Using Network Recording to Maximize Network Performance Management

806 views

Published on

For security deployments and network-centric application deployments, it is critical to know what is happening on the network before, during, and after an incident. Network recording (whether actual packets or netflows) ensures that this information is available after the incident occurred, which takes the guesswork out of diagnosing and resolving critical security breaches and network-centric application performance issues. An emerging tool in Network Performance Management and Diagnostics (NPMD) is network recording and search, which allows network operations (NetOps) staff to identify issues in service and application delivery.

In this webinar, we’ll explore why network performance management is crucial in managing functionality and visibility of an organization’s network infrastructure and how Emulex helps address these deployment requirements. We'll also explore what matters most when your applications fail, and share some best-practice insights gleaned from working with customers that run some of the largest and most critical data networks on the planet.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
806
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
17
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • .
  • Using Network Recording to Maximize Network Performance Management

    1. 1. Using Network Recording to Maximize Network Performance Management 10DEC 2013 Sonny Singh Sr. Channel Marketing & Alliances Manager
    2. 2. Emulex’s Network Visibility Product (NVP) Line Emulex recently acquired Endace Endace: World Leader in network recording & packet capture Global reputation for accuracy, scalability & Performance 10 year history selling Network Visibility (top-tier customers) 2 Copyright © 2013
    3. 3. The Network Age Today Most enterprises today are critically dependent upon their network to deliver products and services to their customers Meeting internal and external service level agreements securely is a key part of this responsibility Getting enough visibility into your network to know you are meeting SLAs and/or avoiding security issues is critical… 3 Copyright © 2013
    4. 4. ITSM Challenges Today Traffic is growing exponentially and networks are moving to 10GbE speeds and beyond Convergence of multiple types of networks onto single or dual wires Virtualization of servers can obscure actual sources of traffic SDNs offer new tools and capabilities, but also obscure overall network traffic flows Hackers are becoming more sophisticated 4 Copyright © 2013
    5. 5. The Cost of Network and Service Interruptions A measure of the importance of the network to enterprises is the cost of outages to their business These longer outages are the ones that typically are the hardest to diagnose, fix & verify *Technologizer: PlayStation Network Outage: Now It’s the Worst One Ever, Right?, May 2011 http://technologizer.com/2011/05/14/when-will-playstation-network-return/ 5 Copyright © 2013
    6. 6. Endace Network Recording Infrastructure EndaceProbe™ Intelligent Network Recorder EndaceFlow™ NetFlow Generator Appliance (NGA) EndaceAccess™ Network Visibility Headend Endace Open Hosting Platform High Performance Intelligent Network Recording High-Speed NetFlow Generation for 10GbE Networks Network Visibility Headend Hosting Platform for Monitoring Applications Allows EndaceProbe INRs/ODE to scale to 40 and 100GbE 8x1GbE or 4x10GbE Ports Up to 16 TB internal storage; Fibre Channel support for SAN Up to 64 TB storage Mix of 1 and 10GbE ports EndaceProbe: Provides 100% packet capture on 10Gb Ethernet links 6 4x10GbE Ports NetFlow Generator: Generate unsampled netflows from 1GbE/10GbE links Copyright © 2013 EndaceAccess: Load-balances 40Gb/100Gb links across multiple INRs (ODE) Endace ODE: Provide packets for hosted 3rd party applications
    7. 7. Endace Value Proposition – Know Your Network! Network Recording • Network recording (whether packets or netflows) provides the visibility needed to resolve critical security & network-centric applications Security Issues • For Security issues, having all of the packets captured is critical Performance Requirements • For Applications who depend on the network for performance, having all of the packets or netflows is also critical Endace Business Benefits 7 • Record network traffic speeds (up to 100Gb/sec) • Competitive products drop packets (2Gb-3Gb per sec) • Others only sample the data (1 out of 10 packets or netflows captured Know Your Network! Copyright © 2013
    8. 8. Key Customer Deployments 8 Copyright © 2013
    9. 9. Investments in Network Health: 4 Categories Endace Focus– Speeding Response, Root Cause Analysis and Resolution 2 Detection 2. Detect things that may be bad and were missed by prevention tools; generate alerts 3 Response 3. NPM APM SIEM Help engineers respond to any kind of network-related problem fast Firewall Wan Ops NGF 1 Prevention 1. 4 Root cause 4. Sit in the network and stop known bad things from happening Enable engineers to understand exactly what happened and why 9 Copyright © 2013
    10. 10. …Yet, There Are Still Holes In The Overall Strategy Historically, network IT has been reactive in nature Tool spending has focused on prevention and detection Spending on tools to improve response times, issue analysis, and network adaptation has lagged Result: more downtime, longer maximum TTRs 10 Copyright © 2013
    11. 11. How Bad is The Problem Today? Virtualization FC 10GE FC to 10GbE Transition Transition “THE INCREASING PRESSURE ON DATA CENTER IT OPERATIONS IS A GROWING COMPLEXITY DRIVEN BY THE RAPIDLY GROWING NUMBER OF BUSINESS-CRITICAL APPLICATIONS WHICH IN TURN IS LEADING TO MORE DOWNTIME” Datacenter Dynamics– SEP, 2012* Server Consolid’n Data Center Consolid’n Storage Virtualization ? Network Virtualization App Mobility “BETWEEN JUNE 2010 AND FEBRUARY 2012, THE COST PER HOUR OF NETWORK DOWNTIME INCREASED, ON AVERAGE, BY 65% ” ABERDEEN GROUP – FEB, 2012** Network Security “THE ENTERPRISE NETWORK HAS NEVER HAD SO MANY BLIND SPOTS” IDC – 2012*** *Datacenter Dynamics: GREATER COMPLEXITY IS CAUSING MORE DATA CENTER DOWNTIME – SEP,2012 http://www.datacenterdynamics.com/focus/archive/2012/09/greater-complexity-causing-more-data-center-downtime-0 “Aberdeen Group: The Cost of Downtime is Rising - FEB, 2012 11 http://blogs.aberdeen.com/it-infrastructure/the-cost-of-downtime-is-rising/ ***IDC: Realizing Business Value and ROI with Application –Aware NPM – JUL, 2012 Copyright © 2013 http://www.riverbed.com/assets/media/documents/analyst_reports/AnalystReport-Riverbed-IDC-Realizing-Business-Value-and-ROI.pdf
    12. 12. How Much Network Visibility Do You Need? Low Definition Network Visibility vs. High Definition Network Visibility Low Definition High Definition • • • Shows you the overall trends Great for long-term traffic planning Geared to identify large deviations from the norm • Visibility into the “Action” (microbursts, dropped packets, protocol errors) that underlie the most difficult application performance issues The visibility Endace tools provide • • • See microbursts Know exactly what data has been compromised Identify issues impacting application performance The visibility “most” tools provide • 12 Copyright © 2013 Lack of detail needed to resolve difficult security breaches or application performance issues
    13. 13. Typical Network Visibility Fabric Deployments SecOps deployment monitoring both sides of the DMZ; record attacks, ID compromised data NetOps deployment monitoring north-south traffic; ID inbound/ outbound application issues NetOps deployment monitoring east-west traffic; ID internal application performance issues 13 Copyright © 2013
    14. 14. Our Approach to NPM/APM/SEM – Best of Breed APM App NPM App IDS App HFT App EndaceVision Network Search Engine with Fusion Connectors Endace Capture Appliance 10/40/100GbE Endace approach enables tailored “best-of-breed” solutions – All tools share data from same secure location in datacenter – Automated workflow, “pivot to packets” speeds up issue resolution Lower Investment while Increasing ROI – Only buy what you need, when you need it, where you need it – Plan and train staff on the tools that fit your situation best 14 Copyright © 2013
    15. 15. The Business Value of Network Visibility Security Know Your Risks Unambiguous Forensics Trail Ensure Corrective Actions Are Effective 15 Security Copyright © 2013
    16. 16. The Business Value of Network Visibility Network Centric Applications Customer Satisfaction Decreased Application Downtime Avoid Future Network Uptime Issues NetOps CAPEX/OPEX Savings 16 Network-Centric Applications Copyright © 2013
    17. 17. Endace Top Use Cases Enterprise IT Planning & Enablement • Bandwidth Planning • Helping 1GbE applications scale to 10GbE • Reducing time-to-value on IT initiatives like VDI and SDN • Smoothing the path to BYOD through network visibility 17 Network/Application Performance Direction & Resolution Security Analysis • Optimizing network resources and identifying bandwidth chokes • Investigating suspected security/data loss issues fast • Rapid response to critical network outages • Monitoring end user application usage policies on data networks • Troubleshooting intermittent application performance issues fast • Alerts on bandwidth spikes, microburst and application detection Copyright © 2013 • Alerts on detection of banned applications
    18. 18. Summary – Deploy Endace Solutions & Improve Network Visibility, Performance and Security Faster Time to Resolution for Difficult Network + Security Issues Standalone Network Recorders Enable Best-InBreed Solutions Enterprises Deploy Endace Solutions to Improve Their Network Availability & Security Let Emulex Help You Improve Your Network’s Performance Endace Network Visibility Solutions 18 Copyright © 2013
    19. 19. 19 Copyright © 2013

    ×