You are on page 1of 12

IRONVIEW NETWORK MANAGER

t Delivers on the promise of Fault,Configuration,Accounting,Performance,


and Security Management – FCAPS – for managing Foundry’s high
performance networking products
t Enterprise-wide business application monitoring on every port from
10Mbps up to 10Gbps,without any impact to network performance
t Pin-point troubleshooting,targeted fault analysis,and proactive
management and removal of any abusive application network flows
t Deploy network changes anywhere and anytime on any Foundry
product that spans from Layer 2 up to Layer 7
t Enforced user-based bandwidth and access control list policy network-wide
t Rapidly deploy Metro Ethernet services,and accurately meter usage and SLA
t Standards-based and highly secure network management system built
upon Java,SNMP,and sFlow (RFC 3176) – the industry standard
protocol for network management

Empowers businesses to
C o n t r o l t h e I m pa c t o f C h a n g e

Foundry’s IronView Network Manager


Foundry’s IronView Network Manager (INM) allows today’s With IronView Network Manager,network managers can now
networks to run at maximum efficiency by allowing network automatically discover networks that contain Foundry’s high
operators to effectively track and perform configuration changes performance network equipment that spans from Layer 2 to
and software updates, and identify and resolve network failures. Layer7,and immediately acquire and view theirVLAN and ACL
Changes to complex network-wide features such as Access configurations. IronView Network Manager’s ACL Manager,
Control Lists (ACL),Rate Limiting policies,VLANs,software and coupled with Foundry’s universal support of ACL feature
configuration updates, and network alarms and events, are throughout its product line from Layer 2 to Layer 7, makes the
becoming impossible to track and deploy consistently without deployment of network policies and business application
intelligent network management applications. Without these priorities trouble-free and simple from the core backbone
web-based management tools,networks are prone to outages due network down to the edge network or wiring closet.
to mis-configuration or invalid software upgrades.Built on top of
IronView Network Manager takes advantage of Foundry’s
a Java-base platform, Foundry’s INM empowers network
JetCore ASIC, which integrated Hewlett-Packards XRMON
operators to seamlessly control software and configuration
Packet SamplingTechnology and sFlowTechnology,described in
updates for any Foundry product from anywhere, allowing for
RFC 3176, to deliver hardware-based and real-time network
complete management of networks.
monitoring and accounting capabilities.This ensures wire-speed
switching and routing performance with “always-on” fault and
performance management, capacity planning, intrusion
detection, security policing and precise network traffic
accounting on all ports from Layer 2 up to Layer 7.
INM Key Features and Benefits User and Role Manager
IronView Network Manager comes with the following key INM’s User and Role Manager allow network managers to
application managers: create “role” access accounts and access levels for each accounts.
t User and Role Manager Network managers can use the User and Role Manager to create
t Network Object Manager groups, with each group having their own access into any
t VLAN Manager sub-applications. This ensures task separation common within
t Access Control List Manager an IT organization.
t Event Manager
t Configuration Manager
t Bandwidth Manager
t Service Director
All of INM’s application managers uses SNMPv3 (Simple Assign INM
applications for
Network Management Protocol), the standard protocol for each AAA or
TACACS+
element management. SNMPv3, which comes standard with privileges

IronWare release 7.5.02 and above,allows network managers the


flexibility to separate SNMP OIDs (Object Identifier) into a
user-based classification.For example,a classification name called
“network operations” can be created and all “READ-ONLY”
SNMP OIDs can be associated into the “network operations”
classification. This flexibility of grouping SNMP OIDs allows
network managers to control SNMP access down to the simplest
unit of an SNMP.
Figure 1: User and Role Manager
SNMPv3 enables encryption of SNMP PDUs (Packet Data
Unit), ensuring greater security for managing networks. Earlier Network managers can manage each User accounts, such as add
versions of SNMP uses clear-text to send SNMP PDUs, which new users, set passwords for users, and apply roles to the users,
can be easily deciphered by any hacker and breach network giving them specific access and configuration authority. In
security. Encrypting SNMP PDUs makes it very difficult to addition, actions performed by each user are logged to account
decrypt device or network configurations. Foundry’s for any configurations deployed within a Foundry device or
implementation of SNMP v3 supports Data Encryption devices. This security feature enables network managers to
Standard (DES) encryption key troubleshoot any network problems caused by erroneous
In addition,INM’s application managers are web-based,allowing configuration deployments, and deliver detailed configurations
network managers to access control of their network from used during the deployment.
anywhere using any well-known browser and at the same time INM’s User and Role Manager also includes features that allow
allowing access to be operating system independent. This users to be authenticated using external authentication solution
convenience allows network operational activities to be like TACACS+ or AAA, which simplifies and combines the
performed at any time or at times when critical changes to the security system for INM users and for users accessing any
network are required. Foundry products.Network managers can also use this feature to
Finally, each INM application managers are composed of sub- assign privileges for each TACACS+ or AAA user groups,giving
application managers and each sub-application manager can be multi-level security system for configuration changes to any
“bundled”together to create group partition and ownership.This device on the network.
flexibility enables network managers to group sub-application
for varying groups within an IT organizations,based on their role
within the organization.
Network Object Manager VLAN Manager
INM’s Network Object Manager enables the creation of a Foundry’s INM comes with a VLAN Manager, which enables
Device Group and a Port Group.As shown in figure 2, network network managers to discover already configuredVLANs within
managers can group Core network devices together to allow their network and to perform Adds/Moves/Changes to any
network managers to load common configurations or perform VLANs within their network.VLAN Manager can create, view,
common monitoring facilities on these Core network devices. update, and deploy changes to port-based VLANs, protocol-
Likewise, network managers can group ports together across basedVLANs,andVoIPVLANs.
network devices to perform the same activities.
VLAN Manager for Metro
Providers and Carriers
Allowing network managers to create groups based on devices or
ports enables rapid deployment of configuration changes
throughout the network. For example, network managers can
easily deploy security policies using Foundry’s Access Control
List feature to a group of ports within the wiring closet. In
addition, network managers can perform real-time network
traffic accounting on these ports to monitor and verify
deployment of security policies.

Device configurations can also be created that spans ports and


devices,enabling network manager to deploy or schedule service
changes within a set of devices or a set of ports.

VLAN Manager for Enterprise

Figure 2: Device Group and Port Group


within the Network Object Manager

Figure 3: VLAN Manager


Access Control List Manager
Foundry’s VLAN Manager supports IPv6 VLANs, allowing The Access Control List Manager (ACL Manager) allows
network managers to support aVLAN with hosts that have IPv6 network managers to easily configure Access Control Lists
enabled operating systems. Enabling support for IPv6, the next (ACLs), which allows network managers to permit or deny
generation IP protocol, allows network managers to manage packets based on source and destination IP address, IP protocol
together VLANs that contains IPv4 hosts and IPv6 hosts within information,or TCP or UDP protocol information.It also allows
the single management system. network managers to easily import ACLs from a Foundry device
or a group of Foundry devices, allowing network managers to
Metro Service Providers,who deploy Transparent LAN Services
easily create existing ACLs within the ACL Manager.
and use VLANs to create service separation, can easily associate
QoS to any VLAN that spans across the providers’ network. For As shown in figure 4, the ACL Manager comes with two sub-
example,a Metro Service Provider can designateVLAN 99 to be applications; the Service Manager and the Network Manager.
the VLAN used for their voice services. Metro Service Provider The Service Manager, which allows network managers to add
can then easily associate a QoS priority for VLAN 99, the voice other UDP or TCP ports, comes with pre-defined and well-
service VLAN, to ensure higher priority for voice traffic across known services allowing network managers to easily create,add,
the provider’s network. This feature allows Metro Service and deploy ACLs using “named” services.The Network Manger
Providers to offer toll-quality voice services for any of their allows users to add and group IP subnet or IP address.These sub-
customers. application managers deliver flexibility in associating a Service
Rule and a Network Rule within an Access Control List.
With the help of the Service Director (see “Service Director”
section for details), network managers can view VLAN-based
traffic matrix in real-time. For Enterprise customers, they can
easily manage and review the network for any bottlenecks. For
Service Providers,they can use theVLAN-based traffic matrix to
easily create billing information about their customers. Both
Enterprise and Service Provider, with the use of Foundry’s
JetCore ASIC, are assured of wire-speed network performance,
while performing real-time and “always-on” network traffic
accounting within their network.

Figure 4: Access Control List Manager


Event Manager
The ACL Manager supports configuration for the following Network managers can easily troubleshoot network problems using
types of ACLs,and apply them to interfaces to filter traffic sent or INM’s Event Manager.The Event Manager receives both SNMP
received on those interfaces: Traps and Syslog messages, giving network managers a single
t Standard – Permits or denies packets based on source IP address. application to view, validate, and troubleshoot network events.
t Extended – Permits or denies packets based on source and
destination IP address and based on IP protocol information.
These extensions include:
— Source/destination host names
— IP subnet and range
— Source/destination TCP or UDP port/socket
— Well-known port numbers (0 – 1023)
— Priority ToS or DiffServ Control Point information

Figure 5: Event Manager

The Event Manager also comes with extensive “Search Criteria”


for network events based on the following:
t Syslog and/or SNMP Trap events
t Individual Device,Device Groups or Port Groups
t Event Severity (emergency,alert,critical,error,warning,notice,
info,debug,and unknown)
t Acknowledge and/or Unacknowledged Events
With an expansive “Search Criteria”, network managers can
easily drill-down to the cause and effect of any network problems.

The Event Manager also comes with an Event Email Tool,which


network managers can configure to send email of any
de-duplicated network events.

As shown in figure 6, network managers create email alerts with


the following information:
t Alert Identification – allows network managers to supply the
name of the email alert.
t Alert Recipient – allows network managers to supply a list of
email addresses of those that needs to receive the email alert.
Registered users within the User and Role Manager can be
immediately acquired within the Email Tool.
Bandwidth Manager
Foundry’s rate limiting feature is robust and INM supports the
following rate limiting capabilities:
t Fixed Rate Limiting
t Adaptive Rate Limiting
t JetCore Adaptive Rate Limiting features,which includes the following
— Fixed port-based rate limiting
— Port-and-priority based rate limiting
— Port-and-ACL based rate limiting
Figure 7 shows how INM users can now make bulk deployments
of Foundry’s rate limiting feature.

Network managers can use INM’s Bandwidth Manager to


deploy any Foundry rate limiting policies into their network,
allowing seamless deployment of their business policies to their
users. Policies for higher priority applications like VoIP can now
be deployed easily across a network. Universities, who require
Figure 6: Event Manager’s Email Tool rate-limiting a student’s network access, can also take advantage
t Email Content – allows network managers to include text of bulk deployments.
messages for the “Subject”and the “Body”of the email.
t Trap Specification – allows network managers to configure the
following to further refine the network events:
— Event Severity ((emergency,alert,critical,error,warning,
notice,info,debug,and unknown)
— Event Frequency Count
— Source of the network events,which can be based on an the
following:
– Individual Device
– Device Groups
– Port Groups

Figure 7: Bandwidth Manager


Service Director
Service Director comes with the following sub-applications: 2. Accounting – Allows network managers to create a Summary
or Detail Traffic Report,which can be used by Metro
1. Monitoring – Allows for both SNMP and sFlow collection
Providers,who offer Transparent LAN Services,for their
and presentation.sFlow,which is based on RFC 3176,is
billing solution or to feed into their billing system.
embedded into Foundry’s JetCore ASIC and delivers the
following features without any impact to network performance: Metro Service Providers (MSPs) or Carriers can now deliver
t Accurate network traffic accounting,from Layer 2 up to Layer 7, detailed traffic network report (see figure 9) that shows Layer
including traffic accounting based on 802.1X username. 2 up to Layer 7 information about their customer’s traffic.With
t Integration with industry-leading accounting and billing applications Foundry's robust usage management and network traffic
t Intrusion Detection and deliver full visibility of any network accounting features,MSPs and Carriers can now build
traffic,regardless of protocol (e.g.,IPv4,IPX,AppleTalk,and IPv6) revenue based on their customer's usage data and use the
t Precise network policing of network traffic everywhere,from the following benefits:
network Edge up to the network Core
t Collect,correlate,and aggregate customer usage data - enabling
t Identification of network bottlenecks within a network and
integrated billing and data mining solutions.
complete packet header decode,from Layer 2 up to Layer 7
t Create new services and accurately bill for them - leading to new
Figure 8 shows the Monitoring tool, which allows network and increased revenues.
managers to view, monitor, and account for SNMP data t Standardize usage data and allow multiple applications easy
collection and sFlow collection. access to the data.
t Increase revenues and customer satisfaction by implementing the
following:
— Simplify advertiser billing by tracking subscriber usage and
hit rates.
— Develop focused marketing programs based on knowledge of
subscriber behavior.
— Model new billing plans against actual subscriber usage data.
— Exploit other data mining opportunities including capacity
planning,fraud management,and network latency analysis.

Figure 8: Service Director’s Monitoring Facility

Figure 9: Service Director’s Accounting Facility


sFlow is supported in the Foundry products shown figure 10, Foundry’s networking products deliver low network latency,
including Foundry’s 10GbE module. Support for sFlow from Jumbo Frames,Gigabit Over Ethernet (GbECu),and 10 Gigabit
10Mbps up to 10Gbps ensures delivery of detailed network Ethernet switches and routers for use within an enterprise’s Data
traffic flow accounting without any impact to network Center and Backbone. Coupled with sFlow, real-time network
performance.High speed computing (HPC),which uses Gigabit monitoring of business application traffic offers tangible benefits
Ethernet and 10 Gigabit Ethernet for server and switch to an HPC environment.
aggregation, respectively, require real-time and cumulative
historical information about their business application traffic.

FastIron Layer 2/3 BigIron Layer 3 NetIron Metro


Enterprise Switches Backbone Switches Routers

NetIron 4802

FastIron 400/800/1500
BigIron 4000/8000/15000
NetIron 400/800/1500
FastIron 4802

IronView Network ServerIron Web


Management Switches
FastIron Edge 2402POE/4802POE

FastIron Edge 12GCF

ServerIron 400 ServerIron 800


FastIron Edge 2402/4802/9604

Figure 10: Shows Foundry Products that Support sFlow


Architecture for IronView
Network Manager
Figure 11 shows the architecture of Foundry’s IronView Foundry’s IronShield Security includes the following:
Network Manager,which delivers the essential requirements for t Support for 4000 Wire-speed Access Control Lists (ACL),
network management – FCAPS. Foundry’s solution covers each which includes the following:
of the following layer,which combines to deliver FCAPS within — Standard ACL – Permits or denies packets based on an IP
the Element Layer, the Network Management Layer, and the address,an IP subnet,or a range.
Service Management Layer. — Extended ACL – In addition to the standard access control
list configuration,it permits or denies packets based on the
Each layer is addressed by the following features, which reside following:
within Foundry’s network equipment and within INM: – Source/Destination host names
1. Element Layer – All of Foundry’s products support a robust set – Source/Destination TCP or UDP port (socket)
of feature that allows network management systems to deliver – Well known port numbers (0-1024)
FCAPS.These sets of features include Foundry’s IronShield t Secure Shell (SSH) and Secure Copy (SCP) with the following
Security and Foundry’s IronClad Network Traffic Accounting. encryption:
— Arcfour
— IDEA
— Blowfish
— DES (56-bit) and Triple DES (168-bit)

Fault Configuration Accounting Performance Security

Fault Mgmt = Config Mgmt = Accounting Performance Policy


Event Mgr + Config Mgr + Services = Mgnt = Verification =
Service Event Email ACL Mgr + Service Service Service
Mgmt. Tool + VLAN Mgr + Director + Director + Director +
Layer Network Network Network Network Network
Object Mgr Object Mgr Object Mgr Object Mgr Object Mgr

Network Web-based Applications: Network Discovery Manager, user and Role


Mgmt. Manager, Configuration Manager, Network Object Manager, VLAN
Layer Manager, Access Control List Manager, Event Email Tool, Address Finder,
Device Manager, Bandwidth Manager, and Service Director

IRONSHIELD SECURITY
Secure Copy, Secure Shell, Access Control Lists (up to 4096 ACL entries), AAA,
Element
Management VLAN, RADIUS, TACACS/TACACS+, and SNMPv3
Mgmt.
Layer IRONCLAD NETWORK ACCOUNTING
SNMPv3, RMON (EtherStats, history, etherHistory, and alarm), NetFlow, and sFlow

Figure 11: INM Architecture


t Security features that protects the network against Denial of — It’s a Java-based,which is based on Java Runtime
Service such as TCP SYN and Smurf attacks,which help in Environment (JRE) 1.4,allowing any applications to be
eliminating unnecessary network downtime caused by malicious accessed via the web or any standard web-based browser.
hacker attacks. — Includes a Sybase Database (iAnywhere Relational
t Element security systems based on the following: Database),allowing for any dynamic reporting using the
— Two-level password security system Sybase per module.
— Username and Password security system — Supports HP OpenView and Aprisma network
— RADIUS management systems.
— TACACS/TACACS+ t The INM Web-based Application – comes with the web-based
applications,which have the following common features.
— AAA (Authentication,Authorization,and Accounting)
— Web-based,allowing for any standard browser to access any of
Foundry’s IronClad Network Traffic accounting includes the
INM’s application from anywhere.
following:
— Uses a revision control system,which tells “who made the
t Simple Network Management Protocol ver.3 change”,“what changes were made and the differences with
t RMON – I (EtherStats (1),history (2),etherHistory (3),and previous configuration”,and “when was the change made”.
alarm (9)) — Allows for partitioned access for any of the sub-application
t RFC-3176,which supported within Foundry’s JetCore ASIC within each INM application.
and available within Foundry’s FastIron Edge Family,FastIron 3. Service Management Layer – Combining any INM’s
family,BigIron family,and NetIron family.
application enables Carriers to create “error-free”service flow
2. Network Management Layer – The IronView Network processes for Network Operations to use when deploying
Manager,which delivers the Network Management Layer, network configurations for service provisioning.
consists of the following:
In addition,Network Operations can employ INM’s application
t The INM Server – The INM Server comes with the following
to perform Fault, Performance, Accounting, and Security. For
essential features:
example,Network Operations can create a port groups using the
— Supports all well-known operating system,including Solaris
2.7 and above,Windows NT,2000 (SP1 is required),and Device Manager and then allow the Service Director to create a
XP,HP-UX 11.0 and above,and Linux RedHat release Summary and Detail Report of traffic coming in and out of each
8.0 (kernel 2.4.18) and above. ports associated within the port group.
System Requirements
The IronView Network Manager software and documentation are shipped on a CD-ROM. In addition to a CD-ROM drive, your
system needs to meet the following requirements to install and run IronView Network Manager.Table 1 shows the server requirements
needed to successfully install INM.

Table 1: INM Server Requirements


Windows Solaris HP-UX Linux
Minimum OS version NT 4.0 Server 2.8 and above 11/11i on both 32-bit Linux RedHat release 8.0
(with Service Pack 6) and 64-bit systems with kernel 2.4.18
2000 Server
(with Service Pack 2)
Windows XP
Minimum CPU Speed Pentium IV 1Ghz 800MHz 800Mhz 800Mhz
Minimum RAM 512MB 512MB 512MB 512MB
Requirement
Minimum Disk 40GB 40GB 40GB 40GB
Requirement1

Table 2 shows the requirement for client browser, which is required to access any of INM’s web-based application.

Table 2: INM Client Requirements


Netscape Internet Explorer Java Plug-in
Supported Version 6.2 and above 5.5 and above 1.4.1-01 or 1.4.1-02

IronView Network Manager release 1.6 is now available and supports IronWare release 7.6.03 and above.

1
Enabling the Accounting sub-application within Service Director will require periodic database administration for data extraction of flows.It is recommended that disk space
requirement be expanded up to 100GB.
Ordering Information
Table 3 shows the product information for ordering IronView Network Manager.

Table 3: INM Ordering Information


Product Part Number Product Description

IVIEW-NT IronView Network Manager for Windows NT,Windows 2000,and Windows XP platform.This is
a standalone user license, which allows for only one (1) concurrent user.
IVIEW-SOLARIS IronView Network Manager for Sun’s Solaris platform.This is a standalone user license, which
allows for only one (1) concurrent user.
IVIEW-LINUX IronView Network Manager for Linux (RedHat) platform.This is a standalone user license,which
allows for only one (1) concurrent user.
IVIEW-HPUX IronView Network Manager for HPUX platform.This is a standalone user license, which allows
for only one (1) concurrent user.
IVIEW-SW IronView Network Manager yearly support fee.This entitles a customer to product upgrades, for
major and minor “dot” releases, for one (1) year or 1year after the date purchase.
IVIEW-LIC IronView Network Manager 5-user license,which allows 5 concurrent users (or 5 simultaneous users).

Specifications subject to change without notice.

Foundry Networks,Inc. U.S.and Canada Toll-free:


Corporate Headquarters (888) TURBOLAN (887-2652)
2100 Gold Street Direct:(408) 586-1700
P.O.Box 649100 Fax:(408) 586-1900
San Jose,CA 95164-9100 info@foundrynet.com
www.foundrynetworks.com

Although Foundry has attempted to provide accurate information in these materials, Foundry assumes no legal responsibility for the accuracy or
completeness of the information.More specific information is available on request from Foundry.Please note that Foundry’s product information does
not constitute or contain any guarantee,warranty or legal binding representation,unless expressly identified as such in duly signed writing.

© 2003 Foundry Networks, Inc.All Rights Reserved. Foundry Networks, EdgeIron, and the Foundry Logo are trademarks or
registered trademarks of Foundry Networks, Inc. in the United States and other countries. DS-013/Rev2/04-03

You might also like