hp automated network management

77
©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Session ID: BTOT-WE- 0900/3 Twitter hashtag #HPSWU

Upload: hp-software-solutions

Post on 22-Nov-2014

2.499 views

Category:

Documents


10 download

DESCRIPTION

Best practices for managing a Business-Critical Network with Automated Network Management (ANM)

TRANSCRIPT

Page 1: HP Automated Network Management

copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice

Session ID BTOT-WE-09003 Twitter hashtag HPSWU

copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice

Ashish Kuthiala ndash Director Product MarketingNetwork Management Center

HP Automated Network Management

Best Practices for Managing a Business-Critical Network

Agendabull The State of the Industry

bull Why ANM

bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize

bull Where to go for more information

Hi-profile network outages underscore the importance of network management

2008 2009

Average cost of downtime is $70000 per minute

8-Day IT Outage Would Cripple Most Companies

Sources Aberdeen Gartner (2008)

bull Alert Floods

bull Unnecessary escalations

Incident Management

What is Driving the Need for Automated Network Management

bull Manual and error-prone change

bull No audit trails

Change amp Compliance Management

bull Lack of processes for complex tasks such as policy compliance

Task Automation

bull Inconsistent management of physical and virtual infrastructure

Virtualization Management

75 of IT costs are

labor 1

40 of problems found by

customers 2

ANM can save 50+3

Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 2: HP Automated Network Management

copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice

Ashish Kuthiala ndash Director Product MarketingNetwork Management Center

HP Automated Network Management

Best Practices for Managing a Business-Critical Network

Agendabull The State of the Industry

bull Why ANM

bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize

bull Where to go for more information

Hi-profile network outages underscore the importance of network management

2008 2009

Average cost of downtime is $70000 per minute

8-Day IT Outage Would Cripple Most Companies

Sources Aberdeen Gartner (2008)

bull Alert Floods

bull Unnecessary escalations

Incident Management

What is Driving the Need for Automated Network Management

bull Manual and error-prone change

bull No audit trails

Change amp Compliance Management

bull Lack of processes for complex tasks such as policy compliance

Task Automation

bull Inconsistent management of physical and virtual infrastructure

Virtualization Management

75 of IT costs are

labor 1

40 of problems found by

customers 2

ANM can save 50+3

Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 3: HP Automated Network Management

Agendabull The State of the Industry

bull Why ANM

bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize

bull Where to go for more information

Hi-profile network outages underscore the importance of network management

2008 2009

Average cost of downtime is $70000 per minute

8-Day IT Outage Would Cripple Most Companies

Sources Aberdeen Gartner (2008)

bull Alert Floods

bull Unnecessary escalations

Incident Management

What is Driving the Need for Automated Network Management

bull Manual and error-prone change

bull No audit trails

Change amp Compliance Management

bull Lack of processes for complex tasks such as policy compliance

Task Automation

bull Inconsistent management of physical and virtual infrastructure

Virtualization Management

75 of IT costs are

labor 1

40 of problems found by

customers 2

ANM can save 50+3

Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 4: HP Automated Network Management

Hi-profile network outages underscore the importance of network management

2008 2009

Average cost of downtime is $70000 per minute

8-Day IT Outage Would Cripple Most Companies

Sources Aberdeen Gartner (2008)

bull Alert Floods

bull Unnecessary escalations

Incident Management

What is Driving the Need for Automated Network Management

bull Manual and error-prone change

bull No audit trails

Change amp Compliance Management

bull Lack of processes for complex tasks such as policy compliance

Task Automation

bull Inconsistent management of physical and virtual infrastructure

Virtualization Management

75 of IT costs are

labor 1

40 of problems found by

customers 2

ANM can save 50+3

Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 5: HP Automated Network Management

bull Alert Floods

bull Unnecessary escalations

Incident Management

What is Driving the Need for Automated Network Management

bull Manual and error-prone change

bull No audit trails

Change amp Compliance Management

bull Lack of processes for complex tasks such as policy compliance

Task Automation

bull Inconsistent management of physical and virtual infrastructure

Virtualization Management

75 of IT costs are

labor 1

40 of problems found by

customers 2

ANM can save 50+3

Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 6: HP Automated Network Management

Whatrsquos needed is an intelligent and integrated approach to managing networks

Legacy Approaches arenrsquot Enough

Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod

manual rarr errors disruption and cost

Existing disparate network management products stop short of providing a solution

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 7: HP Automated Network Management

iSPI Perf Traffic

Network Node Manager i

Network Automation

iSPI Perf Metrics

iSPI Perf QA

iSPI NET

Automated Network Management (ANM) Complete control of your infrastructure

NNM iSPI for Traffic

NNM iSPI Performance

Traffic Overview

Fault and availability monitoringImprove network availability with a model based network management solution

Engineering ToolsetAutomate common network engineeringand network tool administrators tasks

Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR

Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 8: HP Automated Network Management

Complete control of your infrastructure

ANM Capabilities

Dynamic discovery for model based management

Snapshot and store device configuration information

Real-time change

Auto-discover network devices and capture

audit trail of all device changes

Single poller for fault availability and performance monitoring

Contextual launch from incident to performance reports

Navigation between Metric QA and Traffic data

Monitor network device and interface

metrics

Unified Fault amp

Performance Monitoring

Configuration and software changes

Enforce best practices and security standards

Easily remediate violations

Automate changes and enforce audit and report on compliance

Deploy Changes amp Maintain

Compliance Workflow Automation

Node Discovery amp Configuration

Detection

Automate the process of capturing diagnostic information

Trap analytic capabilities

Export discovered topology into Visio

Automate common tasks and processes for

network engineers

Diagnostic Automation

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 9: HP Automated Network Management

Best Practice Cycle

Discover

Organize

Analyze

Configure

Optimize

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 10: HP Automated Network Management

Discovery

10

Discover

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 11: HP Automated Network Management

Before You Start Discovery

ndash How many nodes are supported by your NNMi licenses

ndash How do you want to use these licenses network infrastructure only servers printers hellip

ndash How many geographic areas do you want to poll Does a centralized poller meet your needs

ndash Whatrsquos the general addressing scheme for the network

ndash How much of this network is SNMPV2 how much is SNMPV3

ndash How much is IPV4 how much is IPV6

ndash Where should the management station connect into the network for best visibility

ndash Set up subnet-local DNS or local hosts

Discover

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 12: HP Automated Network Management

Whatrsquos on my Network Discovery

ndash NNMi discovery is controlled by rules

ndash IP Address ranges

ndash Types of Devices

ndash Cards amp Ports

Discover

bull Watch out for DNS performancebull Be consistent when identifying devices

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 13: HP Automated Network Management

13

Global and Single-Server Discovery

ndash Great single NNMi server scalability bull Up to 25000 nodes

bull 1 MILLION discovered interfaces and 200000 polled

bull Unmatched TCO

ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)

bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)

bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM

bull Efficient communication SSL with 3 ports allows polling thru firewalls

Discover

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 14: HP Automated Network Management

Setup SNMPndash Supports SNMP V1 V2 amp V3

ndash Set appropriate timeouts for expected response time

ndash Can global or range-specific

ndash Coordinates with Network Automation

Discover

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 15: HP Automated Network Management

Setup An Auto-Discovery Rule

Rule specific Ping Sweep

Range with wildcard

Priority for applying rules

Discover

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 16: HP Automated Network Management

Setup Carrier Connections

ndash Devices that are on either side of a Service Providers network or WAN

ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31

Discover

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 17: HP Automated Network Management

Setup Seed Nodesndash You must specify seed nodes

to start the discovery process

ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time

ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working

Discover

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 18: HP Automated Network Management

Make Discovery Faster

ndash IssueminusDiscovery makes a lot of DNS calls

minusWe want to avoid slow DNS response and minimize DNS network traffic

ndash OptionsminusRun a local DNS mirror on the management system or on a system

on the same subnet

minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)

Discover

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 19: HP Automated Network Management

Discovery Results

ndash Routers and Switches

ndash Containment hierarchy of nodes (CPU memory interfaces etc)

ndash L2 and L3 connections

ndash VLANS

ndash HSRPVRRP (NNMi Advanced)

ndash Port Aggregation (NNMi Advanced)

ndash Other SNMP devices (if configured)

ndash Other non-SNMP devices (if configured)

ndash Virtual Machine Hosts and Guests

Discover

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 20: HP Automated Network Management

View Your Discovery Results

Topology Maps

Inventory

Troubleshooting Views

Discover

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 21: HP Automated Network Management

NNMi Advanced Features

ndash HSRPVRRP

ndash Port Aggregation

ndash RAMS StationsIntegration

Discover

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 22: HP Automated Network Management

Before You Do Anything Else

ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA

bull Import NNMi devices with nnmimportbat

bull Discover device drivers

bull Select all devices in Inventory

bull Back up the device configurations

Discover

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 23: HP Automated Network Management

Generalndash Nothing is discovered by default

ndash Spiral Discovery never ends

ndash Discovery includes inventory discovery and layer 2 connectivity discovery

ndash Seeds start the discovery or could be used to load a complete set of nodes

ndash Back up your devices before proceeding

Basic Steps1 Configure SNMP community strings

2 Configure discovery rules with IP addresses amp OIDs

3 Configure interface discovery rules

4 Specify seed nodes

Discover

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 24: HP Automated Network Management

Getting Organized

HP Confidential24

Organize

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 25: HP Automated Network Management

Organize

Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy

Organize

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 26: HP Automated Network Management

Node Group Hierarchies

bull Group forbull Visualizationbull Filteringbull Polling amp management policies

Organize

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 27: HP Automated Network Management

Grouping for an OperatorOrganize

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 28: HP Automated Network Management

NNMi Group MembershipOrganize

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 29: HP Automated Network Management

Interface GroupsOrganize

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 30: HP Automated Network Management

Policy Groups

ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation

bull Build policy-appropriate groups

Organize

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 31: HP Automated Network Management

Network AutomationGroup Membership

Organize

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 32: HP Automated Network Management

Network AutomationGroup Membership

Organize

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 33: HP Automated Network Management

Configuration

Configure

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 34: HP Automated Network Management

Configure

Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement

Configure

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 35: HP Automated Network Management

Node Group Visualizationndash All customizations are done

in Node Group Map Settings in the Configuration workspace

Remember these node groups

Configure

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 36: HP Automated Network Management

Customizing Node Group Maps

L2 L3 or None

If therersquos a serious problem on a node make that nodersquos icon bigger

Blank or an existing interface group

One of the existing node groups

Allow connections from nodes to node groups

Order in the Topology Map workspace

Who can save map layout changes

Default refresh time = NN minutes

Configure

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 37: HP Automated Network Management

Node Group Background ImagesConfigure

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 38: HP Automated Network Management

Background Imagesndash NNMi includes maps

minus OOB maps

bullhttphostnameportnnmbg

minus User-supplied maps

bullhttphostnameportnnmdocsimages

Configure

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 39: HP Automated Network Management

User-Provided MapsConfigure

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 40: HP Automated Network Management

Preserving User Layoutsndash Role-based permissions must be set by an

Administrator for each node group

ndash An operator simply presses the Save Layout button

Configure

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 41: HP Automated Network Management

Enable Incidents amp Notification

ndash Decide which incidents should be passed on to operators

ndash Enable schedules amp remote notification with AlarmPoint

ndash Enable integration into OM or 3rd party apps

Configure

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 42: HP Automated Network Management

Incident Processing Options

ndash Custom correlation rules

ndash De-duplication

ndash Suppression

Configure

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 43: HP Automated Network Management

Network Monitoring Fault amp Performance Metrics Polling

bull Set up appropriate fault polling policies for each of your node and interface groups

bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities

bull NNMi includes Component Health polling

Configure

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 44: HP Automated Network Management

Network Monitoring Custom Polling

bull Configure ldquocustomrdquo polling for network devices

bull Good candidatesbull Power suppliesbull Environmental monitors

Configure

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 45: HP Automated Network Management

Network Monitoring Performance Metrics Thresholds

ndash Configure high and low thresholds for device and interface metrics

ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools

Configure

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 46: HP Automated Network Management

WAN Monitoring

46

ndash Network device configuration

LosAngeles

bull Most of the configuration is done in the routers

bull The QA SPI will discover the information in these configurations

Configure

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 47: HP Automated Network Management

Traffic Monitoring Configuration

Master CollectorNNMi

Leaf Collectors

Network Devices

Reporting

METRICS TRAFFIC

Configure

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 48: HP Automated Network Management

Configure Traffic Master amp Leaf Collectors

ndash Configure Master Leaf and collection parameters

Configure

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 49: HP Automated Network Management

Enable Flow Monitoring

ndash Use Network Automation to configure Traffic flow monitoring

For devices specify Leaf Collectors

For each monitored interface enable flow info

Configure

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 50: HP Automated Network Management

Configure Policy Compliance

Checks forbull Security settings such as ACLs

bull Console telnet ssh and loginpassword rules

bull Checks for devices with vulnerable versions of IOS

bull Downloads security policies via a subscription model

Configure

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 51: HP Automated Network Management

Configure Policy ComplianceConfigure

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 52: HP Automated Network Management

Configure Policy Compliance Software Versions

Configure

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 53: HP Automated Network Management

Analyze

Analyze

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 54: HP Automated Network Management

Analyze

ndash Whatrsquos there

ndash Whatrsquos working

ndash Whatrsquos broken

ndash What are the trends

ndash Are there configurationsecurity issues

Analyze

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 55: HP Automated Network Management

High-Level Views of Status

Node Group Status

Network Performance and Compliance Gauges

Incident Browser

Inventory Views

Analyze

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 56: HP Automated Network Management

Topology Analysis

Use L3 L2 and Path views to analyze topology and connectivity issues

Analyze

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 57: HP Automated Network Management

57

VMware Hosts and Virtual Machines

L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs

Non-SNMP VM

SNMP VMESX host

Analyze

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 58: HP Automated Network Management

58

Find Attached Switch Port

Non-SNMP VM

SNMP VM

Analyze

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 59: HP Automated Network Management

59

Export Topology to VisioAnalyze

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 60: HP Automated Network Management

Network Link Discovery Switches amp APs

ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip

hellipbut suspicious in an L2 view

Analyze

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 61: HP Automated Network Management

NNMi Root-Cause

ndash NNMi does a lot of the hard work for you

ndash NNMirsquos conclusions are aided by the polling policies that you configured

ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA

ndash Your Incident Processing rules customize the results

Analyze

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 62: HP Automated Network Management

62

Real-Time Line GraphsActions -gt Graphs

ndash Graphs provided for bull Nodes

bull Interfaces

bull Incidents

bull Custom Polled Instances

bull MIB Expressions

ndash Some Line Graphs are specific to a vendor or object type

ndash Accessible from tables or maps

ndash Test MIB Expression with Graph

Analyze

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 63: HP Automated Network Management

63

Graph of Interface Utilization

ndash If node selected all interfaces will be included on graph ndash up to 20

Analyze

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 64: HP Automated Network Management

View Performance Metrics

Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices

bull Start with a ldquoTop Nrdquo report to find busiest devices

Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards

bull Again start with a ldquoTop Nrdquo report

Analyze

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 65: HP Automated Network Management

Dissect the Network Traffic

ndash Use Performance Metrics for volume and then Performance Traffic for content analysis

ndash Analyze by source destination and application

Analyze

Email

Web

Bittorrent

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 66: HP Automated Network Management

Traffic Top N Optionsndash Interface ID

ndash Interface Name

ndash Qualified Interface Name

ndash Node Name

ndash Flow Version

ndash IP Protocol

ndash IP TOS

ndash Application Name

ndash Source Port

ndash Destination Port

ndash Source Host Name

ndash Destination Host Name

ndash Src Host Application amp Destination Host

ndash Destination Host amp Application

ndash Collector Name

Analyze

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 67: HP Automated Network Management

Monitor WAN Performancewith QA SPI

67

Network Performance between sites

LatencyLossJitter

LosAngeles Bejing

Analyze

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 68: HP Automated Network Management

Monitor Custom Polled Info

Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity

Analyze

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 69: HP Automated Network Management

Look for Patterns

Use Calendar Line Chart and Heat Chart

Analyze

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 70: HP Automated Network Management

Check for Policy Compliance

ndash Understand which devices in compliance with your security content amp performance policies

ndash Prepare amp deploy corrective policies

Analyze

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 71: HP Automated Network Management

Optimize (Content Management)

Optimize

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 72: HP Automated Network Management

Optimize

ndash Improve the performance amp availability of business-critical services

ndash Configure infrastructure for real-time applications such as voice amp video

ndash Identify the most troublesome devices and most frequent events

ndash Drive down costs

Optimize

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 73: HP Automated Network Management

Tools for Optimization

Metrics Dashboard

Performance Charts with Volume amp Errors

Optimize

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 74: HP Automated Network Management

Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts

bull Find the bandwidth hogs

bull Identify business vs non-business traffic

bull Identify when abuses are happening

bull Use tools like Heat Chart to find recurring patterns

bull Drill down into specific ports and addresses

Optimize

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 75: HP Automated Network Management

Tools for Optimization

ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic

minusDefine permitted source destination port and other attributes

minusCreate corresponding Access Control Lists

Optimize

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 76: HP Automated Network Management

Where to go for more information

ndash Add items Here

76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77
Page 77: HP Automated Network Management

Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity

  • Slide 1
  • HP Automated Network Management
  • Agenda
  • Hi-profile network outages underscore the importance of network
  • What is Driving the Need for Automated Network Management
  • Legacy Approaches arenrsquot Enough
  • Slide 7
  • ANM Capabilities
  • Best Practice Cycle
  • Discovery
  • Before You Start Discovery
  • Whatrsquos on my Network Discovery
  • Global and Single-Server Discovery
  • Setup SNMP
  • Setup An Auto-Discovery Rule
  • Setup Carrier Connections
  • Setup Seed Nodes
  • Make Discovery Faster
  • Discovery Results
  • View Your Discovery Results
  • NNMi Advanced Features
  • Before You Do Anything Else
  • Discovery Summary
  • Getting Organized
  • Organize
  • Node Group Hierarchies
  • Grouping for an Operator
  • NNMi Group Membership
  • Interface Groups
  • Policy Groups
  • Network Automation Group Membership
  • Network Automation Group Membership (2)
  • Configuration
  • Configure
  • Node Group Visualization
  • Customizing Node Group Maps
  • Node Group Background Images
  • Background Images
  • User-Provided Maps
  • Preserving User Layouts
  • Enable Incidents amp Notification
  • Incident Processing Options
  • Network Monitoring Fault amp Performance Metrics Polling
  • Network Monitoring Custom Polling
  • Network Monitoring Performance Metrics Thresholds
  • WAN Monitoring
  • Traffic Monitoring Configuration
  • Configure Traffic Master amp Leaf Collectors
  • Enable Flow Monitoring
  • Configure Policy Compliance
  • Configure Policy Compliance (2)
  • Configure Policy Compliance Software Versions
  • Analyze
  • Analyze (2)
  • High-Level Views of Status
  • Topology Analysis
  • VMware Hosts and Virtual Machines
  • Find Attached Switch Port
  • Export Topology to Visio
  • Network Link Discovery Switches amp APs
  • NNMi Root-Cause
  • Real-Time Line Graphs
  • Graph of Interface Utilization
  • View Performance Metrics
  • Dissect the Network Traffic
  • Traffic Top N Options
  • Monitor WAN Performance with QA SPI
  • Monitor Custom Polled Info
  • Look for Patterns
  • Check for Policy Compliance
  • Optimize (Content Management)
  • Optimize
  • Tools for Optimization
  • Tools for Optimization (2)
  • Tools for Optimization (3)
  • Where to go for more information
  • Slide 77