Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.

Презентация:



Advertisements
Похожие презентации
Chapter 15: Analyzing Network Traffic 15-1 Copyright © 1998, Cisco Systems, Inc.
Advertisements

Chapter 16: Analyzing Network Protocols 16-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 17: Analyzing Applications 17-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 19: Decoding Application-Layer Protocols 19-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Administering Events and Generating Reports Managing Events.
Chapter 13: Monitoring Device Availability 13-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 6: Documenting the Network Topology 6-1 Copyright © 1998, Cisco Systems, Inc.
Chapter 11: Performing Device Configuration 11-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Administering Events and Generating Reports Generating Reports.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports.
Chapter 23: Managing Private Network-Network Interfaces 23-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Configuring Policies.
Chapter 22: Managing Virtual Channels 22-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Behavior Analysis Reports.
Chapter 21: Managing ATM VLANs 21-1 Copyright © 1998, Cisco Systems, Inc.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Behavior Investigation.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Windows-Only Rules.
© 2002, Cisco Systems, Inc. All rights reserved. AWLF 3.0Module 7-1 © 2002, Cisco Systems, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Deployment Investigation.
Транксрипт:

Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.

18-2MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identify what trend analysis is Identify when and why to use trend analysis Identify when and why to set performance thresholds Configure data logging properties Upon completion of this chapter, you will be able to: Objectives

18-3MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configure Trend Reporter parameters Generate reports using the Trend Reporter tool Set performance thresholds Receive and interpret threshold traps Objectives (cont.)

18-4MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identifying patterns of change in network traffic for: Utilization Protocol mix Errors What Is Trend Analysis?

18-5MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Early warning of potential congestion Input to resource planning Ongoing updates to baselines Why Analyze Trends?

18-6MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Utilization on critical links Utilization by protocol Peak utilization Relative mix of protocols Errors What Should Be Analyzed?

18-7MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Daily Weekly Monthly Quarterly When Should Trends Be Analyzed?

18-8MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Early warning for: Bandwidth Errors Banned protocols Packet and protocol traps Event notification What Are Performance Thresholds?

18-9MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. How Do Thresholds Work? Rising Threshold Falling Threshold Rising Event No Event Falling Event Rearm Rising Event Rising Event Rearm Falling Event

18-10MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Bandwidth on critical links Significant increases in errors Use of banned protocols Which Thresholds Should Be Set?

18-11MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Ongoing monitoring Intermittent trouble Security monitoring When Should Performance Thresholds Be Set?

18-12MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Logging Data

18-13MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configuring Trend Reporter

18-14MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Generating Trend Reports

18-15MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Generating Trend Reports Automatically

18-16MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Setting Performance Thresholds

18-17MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Adding Traps

18-18MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Adding Traps (cont.)

18-19MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Installing New Properties

18-20MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Receiving and Interpreting Threshold Traps

18-21MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identify what trend analysis is Identify when and why to use trend analysis Identify when and why to set performance thresholds Configure data logging properties Summary

18-22MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configure Trend Reporter parameters Generate reports using the Trend Reporter tool Set performance thresholds Receive and interpret threshold traps Summary (cont.)