What is the Arkansas State Network? – Agencies, Boards, & Commissions by Arkansas code – K12 – Higher Education by Arkansas code – Others 1.

Slides:



Advertisements
Similar presentations
MyFloridaNet Presented to The State of Florida E911 Board
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
Launches Managed Network Services. Made Easy and affordable.
SafeLINC™ Fire Panel Internet Interface
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
VoIP – Security Considerations An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 3 Configuring a Router.
Enterprise Network Security Accessing the WAN Lecture week 4.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Module Summary  Ethernet cables and segments can span only a limited physical distance,
Experiences with Deploying a Global IP/MPLS Network
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Don McDaniel, DIS Network Services Division Administrator Next Generation State Network.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
BROADBAND TECHNOLOGIES & SERVICES Broadband Technologies -Core Network
CCNA Journal Sample. Index Basic Ethernet Serial Router Rip.
LAN Switching and Wireless – Chapter 2
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
LO1 Know types of Network Systems and Protocols. Wan Technologies.
© 2006 ITT Educational Services Inc. IT412 Voice and Data Integration : Unit 10 Slide 1 Unit 10 Designing and Implementing VoIP Networks - Security and.
Network Fundamentals. Network Devices Routers (Layer 3)
Your Business Challenges
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
The State of Indiana High Speed Network Presented by Edward J. Tully Director of Systems Operations Indiana Higher Education Telecommunication System.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Threaded Case Study for Phoenix, AZ. School District Sunny Slope & Sunset Elementary present by Todd Thousand, Bill Siepel, and Jeff Moore.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
Use cases Navigation Problem notification Problem analysis.
Security challenges in Smart Lighting Paul Chilton NXP Semiconductors.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Running more bandwidth for less dollars State of Arkansas Network Upgrades.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
VoIP Journal Sample. Network Sample Icons Index Basic Config Ethernet Serial Router Rip Router OSPF Rip / OSPF.
Configure and verify operation status of a device interface.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Liquid Telecom Network Security. Network Security - Availability Physical Infrastructure – PoP Site Security/Traffic Protection Logical – Device Hardening/Traffic.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
FIBER OPTIC INTERNET Tierzero has been serving businesses in Southern California since 1997.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Agency Agenda  General Introduction  Purpose of this meeting.
CENG 3331 Introduction to Telecommunications and Networks.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
LAN Switching and Wireless – Chapter 2
DYXnet Solution (Solution 1) – IP Tunnel (1M / 2M)
VSNL Sify /24 / 24 / 24 /24 Internal Network / Default gateway is
CONNECTING TO THE INTERNET
Cisco Unified Communications Management
Network Security 101 By: David Crim.
Introduction to Networking
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Your Business Opportunity
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
LAN Switching and Wireless – Chapter 2
LAN Switching and Wireless – Chapter 2
Network Monitoring System
Presentation transcript:

What is the Arkansas State Network? – Agencies, Boards, & Commissions by Arkansas code – K12 – Higher Education by Arkansas code – Others 1

What is the State Network Used for? – Data – Video – Voice (VoIP) 2

Scope of the Network – 3,067 Circuits – 2,130 addresses served – 2059 network devices monitored 3

Today’s Architecture – Frame-Relay, ATM, DSL, and Ethernet Vsat, 3G – ATM Backbone Backbone oversubscription up to 300% – High cost of transport – Internet (3 PoPs, 1 per LATA) 1.6Gbs total – Firewalls 4

The State Network is Large! 5

The State Network is Complex! 6

Future State – MPLS Invitation For Bid Status Benefits Implementation 7

Monitoring the State Network 8 End to End Monitoring – Event Notification – Performance Monitoring – Trend Monitoring – Application Response Monitoring – Utilization Monitoring – Security Monitoring

Performance Monitoring & Management Tools CA Spectrum Average daily critical alarms any duration Minute duration Minute or longer duration Reports % uptime for all devices last month CA eHealth Interface Utilization Device Performance CA NetQoS Application Performance/User Experience Allot NetEnforcer Internet Bandwidth Monitoring and Management 9

Spectrum 10

eHealth Performance Montoring 11

NetQoS ReporterAnalyzer 12

NetQoS SuperAgent 13

Allot NetEnforcer Internet Bandwidth Management 14

Security Monitoring & Management Internet Content Filtering – M86 Security CIPA Compliant Cisco MARS ( Monitoring, Analysis and Response System) Netflow, Firewall Logs, IPS logs Generates 145,000 security incidents per month IPS Located inline at all 3 PoPs Router Access & Configuration Control Monitors and logs all network device access and configuration changes 15

Internet Content Filtering 16

Cisco MARS 17

Tipping Point IPS 18

Authentication and Configuration Control System wide login credentials Strict password requirements Logging Configuration history and archive 19

End to End Monitoring 20 End to End Monitoring

Dashboard 21

Summary – DIS provides end to end Monitoring Security Performance Application 22