Network Size | Minimum Platform |
---|---|
Small
|
|
Medium
|
|
Large
|
|
Syslog messages are an important part of any network performance monitoring strategy. As a passive asynchronous protocol, they alert you of potential issues that may not be evident with monitoring mechanisms.
AKIPS receives, filters, displays, logs, reports and alerts on syslog messages from any device on your network, notifying you of critical issues that are likely to impact end user experience and disrupt your business.
Features:
Traps are an important part of any network performance monitoring strategy. As a passive protocol, they alert you to potential issues that may be missed between traditional SNMP polling cycles.
AKIPS receives, filters, displays, logs, reports and alerts on traps from any device on your network, notifying you of critical issues that are likely to impact end user experience and disrupt your business.
Features:
Most traps contains between 5 and 10 MIB objects, not just a single object.
The following trap is from a typical link failure:
SNMPv2-MIB.snmpTrapOID: IF-MIB.linkUp IF-MIB.ifIndex: 3 IF-MIB.ifAdminStatus: 1,up IF-MIB.ifOperStatus: 1,up IF-MIB.ifDescr: Serial1/0 IF-MIB.ifType: 22,propPointToPointSerial OLD-CISCO-INTERFACES-MIB.locIfReason: Keepalive OK
The following is an OSPF trap:
SNMPv2-MIB.snmpTrapOID: OSPF-TRAP-MIB.ospfNbrStateChange OSPF-MIB.ospfRouterId: 10.2.20.1 OSPF-MIB.ospfNbrIpAddr: 10.2.2.122 OSPF-MIB.ospfNbrAddressLessIndex: 0 OSPF-MIB.ospfNbrRtrId: 10.2.27.1 OSPF-MIB.ospfNbrState: 8,full
The following is an example Cisco syslog message sent as a trap:
SNMPv2-MIB.snmpTrapOID: CISCO-SYSLOG-MIB.clogMessageGenerated CISCO-SYSLOG-MIB.clogHistFacility: OSPFv3 CISCO-SYSLOG-MIB.clogHistSeverity: 6,notice CISCO-SYSLOG-MIB.clogHistMsgName: ADJCHG CISCO-SYSLOG-MIB.clogHistMsgText: Process 1, Nbr 10.2.20.1 on Serial1/0 from LOADING to FULL, Loading Done CISCO-SYSLOG-MIB.clogHistTimestamp: 422601
Just because a cable is plugged into a switch port does not mean it is actually being used
Most networks have a large amount of unused infrastructure, but knowing which parts is the big challenge. The AKIPS unused interfaces report solves this difficult problem.
AKIPS constantly monitors and records interface state changes for the entire network. This information can be queried via a simple GUI to determine how much capacity is available and which interfaces have not been used over a selected time period.
Features:The AKIPS Switch Port Mapper regularly collects MAC, IPv4 ARP, IPv6 Neighbour and bridge tables from all monitored devices. This data is then collated and processed via a unique algorithm to determine which MAC addresses are connected to each switch port.
The user interface quickly allows you to locate any IP or MAC address on your network, and display its location history over the last 60 days.
Features:
AKIPS flow traffic analyser is a unified solution that provides the visibility of how your bandwidth is being consumed by users and applications. It is useful for forensics, capacity planning and traffic profile analysis.
Features:
Full auto network discovery - without the mess of CSV files or manual device additions
The AKIPS network discovery removes the complex and time consuming task of discovering your entire network. The unique discovery algorithm performs non-intrusive rate limited PING and SNMP scans using your predefined address ranges and credentials.
A typical network of 5000 switches and routers completes in approximately 10 minutes. Reports will then start to be populated with vital statistics.
Features:
Many devices have limits on the number of destinations that syslog/traps/NetFlow packets can be sent to. Service forwarding takes the CPU load off the end devices as it only has to send packets to a single destination. Up to 10 IPv4 forward addresses can be defined for each service. The original source IP address is maintained, therefore the receiving host does not know the packet was forwarded.
The AKIPS poller is based around a modern highly efficient monolithic architecture that combines configuration, collection, analysis and data storage into a single process (no threads). This architecture allows for a clear efficient data path from the end devices to the data storage. Its dual mode sync/async request algorithm allows the poller to scale, be gentle on the network, and is immune to network latency issues.