SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Tapping Into The Health of Your Network Intelligent Network Access and Monitoring Solutions
Presenter Peter Ingebrigtsen Field Application Engineer, Net Optics, Inc. Peter joined Net Optics after running his own network consulting firm, where he helped customers reduce their carbon footprint by optimizing their network resources. He also Managed all the networking devices and configured monitoring solutions for customers. Recently, Peter was instrumental in configuring and facilitating our recent participation in the Interop NOC.  Additionally, Peter will be participating in our trade show booth at next month’s Cisco Live! event in Las Vegas, if you’ll be attending you can stop by Booth #1841 and ask Peter any follow-up questions.  Peter’s additional claims to fame include defeating rebel forces in a galaxy far far away, and he was also a runner-up for making an appearance on ‘So You Think You Can Dance’.
Agenda Why monitor the health of your network? Common network monitoring tools Where Network Taps fit in Types of Network Taps and their application Network Taps Regeneration Taps Aggregator Taps Bypass Switches Data Monitoring Switches
Why monitor the health of your network? For Many Organizations, Network Performance Directly Impacts: Customer experience Business efficiency Competitive advantage Security and compliance And ultimately….Organizational Success!
Many Devices for Monitoring Your Network Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Packet Analyzers Forensic Devices VoIP Recorders RMON Analytics Tools
ESX Stack vm 1 Vm 2 Vm 3 Network Layer Core Network Data Center User Access Virtual Data Center Cloud PhantomMonitor™ V Switch Hypervisor Net Optics Position in the Network
Applications Layer Protocol Analyzers IPS Forensics Performance Data Loss Prevention VoIP Analyzer ESX Stack vm 1 Vm 2 Vm 3 Network Layer Core Network Data Center User Access Virtual Data Center Cloud PhantomMonitor™ V Switch Hypervisor Net Optics Position in the Network
Applications Layer Protocol Analyzers IPS Forensics Performance Data Loss Prevention VoIP Analyzer Net Optics Products Solve Access & Control Layer ,[object Object]
Requirement for Total Visibility
Need for Multiple Tool Deployment
Network Scalability
Visibility into Virtualization
High Availability & Tool RedundancyIndigo Pro™ Director xStream Pro™ Bypass Switches Director™ Taps xBalancer™ Phantom™ Virtual Tap Aggregation Regeneration Tap™ Gig Zero Delay Tap™ ESX Stack vm 1 Vm 2 Vm 3 Network Layer PhantomMonitor™ V Switch Hypervisor Director Net Optics Position in the Network Core Network Data Center User Access Virtual Data Center Cloud
Net Optics Products Control Management Access Bypass Switches Director™ Family Indigo Pro™ Intelligent Taps Link Aggregators Network Taps appTap™ xBalancer™ Virtual Tap
Net Optics Products Control Management Access Bypass Switches Director™ Family Indigo Pro™ Intelligent Taps Link Aggregators Network Taps appTap™ xBalancer™ Virtual Tap
Where Network Taps Fit In Before Analyzer ? Analyzer Switch Switch Firewall Switch Switch Firewall The Tap provides a permanent, in-line access port to monitor all full-duplex traffic, without data stream interference Depending on whether the Tap is fiber or copper, the network signal is split or regenerated so that the monitoring device has full access to the signal. Network Tap The monitoring device sees the same traffic as if it were also in-line, including physical layer errors. After
Regeneration Taps RMON Analyzer Forensic IDS Regeneration Tap Switch Switch Firewall The Regeneration Tap provides permanent, in-line access ports to monitor all full-duplex traffic without data stream interference. The network signal is regenerated so that multiple monitoring devices can have real-time, simultaneous access to all traffic. Regeneration Taps send duplicate traffic streams to several monitoring tools Deployment: In-line Benefit: ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
AlgoSec
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
LiveAction Next Generation Network Management Software
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
Pratul Sharma
 
Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515
Larry Arps
 
Overview of IoT/M2M Capability
Overview of IoT/M2M CapabilityOverview of IoT/M2M Capability
Overview of IoT/M2M Capability
ALTEN Calsoft Labs
 

Was ist angesagt? (18)

ConnectiKR0N - Presentation for LiDAR
ConnectiKR0N - Presentation for LiDARConnectiKR0N - Presentation for LiDAR
ConnectiKR0N - Presentation for LiDAR
 
NetScout Systems corporate overview
NetScout Systems corporate overviewNetScout Systems corporate overview
NetScout Systems corporate overview
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
 
Gigamon GigaVue 420 Hardware Tour
Gigamon GigaVue 420 Hardware TourGigamon GigaVue 420 Hardware Tour
Gigamon GigaVue 420 Hardware Tour
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
IoT Communication protocols Overview
IoT Communication protocols OverviewIoT Communication protocols Overview
IoT Communication protocols Overview
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515Communication Technology Inc-Company Brief Charts-032515
Communication Technology Inc-Company Brief Charts-032515
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4Brosur AKCP sensor Probe4
Brosur AKCP sensor Probe4
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Firewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachFirewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric Approach
 
Overview of IoT/M2M Capability
Overview of IoT/M2M CapabilityOverview of IoT/M2M Capability
Overview of IoT/M2M Capability
 
Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity Antenna Solutions from Laird Connectivity
Antenna Solutions from Laird Connectivity
 
High-performance, narrowband UHF SCADA radio
High-performance, narrowband UHF SCADA radioHigh-performance, narrowband UHF SCADA radio
High-performance, narrowband UHF SCADA radio
 
Timepack deck
Timepack deckTimepack deck
Timepack deck
 

Ähnlich wie Tap Into the Health of Your Network

160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 
Best Practices For Cisco Wlan Management
Best Practices For Cisco Wlan ManagementBest Practices For Cisco Wlan Management
Best Practices For Cisco Wlan Management
hypknight
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
Tonya Williams
 

Ähnlich wie Tap Into the Health of Your Network (20)

UPM601-C Ultra High Frequency Partial Discharge Monitor | Rugged Monitoring
UPM601-C Ultra High Frequency Partial Discharge Monitor | Rugged MonitoringUPM601-C Ultra High Frequency Partial Discharge Monitor | Rugged Monitoring
UPM601-C Ultra High Frequency Partial Discharge Monitor | Rugged Monitoring
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
ShoreNet Solutions Presents GigaVue 420 Hardware Tour
ShoreNet Solutions Presents GigaVue 420 Hardware TourShoreNet Solutions Presents GigaVue 420 Hardware Tour
ShoreNet Solutions Presents GigaVue 420 Hardware Tour
 
#1-ShoreNet Solutions Presents Giga Vue 420 Hardware Tour
#1-ShoreNet Solutions Presents Giga Vue 420 Hardware Tour#1-ShoreNet Solutions Presents Giga Vue 420 Hardware Tour
#1-ShoreNet Solutions Presents Giga Vue 420 Hardware Tour
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
Rina converged network operator - etsi workshop
Rina converged network operator -  etsi workshopRina converged network operator -  etsi workshop
Rina converged network operator - etsi workshop
 
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsIntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
 
Profibus system engineering and monitoring - Andy Verwer and Peter Thomas
Profibus system engineering and monitoring - Andy Verwer and Peter ThomasProfibus system engineering and monitoring - Andy Verwer and Peter Thomas
Profibus system engineering and monitoring - Andy Verwer and Peter Thomas
 
Best Practices For Cisco Wlan Management
Best Practices For Cisco Wlan ManagementBest Practices For Cisco Wlan Management
Best Practices For Cisco Wlan Management
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010Hardened Ethernet In ITS 2010
Hardened Ethernet In ITS 2010
 
E2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st DraftE2 E Solution 4 Wind Park 1st Draft
E2 E Solution 4 Wind Park 1st Draft
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Gigamon Systems Case Studies
Gigamon Systems Case StudiesGigamon Systems Case Studies
Gigamon Systems Case Studies
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 

Mehr von LiveAction Next Generation Network Management Software

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 

Mehr von LiveAction Next Generation Network Management Software (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?Big Data is on a Collision Course With Your Network - Are You Ready?
Big Data is on a Collision Course With Your Network - Are You Ready?
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Compliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized EnvironmentCompliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized Environment
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Tap Into the Health of Your Network

  • 1. Tapping Into The Health of Your Network Intelligent Network Access and Monitoring Solutions
  • 2. Presenter Peter Ingebrigtsen Field Application Engineer, Net Optics, Inc. Peter joined Net Optics after running his own network consulting firm, where he helped customers reduce their carbon footprint by optimizing their network resources. He also Managed all the networking devices and configured monitoring solutions for customers. Recently, Peter was instrumental in configuring and facilitating our recent participation in the Interop NOC. Additionally, Peter will be participating in our trade show booth at next month’s Cisco Live! event in Las Vegas, if you’ll be attending you can stop by Booth #1841 and ask Peter any follow-up questions. Peter’s additional claims to fame include defeating rebel forces in a galaxy far far away, and he was also a runner-up for making an appearance on ‘So You Think You Can Dance’.
  • 3. Agenda Why monitor the health of your network? Common network monitoring tools Where Network Taps fit in Types of Network Taps and their application Network Taps Regeneration Taps Aggregator Taps Bypass Switches Data Monitoring Switches
  • 4. Why monitor the health of your network? For Many Organizations, Network Performance Directly Impacts: Customer experience Business efficiency Competitive advantage Security and compliance And ultimately….Organizational Success!
  • 5. Many Devices for Monitoring Your Network Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Packet Analyzers Forensic Devices VoIP Recorders RMON Analytics Tools
  • 6. ESX Stack vm 1 Vm 2 Vm 3 Network Layer Core Network Data Center User Access Virtual Data Center Cloud PhantomMonitor™ V Switch Hypervisor Net Optics Position in the Network
  • 7. Applications Layer Protocol Analyzers IPS Forensics Performance Data Loss Prevention VoIP Analyzer ESX Stack vm 1 Vm 2 Vm 3 Network Layer Core Network Data Center User Access Virtual Data Center Cloud PhantomMonitor™ V Switch Hypervisor Net Optics Position in the Network
  • 8.
  • 10. Need for Multiple Tool Deployment
  • 13. High Availability & Tool RedundancyIndigo Pro™ Director xStream Pro™ Bypass Switches Director™ Taps xBalancer™ Phantom™ Virtual Tap Aggregation Regeneration Tap™ Gig Zero Delay Tap™ ESX Stack vm 1 Vm 2 Vm 3 Network Layer PhantomMonitor™ V Switch Hypervisor Director Net Optics Position in the Network Core Network Data Center User Access Virtual Data Center Cloud
  • 14. Net Optics Products Control Management Access Bypass Switches Director™ Family Indigo Pro™ Intelligent Taps Link Aggregators Network Taps appTap™ xBalancer™ Virtual Tap
  • 15. Net Optics Products Control Management Access Bypass Switches Director™ Family Indigo Pro™ Intelligent Taps Link Aggregators Network Taps appTap™ xBalancer™ Virtual Tap
  • 16. Where Network Taps Fit In Before Analyzer ? Analyzer Switch Switch Firewall Switch Switch Firewall The Tap provides a permanent, in-line access port to monitor all full-duplex traffic, without data stream interference Depending on whether the Tap is fiber or copper, the network signal is split or regenerated so that the monitoring device has full access to the signal. Network Tap The monitoring device sees the same traffic as if it were also in-line, including physical layer errors. After
  • 17.
  • 18.
  • 19.
  • 20. Maintain link continuity in case of tool failure
  • 21.
  • 22. Thank You! Net Optics, Inc. www.netoptics.com 408.737.7777

Hinweis der Redaktion

  1. [CHRIS] [Will hand off to Peter after this information]Our Presenter today is Aaron Janssen, Net Optics’ Field Application Engineer. Aaron brings over 15 years experience deploying and configuring security & networking equipment, including Juniper Networks, Network Associates, McAfee, and Patchlink Inc.So without further ado, I’ll turn our presentation over to Aaron.
  2. [CHRIS]Today’s Webinar AgendaWhy monitor the health of your network? – what are the driving forces behind the need to monitor your networkCommon network monitoring tools – what tools are network admins currently deploying to monitor and protect the networkWhere Network Taps fit in to the monitoring picture – we’ll what a network tap is and how it fits into the monitoring architectureTypes of Network Taps and their application Network TapsRegeneration TapsAggregator TapsBypass SwitchesData Monitoring Switches
  3. [ AJ ]So why do we monitor the health of our networks?In today’s IT-driven organizations, network performance is key to providing excellent customer experiences, driving business process efficiencies, growing revenue, and maintaining competitive advantage. Network administrators, charged with keeping networks responsive to the needs of both internal and external customers, rely on network monitoring tools for a continuous stream of information to baseline and assess the network’s health. These tools enable administrators to ensure high application availability and good response times, to enforce network usage policies, to ensure the security of their network, to protect the network against possible downtime and to justify and measure the impact of network upgrades.A decline in network performance ultimately impacts an organization’s revenue growth by impacting on:The Customer Experience, whether it’s first-hand experience with a data-driven web application, or indirectly via customer facing employees being unable to access the data they need in order to serve the customer.Business Efficiencies, such as order processing can also be impacted by the lack of timely informationCompetitive Advantages may also be lost if the newest product or service is unavailable due to a crippled network infrastructureFinally, the ever increasing threat of unauthorized access of vital data requires a network administrator to be ever vigilant against possible security threats and the need to maintain records for regulation compliance
  4. There are variety of devices that network administrators use to monitor and maintain various portions of their network. Most network monitoring tools are task-specific. Proprietary boxes sold as “appliances” may consist internally of standard hardware components running proprietary software, often based on the Linux operating system. The performance of these tools is determined by the speeds of the processors and memory buses, and the size of the memory utilized both for caching and for buffering packets from the network. The performance of the network interface cards (NICs) is criticaltoo, for monitoring high-bandwidth 1Gbps and faster network links. More advanced tools help to alleviate these bottlenecks by adding more processors and more dedicated buffers. The type, speed, and number of processors in a tool dictate its processing performance. As network speeds increase, the number of packets that can be processed at wire speed (in other words, keeping up with the network) reaches a limit. Buffers enable the tool to handle higher peak traffic loads by storing packets during high traffic periods, and releasing them to be processed when the traffic is less. However, the inability to sustain performance at full network bandwidth, and for extended periods of high traffic, may eventually cause even the largest buffers to fill up, and the tool may not capture needed information. Common forms of Network Monitoring Tools include the following.An IDS monitors network traffic for activity that falls within the definition of banned activity for the network. When found, the IDS will alert administrators and allow them to take corrective action, blocking access to vulnerable ports, denying access to specific IP addresses, or shutting down services used to allow attacks. This fast-alert capability makes an IDS the front-line weapon in the network administrators’ war against individuals or entities attempting to gain unauthorized access to an organizations network.Intrusion Prevention Systems are similar to IDS but are usually placed in-line and will attempt to proactively block malicious intrusions.Packet Analyzers are used to record or monitor individual packet transmissions over the network usually for diagnostic purposes to analyze network problemsNetwork forensic devices focus on the capture, recording, and analysis of network events in order to discover the source of security attacks. Network investigation tools deal with volatile and dynamic information as network traffic is transmitted and then lost, so network forensic devices are constantly analyzing and storing the traffic passing through the network.Voice Over IP Recorders are commonly found within call centers for frontline customer contact and are used to record call data for later analysis.RMON Analytics tools implement the Remote Network Monitoring standard for collecting, analyzing and reporting on packet data.
  5. Oversubscribed Analysis & Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability & Tool Redundancy
  6. Oversubscribed Analysis & Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability & Tool Redundancy
  7. Oversubscribed Analysis & Security ToolsRequirement for Total VisibilityNeed for Multiple Tool DeploymentNetwork ScalabilityVisibility into VirtualizationHigh Availability & Tool Redundancy
  8. Thank you for participating in this Webinar.