Upload
hp-software-solutions
View
2.476
Download
10
Embed Size (px)
DESCRIPTION
Best practices for managing a Business-Critical Network with Automated Network Management (ANM)
Citation preview
copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice
Session ID BTOT-WE-09003 Twitter hashtag HPSWU
copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice
Ashish Kuthiala ndash Director Product MarketingNetwork Management Center
HP Automated Network Management
Best Practices for Managing a Business-Critical Network
Agendabull The State of the Industry
bull Why ANM
bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize
bull Where to go for more information
Hi-profile network outages underscore the importance of network management
2008 2009
Average cost of downtime is $70000 per minute
8-Day IT Outage Would Cripple Most Companies
Sources Aberdeen Gartner (2008)
bull Alert Floods
bull Unnecessary escalations
Incident Management
What is Driving the Need for Automated Network Management
bull Manual and error-prone change
bull No audit trails
Change amp Compliance Management
bull Lack of processes for complex tasks such as policy compliance
Task Automation
bull Inconsistent management of physical and virtual infrastructure
Virtualization Management
75 of IT costs are
labor 1
40 of problems found by
customers 2
ANM can save 50+3
Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
copy2010 Hewlett-Packard Development Company LP The information contained herein is subject to change without notice
Ashish Kuthiala ndash Director Product MarketingNetwork Management Center
HP Automated Network Management
Best Practices for Managing a Business-Critical Network
Agendabull The State of the Industry
bull Why ANM
bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize
bull Where to go for more information
Hi-profile network outages underscore the importance of network management
2008 2009
Average cost of downtime is $70000 per minute
8-Day IT Outage Would Cripple Most Companies
Sources Aberdeen Gartner (2008)
bull Alert Floods
bull Unnecessary escalations
Incident Management
What is Driving the Need for Automated Network Management
bull Manual and error-prone change
bull No audit trails
Change amp Compliance Management
bull Lack of processes for complex tasks such as policy compliance
Task Automation
bull Inconsistent management of physical and virtual infrastructure
Virtualization Management
75 of IT costs are
labor 1
40 of problems found by
customers 2
ANM can save 50+3
Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Agendabull The State of the Industry
bull Why ANM
bull A Practical Approachbull Discoverbull Organizebull Configurebull Analyzebull Optimize
bull Where to go for more information
Hi-profile network outages underscore the importance of network management
2008 2009
Average cost of downtime is $70000 per minute
8-Day IT Outage Would Cripple Most Companies
Sources Aberdeen Gartner (2008)
bull Alert Floods
bull Unnecessary escalations
Incident Management
What is Driving the Need for Automated Network Management
bull Manual and error-prone change
bull No audit trails
Change amp Compliance Management
bull Lack of processes for complex tasks such as policy compliance
Task Automation
bull Inconsistent management of physical and virtual infrastructure
Virtualization Management
75 of IT costs are
labor 1
40 of problems found by
customers 2
ANM can save 50+3
Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Hi-profile network outages underscore the importance of network management
2008 2009
Average cost of downtime is $70000 per minute
8-Day IT Outage Would Cripple Most Companies
Sources Aberdeen Gartner (2008)
bull Alert Floods
bull Unnecessary escalations
Incident Management
What is Driving the Need for Automated Network Management
bull Manual and error-prone change
bull No audit trails
Change amp Compliance Management
bull Lack of processes for complex tasks such as policy compliance
Task Automation
bull Inconsistent management of physical and virtual infrastructure
Virtualization Management
75 of IT costs are
labor 1
40 of problems found by
customers 2
ANM can save 50+3
Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
bull Alert Floods
bull Unnecessary escalations
Incident Management
What is Driving the Need for Automated Network Management
bull Manual and error-prone change
bull No audit trails
Change amp Compliance Management
bull Lack of processes for complex tasks such as policy compliance
Task Automation
bull Inconsistent management of physical and virtual infrastructure
Virtualization Management
75 of IT costs are
labor 1
40 of problems found by
customers 2
ANM can save 50+3
Sources 1 Forrester 2Aberdeen 3case studies at hpcomgoANLM
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Whatrsquos needed is an intelligent and integrated approach to managing networks
Legacy Approaches arenrsquot Enough
Managing Networks Today Missing automation ineffective point tools lack of integrations silorsquod
manual rarr errors disruption and cost
Existing disparate network management products stop short of providing a solution
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
iSPI Perf Traffic
Network Node Manager i
Network Automation
iSPI Perf Metrics
iSPI Perf QA
iSPI NET
Automated Network Management (ANM) Complete control of your infrastructure
NNM iSPI for Traffic
NNM iSPI Performance
Traffic Overview
Fault and availability monitoringImprove network availability with a model based network management solution
Engineering ToolsetAutomate common network engineeringand network tool administrators tasks
Performance monitoringIncrease operator productivity and efficiencyand reduced MTTR
Change configuration amp complianceComprehensive network automation spanning tasks from provisioning and change mgmt to compliance enforcement and reporting
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Complete control of your infrastructure
ANM Capabilities
Dynamic discovery for model based management
Snapshot and store device configuration information
Real-time change
Auto-discover network devices and capture
audit trail of all device changes
Single poller for fault availability and performance monitoring
Contextual launch from incident to performance reports
Navigation between Metric QA and Traffic data
Monitor network device and interface
metrics
Unified Fault amp
Performance Monitoring
Configuration and software changes
Enforce best practices and security standards
Easily remediate violations
Automate changes and enforce audit and report on compliance
Deploy Changes amp Maintain
Compliance Workflow Automation
Node Discovery amp Configuration
Detection
Automate the process of capturing diagnostic information
Trap analytic capabilities
Export discovered topology into Visio
Automate common tasks and processes for
network engineers
Diagnostic Automation
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Best Practice Cycle
Discover
Organize
Analyze
Configure
Optimize
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Discovery
10
Discover
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Before You Start Discovery
ndash How many nodes are supported by your NNMi licenses
ndash How do you want to use these licenses network infrastructure only servers printers hellip
ndash How many geographic areas do you want to poll Does a centralized poller meet your needs
ndash Whatrsquos the general addressing scheme for the network
ndash How much of this network is SNMPV2 how much is SNMPV3
ndash How much is IPV4 how much is IPV6
ndash Where should the management station connect into the network for best visibility
ndash Set up subnet-local DNS or local hosts
Discover
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Whatrsquos on my Network Discovery
ndash NNMi discovery is controlled by rules
ndash IP Address ranges
ndash Types of Devices
ndash Cards amp Ports
Discover
bull Watch out for DNS performancebull Be consistent when identifying devices
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
13
Global and Single-Server Discovery
ndash Great single NNMi server scalability bull Up to 25000 nodes
bull 1 MILLION discovered interfaces and 200000 polled
bull Unmatched TCO
ndash GlobalRegional management bull Available to meet hierarchical management structure requirements (regional level requiring different scopes and survivability for independent management)
bull Can be used to avoid polling over expensive WAN links (ie WW distributed polling)
bull To meet needs for consolidated view of extremely large enterprises can scale up to ~65000 nodes in the GNM
bull Efficient communication SSL with 3 ports allows polling thru firewalls
Discover
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Setup SNMPndash Supports SNMP V1 V2 amp V3
ndash Set appropriate timeouts for expected response time
ndash Can global or range-specific
ndash Coordinates with Network Automation
Discover
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Setup An Auto-Discovery Rule
Rule specific Ping Sweep
Range with wildcard
Priority for applying rules
Discover
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Setup Carrier Connections
ndash Devices that are on either side of a Service Providers network or WAN
ndash Subnet Connection Rules for subnets with prefix lengths between 28 and 31
Discover
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Setup Seed Nodesndash You must specify seed nodes
to start the discovery process
ndash Best practice Start with your management systemrsquos gateway router and expand outward 1 ldquoringrdquo at a time
ndash Discovery of a seed happens immediately You will know right away if the SNMP communication is working
Discover
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Make Discovery Faster
ndash IssueminusDiscovery makes a lot of DNS calls
minusWe want to avoid slow DNS response and minimize DNS network traffic
ndash OptionsminusRun a local DNS mirror on the management system or on a system
on the same subnet
minusExclude ldquoproblemrdquo hostnames and addressesbull hostNoLookupconf (FQDN or wildcards)bull ipNoLookupconf (IP addresses or wildcards)
Discover
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Discovery Results
ndash Routers and Switches
ndash Containment hierarchy of nodes (CPU memory interfaces etc)
ndash L2 and L3 connections
ndash VLANS
ndash HSRPVRRP (NNMi Advanced)
ndash Port Aggregation (NNMi Advanced)
ndash Other SNMP devices (if configured)
ndash Other non-SNMP devices (if configured)
ndash Virtual Machine Hosts and Guests
Discover
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
View Your Discovery Results
Topology Maps
Inventory
Troubleshooting Views
Discover
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
NNMi Advanced Features
ndash HSRPVRRP
ndash Port Aggregation
ndash RAMS StationsIntegration
Discover
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Before You Do Anything Else
ndash Back up your network devices with a Network Automation Snapshotbull Set up login rules in NA
bull Import NNMi devices with nnmimportbat
bull Discover device drivers
bull Select all devices in Inventory
bull Back up the device configurations
Discover
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Generalndash Nothing is discovered by default
ndash Spiral Discovery never ends
ndash Discovery includes inventory discovery and layer 2 connectivity discovery
ndash Seeds start the discovery or could be used to load a complete set of nodes
ndash Back up your devices before proceeding
Basic Steps1 Configure SNMP community strings
2 Configure discovery rules with IP addresses amp OIDs
3 Configure interface discovery rules
4 Specify seed nodes
Discover
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Getting Organized
HP Confidential24
Organize
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Organize
Group objects bybull Business Functionalitybull Geographic locationbull Management responsibilitybull Security requirementsbull Device typebull Backup and Policy requirementsbull Polling policy
Organize
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Node Group Hierarchies
bull Group forbull Visualizationbull Filteringbull Polling amp management policies
Organize
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Grouping for an OperatorOrganize
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
NNMi Group MembershipOrganize
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Interface GroupsOrganize
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Policy Groups
ndash Synchronize with NNMibull Import discovered node list from NNMi into HP Network Automation
bull Build policy-appropriate groups
Organize
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network AutomationGroup Membership
Organize
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network AutomationGroup Membership
Organize
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configuration
Configure
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configure
Configuration StepsbullVisualization of managed groupsbullFault monitoringbullIncident customizationbullPerformance monitoringbullPolicy monitoring amp enforcement
Configure
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Node Group Visualizationndash All customizations are done
in Node Group Map Settings in the Configuration workspace
Remember these node groups
Configure
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Customizing Node Group Maps
L2 L3 or None
If therersquos a serious problem on a node make that nodersquos icon bigger
Blank or an existing interface group
One of the existing node groups
Allow connections from nodes to node groups
Order in the Topology Map workspace
Who can save map layout changes
Default refresh time = NN minutes
Configure
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Node Group Background ImagesConfigure
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Background Imagesndash NNMi includes maps
minus OOB maps
bullhttphostnameportnnmbg
minus User-supplied maps
bullhttphostnameportnnmdocsimages
Configure
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
User-Provided MapsConfigure
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Preserving User Layoutsndash Role-based permissions must be set by an
Administrator for each node group
ndash An operator simply presses the Save Layout button
Configure
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Enable Incidents amp Notification
ndash Decide which incidents should be passed on to operators
ndash Enable schedules amp remote notification with AlarmPoint
ndash Enable integration into OM or 3rd party apps
Configure
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Incident Processing Options
ndash Custom correlation rules
ndash De-duplication
ndash Suppression
Configure
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network Monitoring Fault amp Performance Metrics Polling
bull Set up appropriate fault polling policies for each of your node and interface groups
bull Policies may be based onbull Importancebull Bandwidthbull Device capabilities
bull NNMi includes Component Health polling
Configure
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network Monitoring Custom Polling
bull Configure ldquocustomrdquo polling for network devices
bull Good candidatesbull Power suppliesbull Environmental monitors
Configure
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network Monitoring Performance Metrics Thresholds
ndash Configure high and low thresholds for device and interface metrics
ndash Threshold violations generate incidents These incidents integrate with other BSM amp 3rd party tools
Configure
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
WAN Monitoring
46
ndash Network device configuration
LosAngeles
bull Most of the configuration is done in the routers
bull The QA SPI will discover the information in these configurations
Configure
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Traffic Monitoring Configuration
Master CollectorNNMi
Leaf Collectors
Network Devices
Reporting
METRICS TRAFFIC
Configure
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configure Traffic Master amp Leaf Collectors
ndash Configure Master Leaf and collection parameters
Configure
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Enable Flow Monitoring
ndash Use Network Automation to configure Traffic flow monitoring
For devices specify Leaf Collectors
For each monitored interface enable flow info
Configure
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configure Policy Compliance
Checks forbull Security settings such as ACLs
bull Console telnet ssh and loginpassword rules
bull Checks for devices with vulnerable versions of IOS
bull Downloads security policies via a subscription model
Configure
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configure Policy ComplianceConfigure
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Configure Policy Compliance Software Versions
Configure
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Analyze
Analyze
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Analyze
ndash Whatrsquos there
ndash Whatrsquos working
ndash Whatrsquos broken
ndash What are the trends
ndash Are there configurationsecurity issues
Analyze
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
High-Level Views of Status
Node Group Status
Network Performance and Compliance Gauges
Incident Browser
Inventory Views
Analyze
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Topology Analysis
Use L3 L2 and Path views to analyze topology and connectivity issues
Analyze
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
57
VMware Hosts and Virtual Machines
L2 maps will show a shared media icon connecting the access switch to discovered ESX hosts and guest VMs
Non-SNMP VM
SNMP VMESX host
Analyze
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
58
Find Attached Switch Port
Non-SNMP VM
SNMP VM
Analyze
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
59
Export Topology to VisioAnalyze
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Network Link Discovery Switches amp APs
ndash Look for Security problems like cascaded switches and rogue Wireless Access PointsThings look fine in an L3 viewhellip
hellipbut suspicious in an L2 view
Analyze
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
NNMi Root-Cause
ndash NNMi does a lot of the hard work for you
ndash NNMirsquos conclusions are aided by the polling policies that you configured
ndash NNMi polls devices in the neighborhood of a suspected fault to perform true RCA
ndash Your Incident Processing rules customize the results
Analyze
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
62
Real-Time Line GraphsActions -gt Graphs
ndash Graphs provided for bull Nodes
bull Interfaces
bull Incidents
bull Custom Polled Instances
bull MIB Expressions
ndash Some Line Graphs are specific to a vendor or object type
ndash Accessible from tables or maps
ndash Test MIB Expression with Graph
Analyze
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
63
Graph of Interface Utilization
ndash If node selected all interfaces will be included on graph ndash up to 20
Analyze
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
View Performance Metrics
Device Metricsbull Analyze the CPU memory amp buffer utilization on your network devices
bull Start with a ldquoTop Nrdquo report to find busiest devices
Interface Metricsbull Analyze the traffic volume utilization throughput errors and discards
bull Again start with a ldquoTop Nrdquo report
Analyze
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Dissect the Network Traffic
ndash Use Performance Metrics for volume and then Performance Traffic for content analysis
ndash Analyze by source destination and application
Analyze
Web
Bittorrent
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Traffic Top N Optionsndash Interface ID
ndash Interface Name
ndash Qualified Interface Name
ndash Node Name
ndash Flow Version
ndash IP Protocol
ndash IP TOS
ndash Application Name
ndash Source Port
ndash Destination Port
ndash Source Host Name
ndash Destination Host Name
ndash Src Host Application amp Destination Host
ndash Destination Host amp Application
ndash Collector Name
Analyze
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Monitor WAN Performancewith QA SPI
67
Network Performance between sites
LatencyLossJitter
LosAngeles Bejing
Analyze
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Monitor Custom Polled Info
Examplesbull Power spikes amp dropsbull UPS battery capacitybull Temperature amp Humidity
Analyze
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Look for Patterns
Use Calendar Line Chart and Heat Chart
Analyze
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Check for Policy Compliance
ndash Understand which devices in compliance with your security content amp performance policies
ndash Prepare amp deploy corrective policies
Analyze
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Optimize (Content Management)
Optimize
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Optimize
ndash Improve the performance amp availability of business-critical services
ndash Configure infrastructure for real-time applications such as voice amp video
ndash Identify the most troublesome devices and most frequent events
ndash Drive down costs
Optimize
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Tools for Optimization
Metrics Dashboard
Performance Charts with Volume amp Errors
Optimize
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Tools for Optimizationndash Traffic Analysis Top N and High Traffic Hosts
bull Find the bandwidth hogs
bull Identify business vs non-business traffic
bull Identify when abuses are happening
bull Use tools like Heat Chart to find recurring patterns
bull Drill down into specific ports and addresses
Optimize
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Tools for Optimization
ndash Traffic Enforcementbull Implement rules on firewallsbull Enable priority queuing of business-critical and real-time trafficbull Enable blocking or throttling of non-business traffic
minusDefine permitted source destination port and other attributes
minusCreate corresponding Access Control Lists
Optimize
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Where to go for more information
ndash Add items Here
76 HP CONFIDENTIAL - ENABLEMENT ONLY NOT FOR CUSTOMER USE
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity
Continue the conversation with your peers at the HP Software Community hpcomgoswcommunity