Chapter 15: Analyzing Network Traffic 15-1 Copyright © 1998, Cisco Systems, Inc.

Презентация:



Advertisements
Похожие презентации
Chapter 16: Analyzing Network Protocols 16-1 Copyright © 1998, Cisco Systems, Inc.
Advertisements

Chapter 17: Analyzing Applications 17-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 2: Product Overview 2-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 13: Monitoring Device Availability 13-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 11: Performing Device Configuration 11-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 19: Decoding Application-Layer Protocols 19-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 8: Creating Ethernet VLANs 8-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 6: Documenting the Network Topology 6-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 23: Managing Private Network-Network Interfaces 23-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 7: Planning Ethernet VLANs 7-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 5: Configuring Devices for Management 5-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 20: Documenting the ATM Network Topology 20-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 21: Managing ATM VLANs 21-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 9: Creating Dynamic VLANs 9-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 22: Managing Virtual Channels 22-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 3: Installing CRM and CWSI on Windows NT 3-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 1: Course Introduction 1-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 7 Configure the Cisco VPN Firewall Feature for IPSec Software Client.
Транксрипт:

Chapter 15: Analyzing Network Traffic 15-1 Copyright © 1998, Cisco Systems, Inc.

15-2MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Identify why specific traffic statistics should be monitored Identify which traffic statistics to monitor for different situations Identify when to monitor specific traffic statistics Configure the SPAN port Upon completion of this chapter, you will be able to: Objectives

15-3MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Start the TrafficDirector application and add agents to it Customize and install SwitchProbe® domains Monitor traffic Display packet size and utilization Identify most active hosts and host conversations Objectives (cont.)

15-4MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Reduce downtime Identify bottlenecks and failures Plan resources Identify trends Plan network segmentation Why Monitor Traffic Statistics?

15-5MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Overall traffic patterns Peak loads Error rates Traffic flow between devices Which Traffic Statistics Should Be Monitored?

15-6MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Establishing baselines before and after any change Continuously monitor for fault identification and capacity planning Monitor for trouble location Monitor for repair verification When Should Traffic Statistics Be Monitored?

15-7MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Configuring the Catalyst® SPAN Port

15-8MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Starting TrafficDirector

15-9MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Adding Agents to TrafficDirector

15-10MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Configuring SwitchProbe Agents

15-11MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Configuring Switch Agents

15-12MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Customizing SwitchProbe Domains

15-13MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Installing Domains

15-14MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Monitoring Traffic

15-15MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Displaying Packet Size and Utilization

15-16MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Displaying Utilization over Time

15-17MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Identifying the Most Active Hosts

15-18MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Identifying Host Conversations

15-19MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Summary Identify why specific traffic statistics should be monitored Identify which traffic statistics to monitor for different situations Identify when to monitor specific traffic statistics Configuring the Catalyst SPAN port

15-20MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Summary (cont.) Start the TrafficDirector application and add agents to it Customize and install SwitchProbe domains Monitor traffic Display packet size and utilization Identify most active hosts and host conversations

15-21MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Lab Diagram Management interface on VLAN1 Monitor interface on SPAN port

15-22MCSIAnalyzing Network Traffic Copyright © 1998, Cisco Systems, Inc. Blank for IG Pagination