Download presentation
Presentation is loading. Please wait.
Published byLorraine Collins Modified over 7 years ago
1
Практика применения системы аналитики поведения приложений ExtremeAnalytics в сети. Как простые данные могут ускорить решение проблем, повысить уровень безопасности и прозрачности сети.
2
Applications everywhere
How users see applications: How traditional switches see applications: Port 80 Port 443 ©2013 Enterasys Networks, Inc.
3
Experience from our customers
4
Business Analytics Real time monitoring of business application licenses usage. No one used specific VM for three weeks => why is the VM running. Decommissioned server was returned to the network by mistake. On the customer event with 50 people, one lady streamed over 1.6GB per day.
5
Security Analytics Users were using printers as network share.
Pervasive L7 visibility in network as source to Qradar SIEM. User was tunnelling traffic out over the DNS port = not DNS protocol.
6
Network troubleshooting
Detected wrong ISP routing config. Some subnets were routed to the customer router instead of being routed to the internet. Customer blamed the bad WiFi and wanted to replace WiFi system. The WiFi was working fine, but the application was wrong designed = very high amount of transactions with small aggregation. Configured to monitor the status of VPN service. (amount of data transferred).
7
Network troubleshooting
Network and Application response times as key troubleshooting method of current issues. Periodical long response times at storage showed issues with backups of PACS. Virtualization groups were wrong configured = one backend server was migrated to different DC.
8
Network troubleshooting
The server got to the state when CRL update consumed all uplink bandwidth (port 443). Internet traffic at the customer demonstration event (over 50 people) was heavily impacted by slow DNS response times.
9
How it works
10
Architecture - components
Management Center Sensor / switch / AP NetFlow FirstN Mirror Aggregated Flow Data Application Flow and Context data NetFlow DPI Analytics Engine
11
Network & Application Response Time
Syn Network Response Time Drivers / OS Server Syn+Ack Client Ack request Application Response Time Application is involved response
12
Demonstration
13
ExtremeAnalytics in VM world
NetFlow FirstN Mirror Mirroring to GRE Application Flow and Context data NetFlow DPI Analytics Engine Ixia – TAP-VM
14
The ExtremeAnalytics Difference
Contextual information beyond the application user, role, location, time, device & more Application and network performance tracking Open & customizable fingerprints Over 13,000 fingerprints for over 7,000 applications Pervasive across the entire network infrastructure Port independent application decoding – true DPI at scale Single architecture for edge, distribution, core, data center, perimeter Tbit/s speeds with no switch performance impact with scalability to millions of flows
15
Спасибо
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.