SlideShare uma empresa Scribd logo
1 de 50
Network Instruments
Closing the Visibility Gap
Company Overview

   Founded in 1994
   Privately held
   Internally funded
   Same management
    team since „94
   20 offices worldwide
      North America (16)
      Europe (4)
   130 Partners
      Across 50
        countries




Celebrating 14 years of continued company growth
About Network Instruments


 Privately held
 Founded 1994; same
  management team today

 18 offices worldwide
 130 partners across
  50 countries

 Driving Factors
    GigaStor™ sales
    Repeat business
    10 Gb analysis solutions
    Competitive displacements
                                 14 years of double-digit growth
3 of the Global Top 5
Strong Customer Base   70 of the Global Top 100
Virtualization Trends & Challenges

 Adoption
 55% of firms will have implemented by 12/09*
 Additional 29% planning budget for virtualization*

 Challenges
 Inability to access data streams via purpose-built devices
  (analyzers, IDS)
 Blind spots exist in analyzing internal VM host traffic
 Existing VM monitoring lacks in-depth performance metrics
 Views limited to either physical or virtual world


* Forrester Research, Inc. The State Of Emerging Enterprise Hardware Trends: 2008 To 2009, Feb. 27, 2009
Google “virtualization” and “network instruments”

   quot;While server virtualization is happening at a rapid rate, tools for managing
    application performance in these environments have not kept pace,quot; said Will
    Cappelli, research vice president at Gartner. “In order to understand application
    behavior, one needs to combine data from the dynamically reconfiguring
    application layer, network layers, and virtualization layer. Traditional tools which
    assume that the environments remain static while an application executes are
    not answering the needs of the Global 2000.” – Gartner

    “The introduction of the new VM features by Network Instruments addresses

    the visibility need and includes a great, innovative answer to some of the key
    challenges delaying many from embracing virtualization fully.” – EMA

    “Though not the first application of packet analysis to vSwitch traffic, Network

    Instruments is including an innovative “Virtual TAP” feature which can
    aggregate all vSwitch traffic and ship it out a physical NIC, eliminating the blind
    spot and allowing security & compliance monitoring as well as full packet-
    stream storage for forensic performance analysis.” – Network World
Virtualization Advantages


 Reduce Operational Overhead
     Lower number of physical servers - you can reduce hardware maintenance
      costs because of a lower number of physical servers leading to a smaller
      datacenter, with decreases in cooling and electrical costs.
     Improve the efficiency of your Windows Data Center, as well as lower your
      cost of ownership.
 Increase Computing Efficiencies - Server consolidation
     If applications running on separate computers do not utilize the computing resources
      of their computers, they can be consolidated onto a smaller number of servers using
      virtualization technology.
 Flexibility and agility:
     ]You can deploy multiple operating system technologies on a single hardware
      platform (i.e. Windows Server 2003, Linux, Windows 2000, etc).
     Run legacy applications alongside new versions, migrate applications to new
      environments, and restore systems in post-disaster scenarios.
Virtualization Disadvantages

   Magnified physical failures - Multiple important servers running on one
    physical host
   Degraded performance - every piece of software behaves differently in a
    virtualized environment. Applications that are quite modest as long as they run
    on a physical server, but when they were virtualzed their resource requirements
    are multiplied.
    Lack management tools –you can only take advantage of virtualizations

    advantages if you have the proper tools. Often, the tools that come with a
    virtualization solution are not enough, only supporting basic system
    performance management tasks.

   Complex root cause analysis - A new layer of complexity is added and can
    cause new problems. However, the main difficulty is that if something doesn‟t
    work as it is supposed to, it can require considerable extra efforts to find the
    cause of the problem.
      Lack visibility and in-depth analysis of application performance and traffic
      Lack integrated visibility across physical and virtualized domains
Virtual Terminology

 Virtual Machine Host (VM Host) – Physical computer, running a „host‟
  OS / Software (VMWare ESX, ESXi, etc.)

 Virtual Machine (VM) – Software installation of an OS, running within
  the VM Host

 Virtual Switch (vSwitch) – Logical connection path between VMs
  within the same VM Host. Facilitates communication between local VMs

 Virtual Network Interface Card (vNIC) – Logical communication
  interface for VMs, used to connected logically to a vSwitch, or to allow
  for communication to the physical network via an association to a
  physical NIC (pNIC)

 Physical NIC (pNIC) – network-facing physical NIC over which VM
  Host data enters or exits the Host
Types of monitoring in the Physical realm


         Network                   Application
     troubleshooting               monitoring




                                             Compliance
     Firewall
                                              reporting
    monitoring




    Database           Intrusion        Forensic
    security           detection        analysis
Virtual Environments – Multi-Tier example
Virtual Environments
Virtual Environments
Virtual Environments
Virtual Environments – Visibility step 1
Virtual Environments – Internal Visibility
Virtual Environments – Virtual & Physical Visibility
What does a TAP in the physical realm do?

   Provide a non-intrusive connection point
       For analysis and security devices

   To analyze you must see all of the data
       A TAP delivers a copy of data to an analyzer
   Insulate network
       From failure of the appliance/analyzer/probe

                     Network under
                        analysis

                                                        B
     A
   Server                                              Switch
   Router
   Firewall …
Network Instruments Combines Physical, Virtual Domain
Visibility




                                      • A Virtual Tap …
                                           •Exact copies of all
                                           intra- and extra-host
                                           traffic
                                           • Enables vTraffic to be
                                           seen in the physical
                                           world
                                           • Other devices now
                                           have visibility and
                                           access to this critical
                                           data
Monitoring Multiple VM’s

              VM Host 1            VM Host 2   VM Host 3   VM Host 4   VM Host 5




• Aggregate traffic from up to 8
VM Hosts per Packet Recorder
• Data mine by VM Host, VM,
application,
Monitoring Multiple VM‟s with Multiple Devices & Taps

      VM Host 1   VM Host 2       VM Host 3   VM Host 4




                                                          n x IDS
                              NI Packet
Data Center Tool Deployment Challenges

  A growing list of tools need network
   access
     Application monitors, security/IDS, packet
      analyzers, VOIP analyzers, data
      recorders, compliance auditors, content
      filters, etc…

  Not enough SPAN port and TAPs
  Many tools require “big pipe” aggregated
   view
  Monitoring 10G links
Aggregate Many to One, Many to Many or Any to Many


                                             Network Ports                   Tool Ports
                                                                                  Post
                                                   Pre
                             1Gig Link A
                                                                                  Filter
                                                   Filter
 Multiple 1/10Gig Taps




                                                                                                10Gig Network
                                                                                            Instruments GigaStor
                                                                                  Post
                                                   Pre
                                                                                  Filter
                                                   Filter
                             1Gig Link B

                                                                                  Post
                                                   Pre
                                                                                           IDS / Security
                                                                                  Filter
                                                   Filter

                              1Gig Link C
                                                                                  Post
                                                   Pre
                                                                                           Compliance
                                                             GigaVUE              Filter
                                                   Filter
                                                                                           Auditor
                             10Gig Link D

                          Aggregate network data to a convenient centralized “tool farm”
                          Allow multiple tools to share access to network data
                          Load balance tools by providing them just the data they need
                              No more overloading tools with non-critical data                             23
Hardware based Data Access Switch

• Purpose built, non-blocking cross-connect hardware
switching
• Based on circuit switching, not destination address
switching

• Packet aware, aggregating and filtering

• NOT a physical layer matrix switch

• NOT software based, no OS, no CPU, no Store & Forward

• Full 100% line rate performance at all ports – even if filtering
is on

• Ultra-low 6 micro seconds latency from port to port

• Speed and media converting from ingress to egress
                                                        Bit-Mask Filtering
               Any to Many   Many to Any   Any to Any
Gigamon Tool Aggregator Benefits

   Extends the range and depth of your network tools‟
    coverage

   Eliminates contention over limited SPAN ports and
    TAPs

   Monitor 10G links with 1G tools

   Reduces operating costs and troubleshooting time by
    centralizing tools

        Get the Most From Your
             Network Tools
VM Monitoring Access and Scalability
with Gigamon




  n x VM‟s
Enterprise Solution Deployment



                                                             Observer
                                                          Reporting Server
                        Nexus 7000
                        Core/Aggregation


                                  Nexus 5000
                                  10GbE & FCoE
                                  Server Access




                                                                             Trending Feed from
                                     10G Tap Input
                                                   GigaVUE-2404
                                         Feed




                                                                             GigaStor
                                               10G Aggregation
                                                 Output Feed
                                Nexus
                                2000
                                1GbE Server
                                Connectivity

                                                           10G GigaStor
                                                          Packet Recorder
VM Access Achieved – Now what?


                root-cause analysis requires…
  • Effective
    • Integrated view of inter and intra VM
      activity
    • Application performance visibility
    • Multi-Tier application analysis
    • Retrospective Network Analysis
    • Proactive Virtualized Application
      Performance Reporting
    • Security Forensics
The NI Monitoring Model
Enterprise Wide Application Performance Reporting




   Integrated or separate view of physical and virtual
   domains by application
Drill-down to Application Server Performance
Drill-down to Individual Session Statistics
32% Spend >50 Days Annually Recreating Issues




     Source: Network Instruments 2008 Annual State of the Network Survey, survey of 592 network engineers
Go Back in Time and View Recorded Activity
                                    Isolate the
                                   time period




                Identify the
            activity of interest
Application Forensics Analysis
Expert Analysis of Application Session Conditions
Drill into Conversation to Find Delay




   5-second delay
Bringing it all together
Our Architecture
NI-DNA™

  Three Unique Advantages

       Unified Code Set
        Core application connects all products
        Enhancements added to all platforms
         Ex. IPv6, NetFlow, VoIP, MPLS

       Local and Remote Visibility
        Identical functionality across segments
        Lower cost of ownership

       Multi-Instance
        Supports multiple topologies
             Including Gig, 10Gbe, Wireless a/b/g/n
             OC-3/12, Fiber Channel, WAN
        Supports multiple users
        All done simultaneously or concurrently




Wired to wireless. Local and remote. Data and applications.
Capture Technology

 Gen2™ Capture Card
  Card internally designed card for
   high-performance analysis
     1 Gb
     10 Gb
 Performance
  Fastest real-time processing available
  Full-duplex, line-rate capture
  Streams directly to physical system memory
  Fully integrates with NI-DNA™ technology
 Flexibility
                                                      Gen2 Delivers
  Higher port densities – up to 8 ports on gigabit
    links and 4 ports on 10 gigabit
                                                       Performance
  SFP/XFP-based – switch copper and optical
                                                       Flexibility
 Adaptability
                                                       Adaptability
  Filtering, processing, and analysis on the card
  Flash upgradeable
End-to-End Network Analysis
     Observer Console Interface
                                                                 Software
                                                                  Probe




                                                                 10/100/1000
                                                                Probe Appliance




                                                           WAN, Gigabit, FC, and 10 Gb
                                                               Probe Appliances




                                                                GigaStor for gigabit,
                                                                10 Gb, FC, and WAN




                                  Gigabit, WAN, FC, and 10 Gb
                                       Portable System
GigaStor™ - TiVo for your network

   Retrospective Network Analysis
   Intelligent Forensics
   Up to 48 TB storage
   Line-rate capture
   Local processing and analysis
   Supports Gigabit, 10Gbe, WAN and Fiberchannel

 Four Models
       2TB 4 Drive Unit
       4TB 8 Drive Unit
       8TB 16 Drive Unit
       12TB 16 Drive Unit
GigaStor Expandable


 Available in 16TB, 32TB
  or 48TB SATA config‟s
 Expansion capacities up to
  288TB‟s using SAS Drives

 Benefits
    Higher performance
    Investment protection
    Longer recording times
GigaStor is Portable

 First self-contained,
                                 GigaStor Portable
  portable forensics appliance
  for performing retrospective
  analysis

 Provide back-in-time
  visibility of network,
  application, security events

 Deploy unattended and            Mobile appliance for
                                  performing in-the-field
  control like an Appliance             forensics
Questions?

Mais conteúdo relacionado

Mais procurados

Just two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisJust two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisSavvius, Inc
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSrinivasa Addepalli
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksCisco Canada
 
Senior network security engineer
Senior network  security  engineerSenior network  security  engineer
Senior network security engineerDWARAGANATH VJ
 
Best Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GBest Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GSavvius, Inc
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX WebinarKatie Hyman
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7dinuk123
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMMundo Contact
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 

Mais procurados (20)

Just two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysisJust two clicks away - from monitoring and reporting to root-cause analysis
Just two clicks away - from monitoring and reporting to root-cause analysis
 
SDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_NetworksSDN_and_NFV_technologies_in_IoT_Networks
SDN_and_NFV_technologies_in_IoT_Networks
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Intro to SDN - Part II
Intro to SDN - Part IIIntro to SDN - Part II
Intro to SDN - Part II
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Ip live production
Ip live productionIp live production
Ip live production
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Senior network security engineer
Senior network  security  engineerSenior network  security  engineer
Senior network security engineer
 
Jvvnl 071108
Jvvnl 071108Jvvnl 071108
Jvvnl 071108
 
Best Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10GBest Practices for Analyzing VoIP at 10G
Best Practices for Analyzing VoIP at 10G
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
Stephen Henig
Stephen HenigStephen Henig
Stephen Henig
 
Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7Exploration_Routing_Chapter_7
Exploration_Routing_Chapter_7
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAMCómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
Cómo mejorar la seguridad de los servicios de DNS, DHCP e IPAM
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 

Semelhante a Virtualization Monitoring Webinar

Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfThomasGraf40
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analyticsconfluent
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- DatasheetINSPIRIT BRASIL
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGrant Swanson
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Network monitoring for the modern wan webinar
Network monitoring for the modern wan webinarNetwork monitoring for the modern wan webinar
Network monitoring for the modern wan webinarThousandEyes
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopInfluxData
 
21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIO21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIONiklaus Hirt
 
Secure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudSecure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudRoger Xia
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centersscarisbrick
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...Cisco Canada
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamInformaticaMarketplace
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service MeshRam Vennam
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosBrent Salisbury
 

Semelhante a Virtualization Monitoring Webinar (20)

Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdfSwisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
Swisscom Network Analytics Data Mesh Architecture - ETH Viscon - 10-2022.pdf
 
Swisscom Network Analytics
Swisscom Network AnalyticsSwisscom Network Analytics
Swisscom Network Analytics
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Netflow analyzer- Datasheet
Netflow analyzer- DatasheetNetflow analyzer- Datasheet
Netflow analyzer- Datasheet
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Gigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP TechnologyGigamon U - Missing Link TAP Technology
Gigamon U - Missing Link TAP Technology
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Network monitoring for the modern wan webinar
Network monitoring for the modern wan webinarNetwork monitoring for the modern wan webinar
Network monitoring for the modern wan webinar
 
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntopIT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
 
21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIO21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIO
 
Secure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudSecure Multi Tenancy In the Cloud
Secure Multi Tenancy In the Cloud
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
The Current And Future State Of Service Mesh
The Current And Future State Of Service MeshThe Current And Future State Of Service Mesh
The Current And Future State Of Service Mesh
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
OpenStack and OpenFlow Demos
OpenStack and OpenFlow DemosOpenStack and OpenFlow Demos
OpenStack and OpenFlow Demos
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Virtualization Monitoring Webinar

  • 2. Company Overview  Founded in 1994  Privately held  Internally funded  Same management team since „94  20 offices worldwide  North America (16)  Europe (4)  130 Partners  Across 50 countries Celebrating 14 years of continued company growth
  • 3. About Network Instruments  Privately held  Founded 1994; same management team today  18 offices worldwide  130 partners across 50 countries  Driving Factors  GigaStor™ sales  Repeat business  10 Gb analysis solutions  Competitive displacements 14 years of double-digit growth
  • 4. 3 of the Global Top 5 Strong Customer Base 70 of the Global Top 100
  • 5. Virtualization Trends & Challenges  Adoption  55% of firms will have implemented by 12/09*  Additional 29% planning budget for virtualization*  Challenges  Inability to access data streams via purpose-built devices (analyzers, IDS)  Blind spots exist in analyzing internal VM host traffic  Existing VM monitoring lacks in-depth performance metrics  Views limited to either physical or virtual world * Forrester Research, Inc. The State Of Emerging Enterprise Hardware Trends: 2008 To 2009, Feb. 27, 2009
  • 6. Google “virtualization” and “network instruments”  quot;While server virtualization is happening at a rapid rate, tools for managing application performance in these environments have not kept pace,quot; said Will Cappelli, research vice president at Gartner. “In order to understand application behavior, one needs to combine data from the dynamically reconfiguring application layer, network layers, and virtualization layer. Traditional tools which assume that the environments remain static while an application executes are not answering the needs of the Global 2000.” – Gartner “The introduction of the new VM features by Network Instruments addresses  the visibility need and includes a great, innovative answer to some of the key challenges delaying many from embracing virtualization fully.” – EMA “Though not the first application of packet analysis to vSwitch traffic, Network  Instruments is including an innovative “Virtual TAP” feature which can aggregate all vSwitch traffic and ship it out a physical NIC, eliminating the blind spot and allowing security & compliance monitoring as well as full packet- stream storage for forensic performance analysis.” – Network World
  • 7. Virtualization Advantages  Reduce Operational Overhead  Lower number of physical servers - you can reduce hardware maintenance costs because of a lower number of physical servers leading to a smaller datacenter, with decreases in cooling and electrical costs.  Improve the efficiency of your Windows Data Center, as well as lower your cost of ownership.  Increase Computing Efficiencies - Server consolidation  If applications running on separate computers do not utilize the computing resources of their computers, they can be consolidated onto a smaller number of servers using virtualization technology.  Flexibility and agility:  ]You can deploy multiple operating system technologies on a single hardware platform (i.e. Windows Server 2003, Linux, Windows 2000, etc).  Run legacy applications alongside new versions, migrate applications to new environments, and restore systems in post-disaster scenarios.
  • 8. Virtualization Disadvantages  Magnified physical failures - Multiple important servers running on one physical host  Degraded performance - every piece of software behaves differently in a virtualized environment. Applications that are quite modest as long as they run on a physical server, but when they were virtualzed their resource requirements are multiplied. Lack management tools –you can only take advantage of virtualizations  advantages if you have the proper tools. Often, the tools that come with a virtualization solution are not enough, only supporting basic system performance management tasks.  Complex root cause analysis - A new layer of complexity is added and can cause new problems. However, the main difficulty is that if something doesn‟t work as it is supposed to, it can require considerable extra efforts to find the cause of the problem.  Lack visibility and in-depth analysis of application performance and traffic  Lack integrated visibility across physical and virtualized domains
  • 9. Virtual Terminology  Virtual Machine Host (VM Host) – Physical computer, running a „host‟ OS / Software (VMWare ESX, ESXi, etc.)  Virtual Machine (VM) – Software installation of an OS, running within the VM Host  Virtual Switch (vSwitch) – Logical connection path between VMs within the same VM Host. Facilitates communication between local VMs  Virtual Network Interface Card (vNIC) – Logical communication interface for VMs, used to connected logically to a vSwitch, or to allow for communication to the physical network via an association to a physical NIC (pNIC)  Physical NIC (pNIC) – network-facing physical NIC over which VM Host data enters or exits the Host
  • 10. Types of monitoring in the Physical realm Network Application troubleshooting monitoring Compliance Firewall reporting monitoring Database Intrusion Forensic security detection analysis
  • 11. Virtual Environments – Multi-Tier example
  • 15. Virtual Environments – Visibility step 1
  • 16. Virtual Environments – Internal Visibility
  • 17. Virtual Environments – Virtual & Physical Visibility
  • 18. What does a TAP in the physical realm do?  Provide a non-intrusive connection point  For analysis and security devices  To analyze you must see all of the data  A TAP delivers a copy of data to an analyzer  Insulate network  From failure of the appliance/analyzer/probe Network under analysis B A Server Switch Router Firewall …
  • 19. Network Instruments Combines Physical, Virtual Domain Visibility • A Virtual Tap … •Exact copies of all intra- and extra-host traffic • Enables vTraffic to be seen in the physical world • Other devices now have visibility and access to this critical data
  • 20. Monitoring Multiple VM’s VM Host 1 VM Host 2 VM Host 3 VM Host 4 VM Host 5 • Aggregate traffic from up to 8 VM Hosts per Packet Recorder • Data mine by VM Host, VM, application,
  • 21. Monitoring Multiple VM‟s with Multiple Devices & Taps VM Host 1 VM Host 2 VM Host 3 VM Host 4 n x IDS NI Packet
  • 22. Data Center Tool Deployment Challenges  A growing list of tools need network access  Application monitors, security/IDS, packet analyzers, VOIP analyzers, data recorders, compliance auditors, content filters, etc…  Not enough SPAN port and TAPs  Many tools require “big pipe” aggregated view  Monitoring 10G links
  • 23. Aggregate Many to One, Many to Many or Any to Many Network Ports Tool Ports Post Pre 1Gig Link A Filter Filter Multiple 1/10Gig Taps 10Gig Network Instruments GigaStor Post Pre Filter Filter 1Gig Link B Post Pre IDS / Security Filter Filter 1Gig Link C Post Pre Compliance GigaVUE Filter Filter Auditor 10Gig Link D  Aggregate network data to a convenient centralized “tool farm”  Allow multiple tools to share access to network data  Load balance tools by providing them just the data they need  No more overloading tools with non-critical data 23
  • 24. Hardware based Data Access Switch • Purpose built, non-blocking cross-connect hardware switching • Based on circuit switching, not destination address switching • Packet aware, aggregating and filtering • NOT a physical layer matrix switch • NOT software based, no OS, no CPU, no Store & Forward • Full 100% line rate performance at all ports – even if filtering is on • Ultra-low 6 micro seconds latency from port to port • Speed and media converting from ingress to egress Bit-Mask Filtering Any to Many Many to Any Any to Any
  • 25. Gigamon Tool Aggregator Benefits  Extends the range and depth of your network tools‟ coverage  Eliminates contention over limited SPAN ports and TAPs  Monitor 10G links with 1G tools  Reduces operating costs and troubleshooting time by centralizing tools Get the Most From Your Network Tools
  • 26. VM Monitoring Access and Scalability with Gigamon n x VM‟s
  • 27. Enterprise Solution Deployment Observer Reporting Server Nexus 7000 Core/Aggregation Nexus 5000 10GbE & FCoE Server Access Trending Feed from 10G Tap Input GigaVUE-2404 Feed GigaStor 10G Aggregation Output Feed Nexus 2000 1GbE Server Connectivity 10G GigaStor Packet Recorder
  • 28. VM Access Achieved – Now what? root-cause analysis requires… • Effective • Integrated view of inter and intra VM activity • Application performance visibility • Multi-Tier application analysis • Retrospective Network Analysis • Proactive Virtualized Application Performance Reporting • Security Forensics
  • 30.
  • 31. Enterprise Wide Application Performance Reporting Integrated or separate view of physical and virtual domains by application
  • 32. Drill-down to Application Server Performance
  • 33. Drill-down to Individual Session Statistics
  • 34.
  • 35. 32% Spend >50 Days Annually Recreating Issues Source: Network Instruments 2008 Annual State of the Network Survey, survey of 592 network engineers
  • 36. Go Back in Time and View Recorded Activity Isolate the time period Identify the activity of interest
  • 38.
  • 39. Expert Analysis of Application Session Conditions
  • 40. Drill into Conversation to Find Delay 5-second delay
  • 41. Bringing it all together
  • 42.
  • 44. NI-DNA™ Three Unique Advantages Unified Code Set  Core application connects all products  Enhancements added to all platforms Ex. IPv6, NetFlow, VoIP, MPLS Local and Remote Visibility  Identical functionality across segments  Lower cost of ownership Multi-Instance  Supports multiple topologies  Including Gig, 10Gbe, Wireless a/b/g/n  OC-3/12, Fiber Channel, WAN  Supports multiple users  All done simultaneously or concurrently Wired to wireless. Local and remote. Data and applications.
  • 45. Capture Technology Gen2™ Capture Card  Card internally designed card for high-performance analysis  1 Gb  10 Gb Performance  Fastest real-time processing available  Full-duplex, line-rate capture  Streams directly to physical system memory  Fully integrates with NI-DNA™ technology Flexibility Gen2 Delivers  Higher port densities – up to 8 ports on gigabit links and 4 ports on 10 gigabit  Performance  SFP/XFP-based – switch copper and optical  Flexibility Adaptability  Adaptability  Filtering, processing, and analysis on the card  Flash upgradeable
  • 46. End-to-End Network Analysis Observer Console Interface Software Probe 10/100/1000 Probe Appliance WAN, Gigabit, FC, and 10 Gb Probe Appliances GigaStor for gigabit, 10 Gb, FC, and WAN Gigabit, WAN, FC, and 10 Gb Portable System
  • 47. GigaStor™ - TiVo for your network  Retrospective Network Analysis  Intelligent Forensics  Up to 48 TB storage  Line-rate capture  Local processing and analysis  Supports Gigabit, 10Gbe, WAN and Fiberchannel  Four Models  2TB 4 Drive Unit  4TB 8 Drive Unit  8TB 16 Drive Unit  12TB 16 Drive Unit
  • 48. GigaStor Expandable  Available in 16TB, 32TB or 48TB SATA config‟s  Expansion capacities up to 288TB‟s using SAS Drives  Benefits  Higher performance  Investment protection  Longer recording times
  • 49. GigaStor is Portable  First self-contained, GigaStor Portable portable forensics appliance for performing retrospective analysis  Provide back-in-time visibility of network, application, security events  Deploy unattended and Mobile appliance for performing in-the-field control like an Appliance forensics