Manageengi: Net Wor K Moni T or I NG
Manageengi: Net Wor K Moni T or I NG
ne
Powe
ringI
Tahe
ad
Net
wor
kMoni
tor
ing
TheMus
tHaves
Network Monitoring - The Must Haves
The definition of Network monitoring no longer confines to just setting up a solution that
is capable of garnering information from the network. With the corporate world looking
at IT as that critical function having a say on day-to-day business, the choice of a
network monitoring solution must factor-in the business aspects such as increased
employee productivity and saving on infrastructure costs, besides the obvious need of
the solution having to aide the business with all the 'must-have' functionality either built-
in or by way of facilitating useful plug-ins. No two networks are same and so it is only
fair to expect a network monitoring solution to work on a 'one size fits all' principle in the
not-so-perfect IT world.
When we talk about IT directly impacting the business, it could be anything from a
seemingly simple problem like a web page taking eternity to load or a poor LAN
connectivity, to more serious ones like an important email from a prospect not making it
to your inbox, a CRM database crash, or even dealing with a mischief-maker within.
While these issues can be addressed by a variety of vertical solutions in the market,
there is nothing like the convenience of a single-point access to visualize the entire
network to manage the fault, performance, configuration, and security or the other
resources within. While a wide range of IT functionality fit into the 'network monitoring'
umbrella, it is important to look for the 'must-haves' to help align your IT with the
business goals. . It serves to keep in mind that to an administrator, network
performance, security, fault management, and reliability are not mutually exclusive. A
solution that serves all of these on one platter, keeps the administrator and his network
happy! Anything more is a welcome bonus!
The must-haves
Let us take a closer look at the main concerns of an administrator and what data he will
mine for in the minutiae of information gathered by the solution :
• Automatic Discovery
• Smart Classification & Mapping
• Indepth Performance Monitoring
• Security Management
• Intelligent Alerting
• Solution's Scalability
Automatic Discovery
With the corporate networks getting more complex due to huge and
distributed infrastructure, automatic discovery leaves little room for manual errors.
Constant upgrades and additions to the network is nothing new and this calls for a
provision to initiate a discovery on demand too. So, a solution must be capable of
automating the discovery and it must also accommodate a forced discovery.
1
In-depth Performance Monitoring
Security Management
A secured network is a good, healthy network. The challenges here are huge as the
administrator cannot make the slightest compromise. Like any other aspect of network
monitoring, 'prevention is better than cure' is the motto here too. While intrusion
detection, intrusion prevention etc may not usually be a part of a network monitoring
solution, support for plugging-in even a third-party utility augurs well with the network
security administrators. The areas an administrator focuses on to secure his network
starts at keeping a close tab on the system log messages including Windows Event Logs,
Syslogs on Unix-based devices, Firewall logs etc.
Intelligent Alerting
Any good network monitoring solution must have an intelligent alerting mechanism using
which the IT team can productively collaborate and work efficiently. As we discussed
earlier, any component or a resource in a network can play truant and pull down the
network. A delay in preventing a fault from occurring, or repairing a damage in a lesser
turn-around time requires a fool-proof alerting mechanism where the concerned
engineer gets to know the source of the problem by way of a meaningful alert.
All said and done, a network monitoring solution must not take a beating and crash or it
must do so with a warning at the least! A server on which you host the monitoring
solution, or the monitoring application itself is as susceptible as the other resources on
the network. Having a redundant server take over and provide un-interrupted monitoring
service is an administrator's dream.
OpManager provides various options as part of its automatic discovery feature. Further,
the devices are automatically classified based on the category into Routers, Switches,
Servers etc. OpManager relies on the standard SNMP / ICMP pings to perform deep
discovery. The discovery options include the following:
2
IP Range-based Discovery
CIDR Discovery
File-based Discovery
On-demand Discovery
The discovered devices are grouped by category for easy monitoring. Besides,
OpManager allows you to create your own views to group the devices logically and
manage them from one place. This option helps you manage the devices under each
geographical location and assign authorized access to the business views.
3
Monitoring almost every resource on the network - View demo
Bandwidth monitoring
4
Securing your network with OpManager - View demo
With OpManager, you will be the first to know of any security threat to your network. Be
it an unauthorized user activity, or an outside intrusion, OpManager catches it all.
The network security administrators are left to face many threats to the network security
from the external world and also from within. The Firewall security events such as
intrusion detection, virus attacks, denial of service attack, etc., anomalous behaviors,
employee web activities etc, provide a wealth of information on potential threats. Even a
small compromise can prove costly to the business. Ability to visualize enterprise
security and detect security compromises is a essential component of a network
monitoring solution.
Syslogs
Firewall logs
The network security administrators are left to face many threats to the
network security from the external world and also from within. The
Firewall security events such as intrusion detection, virus attacks, denial of
service attack, etc., anomalous behaviors, employee web activities etc,
provide a wealth of information on potential threats. Even a small
compromise can prove costly to the business. Ability to visualize
enterprise security and detect security compromises is a essential
component of a network monitoring solution.
Netflow
5
Alerting - Pull and Push modes
Thresholds-based Alerting
Notifying Alerts
6
Scalable, Robust Application Architecture
Summary
7
ZOHO Cor
por
ati
on,
4900HopyardRd,
Suite310Pleasanton,CA 94588,USA
Phone:+1-925-924-9500
Fax:+1-925-924-9600
ManageEngi
ne sal
es@manageengi ne.
com
Powe
ringI
Tahe
ad http:/
/ww manageengi
www. ne.com
opmanager
-suppor
t@manageengi
ne.
com,ht
tp:
//demo.
opmanager
.com