Today, the Internet application business has been from single to diversified development, from only the news browsing, mail transmission and other single network applications gradually to the following download, online video, network games, such as the main diversified network applications, and with the development of related technologies, More convenient network application business is also springing up, providing people with a diverse network of the world. |
The application of Internet in the development of enterprises is enormous, but the wide application of network technology for enterprises to improve production efficiency, access to huge economic benefits, but also brought a lot of negative effects. such as: Employees in the office hours of unrestrained use of BT, emule and other download tools to download behavior, a long time online to watch Tudou, Youku and other sites of the video, as well as in the network often Hing wind waves of virus intrusion, seriously affecting the stable operation of the Enterprise network, the Enterprise network management has brought great pressure and challenges. |
As the leading developer and solution provider of the Asia Pacific Management software, Mocha software provides powerful mocha flow analysis software (Mocha NTA) to provide you with a detailed network of abnormal state processing solutions to ensure a smooth network and effective management of the enterprise's network. |
|
Enterprise's network scale is expanding, enterprise's business is soaring, the enterprise needs to know whether the whole network's carrying capacity can support the existing business application system. After induction, the enterprise concerned is nothing more than the "4W" as described below: |
-Who. |
Exactly who (the user) or application is using network bandwidth. |
-What. |
What kind of business and applications occupy most of the bandwidth of the enterprise. Exactly what kind of network protocol is running on the network. |
-When. |
In what period of time, the business is at the highest peak. Whether the entire network can host the existing business. |
-Where. |
If there is a problem with the network, where is the problem. What kind of business is the most harmful. According to the "4W" problem, the network traffic analysis provides the basis and analysis results for the enterprise to analyze the complex relationship between network carrying capacity and business application. In order to meet the business needs of the enterprise, network interface bandwidth rate has experienced 10 trillion, hundred trillion, thousand trillion, Devan process, if only rely on traditional means, to flow through the network equipment of massive data statistics, has become impossible, through what means to monitor the network traffic of enterprises, and to analyze, to achieve optimization network, Optimize the effectiveness of the business. Mocha Flow Analysis Management software, it is Mocha Software Co., Ltd. (Mocha Software Co., Ltd) According to the network system of each industry enterprise, through supporting the traffic statistic protocol of various factories, acquiring the core network equipment Flow Analysis protocol package, analyzing and statistic the real traffic of the network, and analyzing the protocol in the network traffic, to achieve the goal of monitoring network traffic. |
Top Rank |
We can see that the flow Analysis management software architecture is very easy to deploy, only need to deploy a Mocha Flow collection analyzer in the enterprise internal network, and then send the traffic analysis packets of all network devices to the Mocha Flow Collection Analyzer. |
The Mocha Flow Collection Analyzer can and mocha portal on a physical machine, or can be deployed on two separate physical machines. The final network manager can access the results of the traffic analysis through any one terminal, by the browser. Quickly discover traffic anomalies in the network and deal with them. |
-Apply Top analysis |
Through the correlation application flow and the data packet analysis, may have the intuitive understanding to the network operation application, has the extremely high help to confirm the network problem. |
-Protocol Top Analysis |
Through the analysis of the traffic and packet of the relevant application, it can show the protocol running in the network clearly, and provide an effective judgment for confirming the existence of the network attack. |
-Flow to top analysis |
Through the analysis of the flow and packet of the related interface, the status of the related interface in the network can be viewed in real time, which provides a strong basis for confirming the network jam. |
-Outflow Top analysis |
Through the analysis of the traffic flow and data packet from the related interface, it is important to confirm the flow outflow and confirm the behavior of network scanning and uploading. |
-Rate Top Analysis |
According to the display of the interface rate in the network, the administrator can confirm the large number of behaviors in the network without needing a wide search. |
-Flow Top Analysis |
The related IP traffic is sorted, can quickly locate to occupy a large number of bandwidth IP address, to solve the network anomaly has a very good help. |
Port Traffic Analysis |
Support a variety of different network flow acquisition protocols, including NetFlow, NetStream, Sflow, Cflow, Ipfix and other manufacturers protocol standards; Whatever flow format, the standard format for data interaction is defined, Mocha through these formats to support almost all of the industry's mainstream network equipment, such as Cisco, Foundry, Extreme, Juniper, Huawei, H3C, etc., to ensure the acquisition of target equipment flow good compatibility. Related to the flow analysis of the agreement has a complete support, the current majority of manufacturers to the NetStream agreement does not support the Huawei and Huawei 3com equipment to provide traffic analysis of the agreement to support the use of Mocha NTA, enterprise users do not have to worry for different manufacturers of equipment, Separately purchase the flow analysis module of different manufacturers. |
Based on the three-layer protocol number and port number, a predefined mapping of thousands of known applications, such as HTTP applications, FTP applications, mail applications, Peer-to-peer, and so on, is provided, and the application of custom functions is readily available when new applications are found in the web, which can be easily identified by new applications. To facilitate the analysis of network traffic from the business point of view of the management staff. |
Provide the industry's most popular form of report, such as overlay, two-dimensional pie, three-dimensional cake, and so on, the report interface is simple to use, and from a number of analysis from the perspective of the analysis of the content of the integration, so that users more quickly get the required analysis results. Click on the agreement from the session report, you can jump directly to the application report, and from the application report to click the source address or destination address, can also jump directly to the session report, to facilitate the management of traffic analysis. also provides the function of the area chart, the user can select in the chart area which needs the detailed view, the selected part will enlarge, for the user to view. Simultaneously provides the inquiry function, facilitates the user to use. |
Mapping configuration |
The related traffic is analyzed by the network Stream acquisition protocol, in this way, a traffic Analysis server needs to conduct traffic analysis of multiple ports the number of packets intercepted is far less than the data packets intercepted by the network port mirroring, if the traffic is analyzed using port mirroring, in the case of a many-to-many , large amounts of data tend to overload the server, resulting in server downtime. At the same time, in the configuration, port mirroring requires at least two more than the network card, and the need for port-by-mirror configuration, operation is very cumbersome. Using the acquisition protocol for traffic analysis only a few simple steps to complete the relevant configuration, without the need to add other hardware devices. |
|
Quickly identify the symptoms of a network problem trigger person |
Traffic analysis helps managers understand which users on the network are downloading or uploading data in large numbers, or that the HTTP server for the network is being accessed by a large number of users. As the following illustration shows, by monitoring the port session of a network device, we can see clearly who is accessing the network in any way. After clicking on a session at the same time, we can also see the data traffic at different times of the session. |
Pinpoint the cause of the network jam |
Through the flow analysis management, can enable network managers to quickly grasp the network load status, the network application and the use of different services, in 5 minutes can be found in the network structure of unreasonable, or network performance bottlenecks, as soon as possible to develop network optimization scheme, so that network bandwidth allocation optimization, to provide users with high-quality network services, and avoids the network bandwidth and server bottleneck problem. It also helps network administrators to track and predict the growth of network link traffic, thereby effectively planning network upgrades (for example, increasing routing devices, ports, or using higher bandwidth interfaces). |
Analysis of network busy leisure, so that the status of the network can be determined according to |
Through the flow analysis management, can enable network managers to quickly grasp the network load status, network applications and different business use, in 5 minutes can be found in the network structure of unreasonable managers by hand-picked time period, quickly show the flow of a period of time profile, To help managers analyze network traffic anomalies: Network managers can view the session, understand that within the time period, the network or outside the network of those IP accounted for the highest traffic, but also by looking at the application, you can quickly learn that the period, those businesses and applications occupy a large amount of bandwidth. To really help the administrator to quickly identify problems, analysis of network traffic anomaly data. |
Fast locating node locations for network anomaly states |
For an enterprise, the network environment is very complex, the enterprise has the WAN, the LAN, the Internet exportation and so on, especially the WAN and the Internet export bandwidth is usually limited, once has the unusual data to produce, will have the very serious influence to the enterprise network. As the following illustration shows, we can use the ranking to analyze that HTTP applications occupy the main bandwidth of an enterprise's Internet exports. |
We click on the application, pop-up analysis of the crazy, can be very clear analysis of which point to which point access to occupy the network's most important bandwidth. |
Therefore, we help enterprises to grasp the characteristics of traffic in the network, the development of appropriate policies (such as QoS and the source or destination IP address for the flow limit), you can make wide area network, Internet export bandwidth is the most reasonable and full use, to avoid unnecessary upgrade investment, The analysis provided by the Mocha flow analysis enables the network administrator to gain insight into the traffic characteristics of WAN links, the application of the load, and the use of users, so as to determine whether the bandwidth should be invested or not, and make decisions quickly. Http://www.mochabsm.com |
|