable administrators to ensure high application availability and good response times, to enforce network usage policies, to ensure the security of their network, to protect the network against possible downtime and to justify and measure the impact of network upgrades.A decline in network performance ultimately impacts an organization’s revenue growth by impacting on:The Customer Experience, whether it’s first-hand experience with a data-driven web application, or indirectly via customer facing employees being unable to access the data they need in order to serve the customer.Business Efficiencies, such as order processing can also be impacted by the lack of timely informationCompetitive Advantages may also be lost if the newest product or service is unavailable due to a crippled network infrastructureFinally, the ever increasing threat of unauthorized access of vital data requires a network administrator to be ever vigilant against possible security threats and the need to maintain records for regulation compliance
  • There are variety of devices that network administrators use to monitor and maintain various portions of their network. Most network monitoring tools are task-specific. Proprietary boxes sold as “appliances” may consist internally of standard hardware components running proprietary software, often based on the Linux operating system. The performance of these tools is determined by the speeds of the processors and memory buses, and the size of the memory utilized both for caching and for buffering packets from the network. The performance of the network interface cards (NICs) is criticaltoo, for monitoring high-bandwidth 1Gbps and faster network links. More advanced tools help to alleviate these bottlenecks by adding more processors and more dedicated buffers. The type, speed, and number of processors in a tool dictate its processing performance. As network speeds increase, the number of packets that can be processed at wire speed (in other words, keeping up with the network) reaches a limit. Buffers enable the tool to handle higher peak traffic loads by storing packets during high traffic periods, and releasing them to be processed when the traffic is less. However, the inability to sustain performance at full network bandwidth, and for extended periods of high traffic, may eventually cause even the largest buffers to fill up, and the tool may not capture needed information. Common forms of Network Monitoring Tools include the following.An IDS monitors network traffic for activity that falls within the definition of banned activity for the network. When found, the IDS will alert administrators and allow them to take corrective action, blocking access to vulnerable ports, denying access to specific IP addresses, or shutting down services used to allow attacks. This fast-alert capability makes an IDS the front-line weapon in the network administrators’ war against individuals or entities attempting to gain unauthorized access to an organizations network.Intrusion Prevention Systems are similar to IDS but are usually placed in-line and will attempt to proactively block malicious intrusions.Packet Analyzers are used to record or monitor individual packet transmissions over the network usually for diagnostic purposes to analyze network problemsNetwork forensic devices focus on the capture, recording, and analysis of network events in order to discover the source of security attacks. Network investigation tools deal with volatile and dynamic information as network traffic is transmitted and then lost, so network forensic devices are constantly analyzing and storing the traffic passing through the network.Voice Over IP Recorders are commonly found within call centers for frontline customer contact and are used to record call data for later analysis.RMON Analytics tools implement the Remote Network Monitoring standard for collecting, analyzing and reporting on packet data.
  • Oversubscribed Analysis &amp; Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability &amp; Tool Redundancy
  • Oversubscribed Analysis &amp; Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability &amp; Tool Redundancy
  • Oversubscribed Analysis &amp; Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability &amp; Tool Redundancy
  • Thank you for participating in this Webinar.
  • Tap Into the Health of Your Network

    1. 1. Tapping Into The Health of Your Network<br />Intelligent Network Access and Monitoring Solutions<br />
    2. 2. Presenter<br />Peter Ingebrigtsen<br />Field Application Engineer, Net Optics, Inc.<br />Peter joined Net Optics after running his own network consulting firm, where he helped customers reduce their carbon footprint by optimizing their network resources. He also Managed all the networking devices and configured monitoring solutions for customers.<br />Recently, Peter was instrumental in configuring and facilitating our recent participation in the Interop NOC. <br />Additionally, Peter will be participating in our trade show booth at next month’s Cisco Live! event in Las Vegas, if you’ll be attending you can stop by Booth #1841 and ask Peter any follow-up questions. <br />Peter’s additional claims to fame include defeating rebel forces in a galaxy far far away, and he was also a runner-up for making an appearance on ‘So You Think You Can Dance’.<br />
    3. 3. Agenda<br />Why monitor the health of your network?<br />Common network monitoring tools<br />Where Network Taps fit in<br />Types of Network Taps and their application<br />Network Taps<br />Regeneration Taps<br />Aggregator Taps<br />Bypass Switches<br />Data Monitoring Switches<br />
    4. 4. Why monitor the health of your network?<br />For Many Organizations, Network Performance Directly Impacts:<br />Customer experience<br />Business efficiency<br />Competitive advantage<br />Security and compliance<br />And ultimately….Organizational Success!<br />
    5. 5. Many Devices for Monitoring Your Network<br />Intrusion Detection Systems (IDS)<br />Intrusion Prevention Systems (IPS)<br />Packet Analyzers<br />Forensic Devices<br />VoIP Recorders<br />RMON Analytics Tools<br />
    6. 6. ESX Stack<br />vm 1<br />Vm 2<br />Vm 3<br />Network Layer<br />Core Network<br />Data Center<br />User Access<br />Virtual Data Center<br />Cloud<br />PhantomMonitor™<br />V Switch<br />Hypervisor<br />Net Optics Position in the Network<br />
    7. 7. Applications Layer<br />Protocol Analyzers<br />IPS<br />Forensics<br />Performance<br />Data Loss Prevention<br />VoIP Analyzer<br />ESX Stack<br />vm 1<br />Vm 2<br />Vm 3<br />Network Layer<br />Core Network<br />Data Center<br />User Access<br />Virtual Data Center<br />Cloud<br />PhantomMonitor™<br />V Switch<br />Hypervisor<br />Net Optics Position in the Network<br />
    8. 8. Applications Layer<br />Protocol Analyzers<br />IPS<br />Forensics<br />Performance<br />Data Loss Prevention<br />VoIP Analyzer<br />Net Optics Products Solve<br />Access & Control Layer<br /><ul><li>Oversubscribed Analysis & Security Tools
    9. 9. Requirement for Total Visibility
    10. 10. Need for Multiple Tool Deployment
    11. 11. Network Scalability
    12. 12. Visibility into Virtualization
    13. 13. High Availability & Tool Redundancy</li></ul>Indigo Pro™<br />Director xStream Pro™<br />Bypass Switches<br />Director™<br />Taps<br />xBalancer™<br />Phantom™ Virtual Tap<br />Aggregation<br />Regeneration Tap™<br />Gig Zero Delay Tap™<br />ESX Stack<br />vm 1<br />Vm 2<br />Vm 3<br />Network Layer<br />PhantomMonitor™<br />V Switch<br />Hypervisor<br />Director<br />Net Optics Position in the Network<br />Core Network<br />Data Center<br />User Access<br />Virtual Data Center<br />Cloud<br />
    14. 14. Net Optics Products<br />Control<br />Management<br />Access<br />Bypass Switches<br />Director™ Family<br />Indigo Pro™<br />Intelligent Taps<br />Link Aggregators<br />Network Taps<br />appTap™<br />xBalancer™<br />Virtual Tap<br />
    15. 15. Net Optics Products<br />Control<br />Management<br />Access<br />Bypass Switches<br />Director™ Family<br />Indigo Pro™<br />Intelligent Taps<br />Link Aggregators<br />Network Taps<br />appTap™<br />xBalancer™<br />Virtual Tap<br />
    16. 16. Where Network Taps Fit In<br />Before<br />Analyzer<br />?<br />Analyzer<br />Switch<br />Switch<br />Firewall<br />Switch<br />Switch<br />Firewall<br />The Tap provides a permanent, in-line access port to monitor all full-duplex traffic, without data stream interference<br />Depending on whether the Tap is fiber or copper, the network signal is split or regenerated so that the monitoring device has full access to the signal.<br />Network Tap<br />The monitoring device sees the same traffic as if it were also in-line, including physical layer errors.<br />After<br />
    17. 17. Regeneration Taps<br />RMON<br />Analyzer<br />Forensic<br />IDS<br />Regeneration Tap<br />Switch<br />Switch<br />Firewall<br />The Regeneration Tap provides permanent, in-line access ports to monitor all full-duplex traffic without data stream interference.<br />The network signal is regenerated so that multiple monitoring devices can have real-time, simultaneous access to all traffic.<br />Regeneration Taps send duplicate traffic streams to several monitoring tools<br />Deployment: In-line<br />Benefit:<br /><ul><li>Allows a variety of monitoring tools to be applied to a common stream of traffic
    18. 18. Optimizes use of each tool</li></li></ul><li>Aggregator Taps<br />The Link Aggregator Tap provides multiple, permanent, in-line access ports to monitor all full-duplex traffic without data interference.<br />RMON<br />Analyzer<br />Forensic<br />IDS<br />Switch<br />Switch<br />Switch<br />Switch<br />Using a single NIC, the monitoring devices receive all combined traffic from Side A and Side B, including physical layer errors.<br />Aggregator Taps combine multiple traffic streams and send it to monitoring tools<br />Deployment: In-line<br />Benefit:<br /><ul><li>Single tool able to monitor redundant link paths for total visibility</li></ul>Link Aggregator<br />
    19. 19. Bypass Switches<br />Access the iBypass Switch from the Command Line Interface (CLI), Web Manager, and System Manager.<br />Power to the Bypass Switch is ON and the heartbeat is being received on the Monitor Port<br />Fail-safe ports for monitoring vital network traffic <br />Benefit:<br /><ul><li>Copy traffic to the monitoring tool
    20. 20. Maintain link continuity in case of tool failure
    21. 21. Heartbeat Packet continually verifies and reacts to link state</li></li></ul><li>Data Monitoring Switch<br />Director provides permanent, in-line or Span access to monitor all full-duplex or mirror port traffic, without data stream interference at 1Gbps and 10Gbps<br />For increased monitoring leverage, Director units can be easily daisy-chained, or stacked using flexible XFP modules.<br />Director filters user specified traffic on all connections to the appropriate monitoring devices.<br />All-in-one device for monitoring vital network traffic <br />Benefit:<br /><ul><li>Provides one-to-one, many-to-one, one-to-many, and many-to-many mappings of network links and Span ports to monitor ports.</li></li></ul><li>Conclusion<br />Questions & Answers<br />A recording of this webinar will be made available on theNet Optics web site. To view the recording, or learn more about Net Optics products, please visit www.netoptics.com.<br />In future webinars we will be providing more in-depth information regarding specific Net Optics products, to be sure you receive future webinar announcements, please sign up for our newsletter at: www.netoptics.com/forms/newsletter-subscription <br />
    22. 22. Thank You!<br />Net Optics, Inc.<br />www.netoptics.com<br />408.737.7777<br />

    ×