Ipanema System User Manual 8.1
Ipanema System User Manual 8.1
Ipanema System User Manual 8.1
User Manual
8.1
Headquarters, France
Ipanema Technologies, 28 rue de la Redoute, 92260 Fontenay-aux-Roses
email: [email protected]
tel: +33 (0)1 55 52 15 00
Technical support
email: [email protected]
tel: +33 (0)1 55 52 15 22
Belgium
Ipanema Technologies, Av. du Bourg. Etienne Demunter 3, 1090 Bruxelles
tel: +32 498 17 95 09
Germany
Ipanema Technologies GmbH, Gustav-Stresemann-Ring 1, 65189 Wiesbaden
tel: +49 611 97774 285
Italy
Ipanema Technologies, Piazzale Biancamano 8, 20121 Milano
tel: +39 02 6203 2185
Singapore
Ipanema Technologies APAC, 105 Cecil Street, Level 11 The Octagon, Singapore 069534
tel: +65 68201235
Spain
Ipanema Technologies, Av. de Europa 19, Parque Empresarial La Moraleja, Alcobendas, 28108 Madrid
tel: +34 91 793 21 30
Switzerland
Ipanema Technologies, Zollikerstrasse 153, CH-8008 Zurich
tel: +41 (0)43 488 45 06
The Netherlands
Ipanema Technologies, Vaartserijnstraat 16, 3523 Utrecht
tel: +31 30 890 6680
United Kingdom
Ipanema Technologies Ltd, The Podium, One Eversholt Street London NW1 2DN
tel: +44 (0)207 554 0822
USA
Ipanema Technologies Corp., 200 Fifth Avenue, Waltham, MA 02451
tel: +1 781 890 8008
Technical support
email: [email protected]
tel: +1 617 862 0033
toll free number: 888 485 4884
Contents
CONTENTS
INTRODUCTION ......................................................................... ..........
1. REVISIONS ......................................................................... ..........
2. LIST OF ASSOCIATED DOCUMENTS ............................... ..........
3. DOCUMENT ORGANIZATION ........................................... ..........
4. TERMS USED ..................................................................... ..........
1
1
4
4
5
1-1
1-1
1-1
1-3
1-8
1-9
1-10
1-12
1-12
1-14
1-17
1-18
1-18
1-23
1-25
1-27
1-28
1-29
2-1
2-1
2-3
2-4
2-4
2-5
2-5
2-5
3-1
3-1
3-2
3-2
3-3
3-8
3-9
3-9
3-11
3-19
3-21
3-22
3-24
3-26
3-27
3-29
3-30
3-35
3-38
3-39
October 2014
Ipanema Technologies
Contents
3-40
3-42
3-44
3-44
3-47
3-48
4-1
4-1
4-2
4-2
4-3
4-4
4-7
4-11
4-16
4-17
4-17
4-17
4-18
4-19
4-28
4-28
4-28
4-28
4-29
4-30
4-30
4-31
4-33
4-33
4-36
4-40
4-52
4-54
4-56
4-56
4-57
4-59
4-59
4-60
4-61
4-74
4-77
4-84
4-86
4-86
4-93
4-93
4-99
4-99
4-104
4-104
4-104
5-1
5-1
5-2
5-2
5-12
5-14
5-16
October 2014
Ipanema Technologies
ii
Ipanema System
iii
5-17
5-17
5-18
5-21
5-22
6-1
6-1
6-1
6-2
6-3
6-5
6-5
6-6
6-6
6-8
6-10
6-12
6-14
6-16
6-17
6-18
6-19
7-1
7-1
7-3
7-3
7-5
7-7
7-9
7-10
7-10
7-12
7-13
7-13
7-14
7-15
7-15
7-16
7-16
7-17
7-35
7-39
7-40
7-40
7-41
7-42
7-43
7-45
8-1
8-1
8-1
8-1
8-2
8-3
8-3
8-5
8-7
Ipanema Technologies
October 2014
Contents
8-8
8-9
8-9
8-9
9-1
9-1
9-1
9-1
9-2
9-2
9-3
9-5
9-7
9-17
9-25
9-25
9-26
9-28
9-33
9-34
9-36
9-43
9-43
9-45
9-47
9-49
9-51
9-55
9-58
9-58
9-60
9-62
9-63
9-63
9-64
9-66
9-67
9-67
9-68
9-70
9-72
9-72
9-76
9-78
9-78
9-80
9-82
9-84
9-86
9-88
9-90
9-90
9-92
9-94
9-96
9-98
9-100
9-103
9-105
9-107
October 2014
Ipanema Technologies
iv
Ipanema System
9-109
9-109
9-111
9-114
9-117
9-117
9-119
9-119
9-121
9-121
9-123
9-123
9-125
9-128
9-129
9-131
9-133
9-133
9-135
9-137
9-139
9-139
9-142
9-144
9-144
9-146
9-148
9-148
9-149
9-149
9-150
10-1
10-1
10-1
10-1
10-2
10-2
10-2
10-3
..................................... ..........
Ipanema Technologies
10-3
10-3
10-4
10-4
10-4
10-4
10-5
11-
October 2014
INTRODUCTION
1. REVISIONS
Index
Date of issue
Chapter/
section
concerned
Subject
Jan. 2001
All
Original
April 2001
All
Sep. 2001
All
Jan. 2002
All
March 2002
All
Aug. 2002
All
Oct. 2002
All
Jan. 2003
Chapters 2,
3, 4 and 8
Feb. 2003
Chapter 2
ip|reporter settings
April 2003
Chapter 2
About window
Oct. 2003
All
July 2004
All
April 2005
All
Nov. 2005
All
Nov. 2005
Chapter 2
April 2006
All
Aug. 2006
All
Oct. 2006
Chapter 2
Nov. 2006
Chapter 3
Alarming function
Feb. 2007
All
Nov. 2007
All
Jan. 2008
Chapters 2
and 7
April 2008
All
July 2008
Chapters 2
and 3
October 2014
Ipanema Technologies
Ipanema System
Oct. 2008
All
Dec. 2008
All
Jan. 2009
AA
Chapter 2
March 2009
AB
All
May 2009
AC
All
June 2009
AD
Chapters 2, 9
Nov. 2009
AE
Chapters 2,
4, 7
Nov. 2009
AF
Chapters 2,
4, 6, 7
March 2010
AG
All
May 2010
AH
Chapter 1
Aug. 2010
AI
Chapters 1,
2, 4, 5 and 8
Dec. 2010
AJ
Chapter 8
Aug. 2011
AK
All
Chapter 2
Nov. 2011
AL
All
Dec. 2011
AM
All
March 2012
AN
All
July 2012
AO
All
Sep. 2012
AP
All
Ipanema Technologies
October 2014
Dec. 2012
AQ
All
1.1.2
4.2.3
4.8.3
8.13
Jan. 2013
AR
3.4.2.1
4.6.1
4.8.3.3
4.8.4
8.4
March 2013
AS
3.4.2.1, 7.2.1
Chapter 7
Chapter 8
April 2013
AT
3.6.1
4.7.2
4.9.3.1
-
June 2013
AU
4.8.3.2
July 2013
AV
all
Aug. 2013
AW
Chapter 1
Sept. 2013
AX
Chapter 7
Oct. 2013
AY
5.2.1.2
Oct. 2013
AZ
10
March 2014
BA
All
4.7.3
April 2014
BB
9.11
June 2014
BC
All
July 2014
BD
All
9.18
Oct. 2014
BE
October 2014
Ipanema Technologies
Ipanema System
For each range of ip|engine (nano, 10, 100 and 1000), there are two manuals:
3. DOCUMENT ORGANIZATION
This document contains 10 chapters:
Ipanema Technologies
October 2014
4. TERMS USED
AG:
Application Group.
Aggregated flow:
ANS:
Applications Dictionary:
Applications Group:
AQS:
ASL:
BDP:
Byte counting:
CIFS:
CLI:
Congestion:
CoS:
Class of Service.
CPE:
Delay variation:
DPI:
DSCP:
DstPort:
Destination Port.
Datagram:
D/J/L:
Delay/Jitter/Loss.
Domain:
DWS:
October 2014
Ipanema Technologies
Ipanema System
Elementary observation:
Equipped site:
Flow:
Fragmentation:
GLASS:
GPS:
Goodput:
GUI:
HSRP:
ICMP:
IMA:
IP:
Internet Protocol.
IP micro-flow:
ip|agent:
ip|boss:
ip|coop:
ip|dashboard:
ip|engine:
ip|fast:
ip|reporter:
ip|true:
ip|uniboss:
ip|xapp:
ip|xcomp:
Ipanema Technologies
October 2014
ip|xtcp:
IPDR:
IP Data Records.
ISU:
ITP:
Jitter:
JRE:
LAN:
LAN-to-LAN:
used for the measurement from the LAN port of the source
ip|engine to the LAN port of the destination ip|engine;
applies to the throughput, Delay, Jitter and packet Loss. Also
abbreviated LAN (e.g. LAN-to-LAN Delay = LAN Delay).
LDAP:
LTL:
Measurement interface:
Measurement ticket:
MetaView:
MOS:
MRE:
nano|engine:
NAP:
OWD:
Packets:
Packet counting:
Packet loss:
PBR:
Physical site:
Point of measure:
QoE:
October 2014
Ipanema Technologies
Ipanema System
QoS:
Quality of Service.
QoS Profile:
RADIUS:
Router:
Routing:
RTT:
SALSA:
SAML:
Sensitivity:
SLA:
smart|path
smart|plan
SNMP:
SrcPort:
Source port.
SRE:
SRT:
SSL:
TCP:
tele|engine:
Tele-managed Site:
Ticket Record:
TOS:
Type Of Service.
TOS Dictionary:
Traffic profile:
Transfer delay:
Throughput:
Ipanema Technologies
October 2014
UC:
Unified Communications.
UDP:
VF0 / VF4:
Virtual ip|engine:
Virtual site:
virtual|engine:
VoIP:
VPN:
VRF:
WAN:
WAN-to-WAN:
used for the measurement from the WAN port of the source
ip|engine to the WAN port of the destination ip|engine.
Applies to the throughput, Delay, Jitter and packet Loss. Also
abbreviated WAN (e.g. WAN-to-WAN Delay = WAN Delay).
LAN-to-LAN Delay = Delay generated by the source ip|engine,
if any + WAN-to-WAN Delay + Delay generated by the
destination ip|engine, so the LAN-to-LAN Delay includes (and
is higher than or equal to) the WAN-to-WAN Delay.
WFQ:
Wizard:
ZRE:
October 2014
Ipanema Technologies
1. 1. OVERVIEW
1. 1. 1. Autonomic Networking System
Ipanemas self-learning and self-optimizing Autonomic Networking System (ANS) tightly
integrates all the features to guarantee the best application performance: Application Visibility,
Application Control, WAN Optimization, Dynamic WAN Selection and Network Rightsizing.
Easy to use and highly scalable, ANS addresses mid-size and thousands-sites companies. It also
addresses Service Providers with thousands of customers.
Based on the SALSA central management platform and on a family of appliances and software
agents, ANS fits from the smallest Branch Office to the largest Datacenter.
October 2014
Ipanema Technologies
1-1
Ipanema System
Autonomic:
It guarantees applications performances through global and distributed coordination
between Ipanema appliances and software agents,
it dynamically adapts to traffic and network changes thanks to a Sense and Respond"
mechanism (Sense: Real-time view of the network performances and users demand;
Respond: Dynamic and distributed computation with second-by-second optimal policies
enforcement),
full control is provided, in most cases (depending on the network architecture), with as
few as 10-20% of the sites equipped with physical appliances.
All-in-one:
All features are tightly coupled,
it optimizes all application flows: data transfers (FTP, CIFS...), interactive flows (ERPs,
Citrix...), real-time flows (VoIP, Videoconference...), etc.
Service Framework:
A unified management GUI is provided for all features,
the multi-tenant SALSA platform scales up to 10Ms users and 100Ks sites,
objective-based control enables Application SLAs and global WAN Governance.
1-2
Ipanema Technologies
October 2014
Ipanema System
1. 1. 2. Ipanema features
This section quickly describes Ipanema features (for more details see 1.3. Features description).
Application Visibility
Goal: understand application usage and performance over the entire network.
How: providing clear application performance KPIs (Application Quality Score or AQS and
MOS), high level consolidated reports, and very detailed information at the flow level.
Application Visibility
October 2014
Ipanema Technologies
1-3
Ipanema System
Application Control
Goal: guarantee users experience by controlling each application flow in real-time, depending
on the network resources.
How: dynamically enforcing Application SLAs for each user thanks to a global and dynamic
approach, where the whole traffic matrix is taken into account in real time. Application Control
manages the application flows in the most efficient way, even in full-mesh and very large
networks.
Application Control
1-4
Ipanema Technologies
October 2014
Ipanema System
WAN Optimization
WAN Optimization
October 2014
Ipanema Technologies
1-5
Ipanema System
Network Rightsizing:
Network Rightsizing
1-6
Ipanema Technologies
October 2014
Ipanema System
Goal: guarantee application performance across hybrid [MPLS + Internet] networks, improve
business communication continuity, exploit large network capacity at low cost, benefit from
Internet immediacy and ubiquity, turn back-up lines into business lines, eliminate complex policy
based routing and unify the management of hybrid networks.
How: automatically and dynamically selecting the best path for each application flow across the
various networks.
DWS
October 2014
Ipanema Technologies
1-7
Ipanema System
1-8
Ipanema Technologies
October 2014
Ipanema System
1. 1. 4. Features availability
The table below summarizes the features provided by the different Ipanema appliances and virtual
machines, and on tele-managed sites:
ip|e
ax
ip|e
non-ax
nano|e
virtual|e
tele|e
ip|true
yes
yes
yes
yes, performed by
the remote ip|agents;
no D/J/L info
ip|fast
yes
yes
yes
yes
ip|xcomp
SRE
yes
no
ip|xcomp
ZRE
yes**
no
yes
no
ip|xtcp
yes**
no*
no*
no*
ip|xapp
yes***
yes***
smart|path
yes
yes
no
no
smart|plan
yes
yes
yes
no
Features availability
* ip|xtcp is a single-box sender-side technology, so traffic to a site with a nano|engine,
a virtual|engine or a tele|engine can be accelerated.
** except for ip|e 40so.
*** ip|xapp is a single-box client-side technology, so the ip|engine or virtual|engine
must be installed in the Branch Office (where the clients are). If it is not (sites with a
nano|engine or a tele|engine), the feature can still be delivered, thanks to IMA.
October 2014
Ipanema Technologies
1-9
Ipanema System
1. 1. 5. Functional architecture
SALSA (Scalable Application Level Service Architecture) is the Central Management Software; it
is composed of:
ip|uniboss software (one server): it ensures the creation and management of the Domains,
Unified User Management and Licenses management.
ip|boss software (one or several servers, depending on the number of Domains and their sizes;
it can be installed on the same server as ip|uniboss): it ensures system administration, system
configuration (system provisioning, application provisioning and reports provisioning), service
activation, real time monitoring (ip|dashboard), supervision, collect of the Correlation Records
generated by ip|agents every minute (according to the parameters), interface with ip|reporter
to create or delete reports (the main reports are automatically created).
ip|reporter software (one or several servers, depending on the number of Domains, the volume
of traffic and the number of reports; on very small networks less than 10 sites it can be
installed on the same server as ip|boss/ip|uniboss): it ensures the reporting function, polling
ip|boss to collect the raw data that it then consolidates it in many different dimensions, with
about 40 pre-defined report templates.
ip|reporter is powered by InfoVista and embeds an InfoVista run time licence; this run time
provides all user functions in local, remote or client/server mode or with an HTML interface with
VistaPortalSE.
InfoVista can be provided with two different VistaFoundation platforms: VF0
(provided to most Ipanema customers) and VF4 (provided for MSPs/NSPs or
customers with very large networks only). Only VF0 platform is described in this
document. For VF4 information, please refer to the relevant Technical notes.
ip|export, an optional module of ip|reporter, allows automatic and dynamic export of any data
from any reports in text, CSV or Excel formats. It is designed for seamless inter-operability
between network measurement systems and Business Support Services.
SALSA architecture
1-10
Ipanema Technologies
October 2014
Ipanema System
A SALSA unified portal gives access to ip|uniboss, ip|boss, ip|dashboard and ip|reporter web.
A Domain selector (drop-down list) allows selecting the Domain to be configured (with ip|boss) or
monitored (with ip|dashboard) prior to connecting.
October 2014
Ipanema Technologies
1-11
Ipanema System
1. 2. GENERAL PRINCIPLES
1. 2. 1. System deployment
A Domain is made up of a set of Ipanema appliances and virtual machines positioned at the
measurement or control points of a network, in the same LANs as the CPE routers.
Their ip|agent software measure, control, compress and accelerate the network traffic on the entire
network.
One Domain has to be created by logical entity, using ip|uniboss software. Once created, it is
managed by a dedicated ip|boss instance.
System deployment
ip|agents belonging to the same Domain cooperate (distributed intelligence), but do not interact
with other ip|agents belonging to other Domains.
To measure, control and accelerate flows on a site with no ip|agent (no appliance nor virtual
machine), the user can declare a tele|engine on that site (in the same way as they would declare
a real ip|engine, in ip|boss). To make this possible, ip|agents must be present at the other ends
of the flows (measurement, control and acceleration will be performed by the remote ip|agents
indeed reason why such a site is also called a tele-managed site).
1-12
Ipanema Technologies
October 2014
Ipanema System
October 2014
Ipanema Technologies
1-13
Ipanema System
Service
L4
Port
ip|true
TCP
19999
ip|fast
UDP
19999
TCP
19996
ip|xcomp SRE
TCP
19988
UDP
19988
UDP
19987
ip|xtcp
ip|xapp
ip|sync (ITP)
UDP
19995
Clustering
UDP
19997
1-14
Ipanema Technologies
October 2014
Ipanema System
Service
L4
Port
Usage
HTTPS
TCP
443
FTP
TCP
2021
SSH
TCP
22
Telnet
TCP
23
Real-time
graphs
TCP
1999019993
Each ip|engine, nano|engine and virtual|engine hosts an HTTPS server accessible by ip|boss
for configuration and supervision. This server is reached on TCP/443 destination port (default value;
another value can be configured on request).
If remote connections (SSH and/or Telnet) are to be established from ip|boss (not mandatory, but
very helpful), then ports 22 (SSH) and/or 23 (Telnet) are also used. (By default, SSH is enabled on
all ip|agents, and Telnet is disabled.)
If ip|boss is used as an FTP server to download ip|agent software, then ports TCP/20 and 21 are
also used (they are not otherwise; the FTP server can be on other devices, such as an external
server or even an ip|engine, for instance).
The HTTPS server embedded in ip|agents is also used by ip|boss to retrieve the measures (pull)
(same port and remark as above).
Real-time measures are sent by the ip|agents on a unidirectional TCP connection to a predefined
destination port (in the 1999019993 range by default; other ranges can be configured).
The TCP source port is dynamically selected (a fixed port can be configured) by the transmitting
ip|agent.
October 2014
Ipanema Technologies
1-15
Ipanema System
1-16
Ipanema Technologies
October 2014
Ipanema System
1. 2. 3. Security
The Ipanema System provides robust security features (SSL, SSH, tools for key generation
and distribution, etc.) to protect the system against break-in and hostility threats. Authentication
mechanisms to access the different system elements, and between them, protect the system
against unauthorized accesses. Communication encryption between the system elements
protects the system against sniffing of configuration information or measurement results
exchanged between them.
Second level:
The customer defines their own certificate. This can be achieved either in ip|boss or using a
certificate generator. Certificate installation on ip|agents is managed from ip|boss and does
not require local access to the Ipanema appliances or virtual machines.
Communications are secured. Unauthorized people will not be able to enter the system nor to
read or interpret configuration or measurement data.
Third level:
The customer defines their own certificate and an SSL passphrase. This requires not only an
ip|boss certificate installation, but also to have local access to all ip|agents in order to setup
the passphrase configuration.
Communications are secured. Combination of certificate and local passphrase provides the
highest level of security.
October 2014
Ipanema Technologies
1-17
Ipanema System
1. 3. FEATURES DESCRIPTION
1. 3. 1. Application Visibility (ip|true)
The primary goal of Application Visibility is to understand application usage and performance
over the entire network.
To reach that goal, applications are classified in Application Groups (AGs), and each AG
has specific QoS performance objectives (nominal bandwidth per session and two thresholds
objective and maximum for one-way-delay, jitter, packets loss, RTT, SRT and TCP
retransmission ratio), thus allowing to check whether performance objectives are met or not, and
to calculate an Application Quality Score (AQS) accordingly.
Ipanema Application Visibility is:
1-18
Ipanema Technologies
October 2014
Ipanema System
AQS
Individual measurements are aggregated and analyzed according to multiple criteria (source and
destination sites, source and destination subnets, Application Groups, applications, etc.). The
results are presented in the form of detailed flows lists, real-time graphs, charts, etc., and archived
with periodic aggregation (in hourly, daily, weekly and monthly reports). They are made available
for subsequent processing or reference, and can be used to generate alarms, analyze long-term
trends, forecast future traffic increase to estimate optimum network sizing, etc.
Users can specify their own aggregation criteria, thus taking into account their enterprise
organization (e.g. the different countries, departments, services, etc.).
The following system elements are involved:
filtering of IP v4 packets,
classification and filtering of packets according to their types:
correlation, to calculate the one-way metrics (Delay, Jitter and packet Loss), when both the
source and the destination of the flow are equipped with Ipanema appliances or virtual machines
(this condition is necessary); this operation is achieved in four steps:
1. when the packet is sent and crosses the upstream ip|agent, the latter calculates a
signature (hash) and stores it locally,
2. when the packet is received and crosses the downstream ip|agent, the latter
calculates a signature (the same one),
3. once a second, the downstream ip|agent sends its signatures back to the upstream
one, in a compact Ticket Record.
Ticket Records have an average length of 300 bytes and the overload they generate
is approximately 2% of the measured traffic (<< 2% on large sites, due to statistical
reasons the more the traffic, the less the overload).
4. the upstream ip|agent correlates the signatures it has calculated with the signatures it
has received from the downstream ip|agent (the two ip|agents must be synchronized),
October 2014
Ipanema Technologies
1-19
Ipanema System
Thanks to this correlation mechanism, the upstream ip|agent knows how many packets have
been received and when they were received, thus allowing it to calculate the flows D/J/L.
Correlation mechanism
Then ip|agents output measurement tickets (Correlation Records), when polled by ip|boss
Collector, every minute (or every 5 minutes on very large networks; this parameter Collect
is set at the Domain level in ip|uniboss).
(ip|boss will store the information in a MIB, depending on the created MetaViews (see the reports
configuration in ip|boss) and in ip|dashboards database, and ip|reporter will poll ip|bosss MIB
using SNMP to aggregate the information and generate the reports; see below.)
1-20
Ipanema Technologies
October 2014
Ipanema System
1. 3. 1. 2. Considerations on fragmentation
Transmitting large packets on the network can degrade the quality of service for applications,
particularly if access speed is low. IP protocol allows datagrams to be fragmented into several
packets (fragments). Fragmentation can be performed at different points, but is generally
performed:
Fragments are not reassembled on the network or in the router, but by the end station.
To keep measures consistent without making assumptions on whether and where fragmentation
occurred (before or after the first ip|agent), the Ipanema system performs measurements on the
datagrams. This choice allows the classification mechanisms to operate correctly, even though port
numbers of the TCP/UDP protocol are present only in the first fragment of a datagram.
This choice is also consistent with applications behaviors. Indeed, the user application must wait
for the datagram to be reassembled before it is able to use the data it contains. It is therefore the
reception of the last fragment that is important.
A datagram is considered to be lost as soon as one or more of its fragments is lost. In this case,
the datagram is not delivered to the transport layer by the destination terminal.
1. 3. 1. 3. Time synchronization
ip|engines, nano|engines and virtual|engines synchronization on the Domain is used for
correlation (see above), hence for Delay/Jitter/Loss measurement (and measurement only:
control, redundancy elimination, etc., do not require synchronization).
There are two synchronization layers:
Time servers
Synchronization servers
they must be ip|engines or virtual|engines of the Domain,
they will not use their local reference, except in case of Time servers failure,
they share their clocks with their peers (all other synchronization servers).
The Synchronization servers take their timing from the Time server and issue it to the rest of the
Domains appliances and virtual machines.
October 2014
Ipanema Technologies
1-21
Ipanema System
This two-layer model allows GPS-less yet precise synchronization across the whole Domain, out
of Domain synchronization and short term no time function (a Domain can be disconnected from
its Time server, thus improving resiliency).
1-22
Ipanema Technologies
October 2014
Ipanema System
the business criticality of the application flow (top, high, medium or low),
the bandwidth objective (bandwidth requirements of the application flow, necessary and
sufficient to provide it with good quality),
the traffic type (real time, transactional or background),
compression and acceleration capabilities,
thus allowing to the controlling agent (ip|fast) to protect the business critical flows dynamically and
efficiently, also taking into account the demand in real time (measured by ip|true).
There is no need to set low-level, network or device-specific policy rules.
business criticality: the higher the criticality of the flow, the more ip|fast will protect it;
bandwidth objective: bandwidth that ip|fast will try to provide to the application flow, even
when the available bandwidth is scarce; the higher the criticality of the flow, the more likely its
bandwidth objective will be met at all times;
traffic type: ip|fast will manage the priorities between the different queues depending on the
sensitivities of the flows to avoid Delay and Jitter on the sensitive ones, knowing that:
real time flows are sensitive to Delay and Jitter; examples: VoIP and Video conference,
transactional flows are sensitive to Delay (but not to Jitter); examples: Telnet, Citrix,
background flows are not sensitive at all; examples: file transfer, e-mail.
compression and acceleration capabilities: to know whether the flow can be compressed (with
ip|xcomp, see below) and/or accelerated (with ip|xtcp, see below).
Congestion anticipation and avoidance is performed by comparing the available bandwidth (or
network capacity) and the bandwidth used by all flows currently running (network usage).
The comparison is performed on the access links, ingress and egress, and possibly end-to-end
(namely if the available bandwidth between any pair of sites is not fix and guaranteed).
If the network usage reaches about 95% of the network capacity, then ip|fast triggers and starts
controlling the bandwidth allocation.
The network usage is known very precisely, thanks to ip|true who measures each and every
packet crossing the Ipanema appliance or virtual machine.
The network capacity is:
either fix (and defined in ip|boss, in the WAN access parameter),
or (if it varies) automatically and dynamically estimated by the Tracking function.
The Tracking function itself is activated in the WAN access window, where a maximum
and a minimum bandwidths can be defined:
if the minimum is set at a lower value than the maximum (min < max), then
the Tracking function will estimate the instantaneous bandwidth, at any moment,
between these two thresholds;
if the minimum is set at the same value as the maximum (min = max), then
the Tracking function is disabled, and the available bandwidth is considered as
constant.
It is also the Tracking function that anticipates and avoids end-to-end congestions.
October 2014
Ipanema Technologies
1-23
Ipanema System
ip|fast principles
ip|fast is completely transparent to the network (the CPE only performs IP routing
functions for network access) except when the Coloring function is used, in which
case the ToS field can be marked (see below).
ip|fast and CoS
If an operator offers different Classes of Service, assigning a CoS to the traffic becomes difficult. To
adapt to this constraint and allow full compatibility between Ipanemas traffic protection and the
operators policy, the Ipanema System can automatically color (or mark) the packets according
to the traffic Criticality and Type, using the ToS/DSCP field. The mode is Color-Blind (all packets
are treated as if they were uncolored: they are marked according to the selected coloring rule
regardless their initial color, if any).
Topology: how to control flows end-to-end, even in a full-mesh environment
From a topological point of view, as several access points may send data to the same destination
(and an access point may send data to several others), it can result in One-to-N or N-to-One type
congestions.
To solve the issue, ip|fast dynamically shares the global network available bandwidth to all active
sources, taking into account the traffic demand, network bottlenecks and N-to-N congestions.
This is made possible thanks to the permanent communication between ip|agents.
Summary
ip|fast can be summarized as follows:
it globally and dynamically controls bandwidth allocation between all access points,
it adapts QoS policies to current network performance and real user demand,
it selects, for each traffic flow, the right Class of Service in terms of performance,
based on:
1-24
Ipanema Technologies
October 2014
Ipanema System
1. 3. 3. 1. ip|xtcp
TCP was not designed for networks with a large BDP (Bandwidth-Delay Product, i.e. large RTT
and/or high available bandwidth) or with a significant Bit Error Rate:
TCP acceleration (ip|xtcp service) overcomes these two limitations, using an ip|agent on the
sender side (single-side technology). To achieve that goal, it is tightly coupled with ip|fast:
ip|fast knows the available bandwidth precisely, so we do not need the (old) TCP mechanism
to discover it,
thanks to ip|fast, ip|xtcp is able to provide the flows with just the right amount of acceleration
(accelerating flows too much could create congestion!), still guarantying critical applications
protection.
The key idea is, for each connection, to proactively enslave the TCP source rate to the ip|fast
computed rate for this connection.
1. 3. 3. 2. ip|xcomp
For many reasons, it can be difficult to increase the bandwidth of a link (cost, operator delay, etc.).
ip|xcomp overcomes this problem, by increasing the volume of traffic that can be sent on the
network. To achieve that goal, two different mechanisms are used:
The best mechanism is automatically selected for each flow, but it can also be forced by
configuration (in ip|boss), site by site and Application Group by Application Group.
ip|xcomp SRE also accelerates TCP, by using window scaling (RFC 1323) between the two
proxies.
ip|xcomp and ip|xtcp are mutually exclusive: when both are available, it is ip|xcomp that prevails
(ip|xcomp SRE also accelerates TCP anyway).
October 2014
Ipanema Technologies
1-25
Ipanema System
1. 3. 3. 3. ip|xapp
The ip|xapp service allows accelerating CIFS traffic.
CIFS stands for Common Internet File System, also known as SMB (Server Message Block). It is
a proprietary Network protocol, the most common use of which is sharing files on a LAN, but also,
due to Data Server Consolidation, over the WAN.
ip|xapp accelerates CIFS version (or Dialect) NT LM 0.12 (SMB1).
Deployment
CIFS Acceleration is a Client-side technology. So the typical deployment case uses ip|engines
installed near the CIFS clients, or IMAs on the hosts running them, therefore mainly in Branch
Offices.
CIFS acceleration and Redundancy elimination
ip|xapp and ip|xcomp are compatible. It is possible to compress accelerated CIFS traffic, both
with ZRE and SRE, in one, the other or both directions, depending on the Application Group CIFS
is matching, and on the local and remote sites compression/decompression capacities.
1-26
Ipanema Technologies
October 2014
Ipanema System
automatically and dynamically selects the best traffic path, according to Application Groups and
WAN accesses configuration,
the Ipanema appliance handles the dynamic traffic conditioning according to the destination of
the flows.
This maximizes application performance, security and network usage based on:
network capacity,
network availability,
network performance.
October 2014
Ipanema Technologies
1-27
Ipanema System
It is based on the smart|plan service, that leverages ip|fast and provides ip|reporter with further
metrics, allowing it to produce very high added value yet easy-to-use reports, enabling a complete
analysis of the relationship between bandwidth (resource) and delivered service level (results) for
each network access.
Using this information, it is possible to immediately decide if the access link is under-provisioned
or over-provisioned in regard of the expected service level per applications business criticality.
The data generated by the smart|plan service is available throughout the Ipanema System
components. ip|boss makes them available through the SNMP interface, ip|reporter uses them
to generate the appropriate easy-to-use reports and ip|export can export them in text or Excel
format for post-processing.
Thanks to the smart planning feature, the Ipanema system allows the best usage of the network
capacity according to the performance objectives, by enabling the user to select the best
cost/performance compromise based on application service levels.
1-28
Ipanema Technologies
October 2014
Ipanema System
1. 3. 6. Tele-managed sites
tele|engines were introduced for easier customer acceptance, in case of hub-and-spoke traffic
matrix, where they allow Application Visibility and Application Control features on sites that
are not equipped (no ip|engine, no nano|engine and no virtual|engine on the site).
To make this possible, ip|agents must be present at the other ends of the flows (measurement,
control and acceleration will be performed by the remote ip|agents indeed reason why such
sites are called a tele-managed site).
Unlike a physically existing ip|agent, yet, a tele|engine does not measure one-way-delays,
jitter and loss rates, nor does it accelerate the traffic (but traffic to a tele-managed site can
be accelerated); other metrics such as throughput, number of sessions, RTT, SRT and TCP
retransmissions can be computed remotely, so they are available on tele-managed sites.
tele|engines are configured through ip|boss just the same way as existing physical appliances
(ip|engine menu). Then Application Control can classify and control the traffic from or toward
these sites, according to the rules defined in the Application Groups. Traffic conditioning functions
are automatically instantiated upon traffic recognition.
Typical deployment cases:
ip|engines, nano|engines or virtual|engines on central sites and sites with meshed traffic,
tele|engines for small Branch Offices and simple traffic pattern.
With ip|coop option, a group of remote ip|agents cooperate (RCG: Remote Coordination Group)
for each tele|engine, to do what a local ip|agent would have done, namely:
The RCG is made of up to 8 ip|agents (on the 8 most active remote sites for each tele-managed
site) and is automatically and dynamically configured by ip|boss.
Thus, the contribution of each tele|engine can be precisely estimated so that congestion to and
from the remote site can be managed (as through a proxy).
tele|engines have some limitations, yet:
no Delay/Jitter/Loss measurement,
neither measurement nor control of shadow traffic (traffic between tele-managed sites),
end-to-end bandwidth Tracking is less efficient and less reactive,
no limitation of egress UDP traffic.
When ip|coop option is enabled, the number of tele|engines is controlled by ip|boss and defined
in the license file delivered to the customer. Without this option, the number is unlimited.
October 2014
Ipanema Technologies
1-29
October 2014
Ipanema Technologies
2-1
Ipanema System
SALSA portal
This page can contain (depending on the Users access rights):
2-2
the Domain selector: drop-down list allowing to choose the Domain to be configured (with
ip|boss) or monitored (with ip|dashboard) this selection is useless for ip|uniboss (as it
manages all Domains) and ip|reporter (as it allows browsing in all Domains depending on
the User rights with a folders structure playing the role of a Domain selector),
the welcome message for the selected Domain (it can be configured in ip|uniboss),
an ip|uniboss button, to open ip|uniboss client,
an ip|boss button, to open ip|boss client and configure the Domain selected in the Domain
selector,
an ip|dashboard button, to open ip|dashboard client and monitor the Domain selected in the
Domain selector,
an ip|reporter button, to open ip|reporter client and visualize the reports.
Ipanema Technologies
October 2014
either internal: authentication and authorization are performed by ip|uniboss internal LDAP,
or external: authentication is performed by an external LDAP or using the SAML service;
authorization is performed by ip|uniboss LDAP.
Users are configured using ip|uniboss GUI (see 3.6. MANAGING USERS).
When a User connects to the SALSA Web Portal:
Authentication can also be automatic (SSO), supplying the Users credentials in the
URL or passing the User name as an HTTP header, without authentication in that
case only permissions are checked, using the User name and group supplied in the
request headers. Refer to 3.6. MANAGING USERS to see how to configure SALSA
Apache server as required.
October 2014
Ipanema Technologies
2-3
Ipanema System
2. 3. SALSA URLS
All components of the Ipanema system (ip|uniboss, ip|boss, ip|dashboard and ip|reporter web)
can be accessed via SALSA unified client at this URL:
https://<ipanema_server>/salsa
It automatically redirects the User to the welcome page that contains the Domain selector
capability:
https://<ipanema_server>/salsa/salsa_portal/.
These components can also be accessed individually and directly at the following URLs (these
URLs are secured through LDAP-based authentication, therefore only unified users have access
to them; they are entry points for all SALSA components using SSO):
https://<ipanema_server>/salsa/...
ip|uniboss and ip|boss CLI clients are available at the following URLs:
If authentication is external, whatever the method (LDAP or SAML) it is always possible to use
an internal URL to perform authentication using SALSA users only. Internal authentication is not
impacted by the different external services. To use it, simply replace salsa by internal in
SALSA URLs (https://<ipanema_server>/salsa/...):
https://<ipanema_server>/internal/...
2. 4. LDAP AUTHENTICATION
LDAP authentication is performed in the Apache httpd server using mod_authnz_ldap. The
configuration for the module is located in production/ip_boss/izpack/httpd_ldap.conf.
Upon successful authentication, HTTP headers are added to the request that is forwarded to the
Tomcat server through an AJP connection (the configuration of the mod_proxy_ajp module is
located here ). These headers (x-6307-is-*) contain the profile of the authenticated user: name,
accessible domains, and access rights to ip|boss, ip|uniboss, and ip|reporter web.
When forwarding to external users URLs, the front end portal is expected to fill the x-6307-is
headers to provide information about the user it has authenticated.
2-4
Ipanema Technologies
October 2014
2. 5. 2. VistaPortal SE considerations
VistaPortalSE cannot deal with HTTP headers for authorizations. It uses internal files to manage
users (portalsesetup.xml, security.properties).
We have added a Tomcat valve that parses Ipanema HTTP headers coming from ip|uniboss
Apache server and maintains internal files model consistent with the Ipanema user permissions
and authorizations.
VistaPortalSE user internal representation is made by associating Users and InfoVista instances;
by this way it lets a user access to reports the Domains of which are located in different InfoVista
instances.
There is nothing particular to do for the valve installation; ip|reporter web installer is taking care
of installing and configuring the Ipanema valve in the VistaPortalSE tomcat, the only parameters
to provide are ip|uniboss LDAP connection parameters during ip|reporter web installation.
October 2014
Ipanema Technologies
2-5
3. 1. DOMAINS OVERVIEW
After ip|uniboss and ip|boss servers installation, you have to create a Domain to use the system.
A Domain is a coherent set of elements:
ip|boss,
ip|engines.
The Domains are hermetic, an ip|engine of a Domain cannot dialog with an ip|engine
of another Domain. An ip|boss server can manage several Domains; one instance per
Domain should be created.
The creation of a Domain is done only on the server.
To create a Domain launch ip|uniboss web client (a CLI client is also available).
October 2014
Ipanema Technologies
3-1
Ipanema System
3. 2. IP|UNIBOSS CLIENT
3. 2. 1. Connection to ip|uniboss
To connect to ip|uniboss server, click on ip|uniboss button in SALSA client:
SALSA client
The selected Domain has no impact, as ip|uniboss gives access to all Domains
(according to the User rights).
3-2
Ipanema Technologies
October 2014
A title bar, with Ipanema Technologies logo; closes all open windows when you click on it.
A tool bar, on the left: it is composed of icons which give access to the different screens of the
software.
A menu bar, on the top: it is composed of five menus, File, Edit, Display, Actions and ?.
A tab bar, below the menu bar: it shows all the open windows and allows to select any of them
without needing to reload it from the tool bar. The active windows tab is highlighted in blue.
October 2014
Ipanema Technologies
3-3
Ipanema System
About: shows information about ip|uniboss version and license information, and allows to
import a license.
Quit: quits ip|uniboss client.
3-4
Ipanema Technologies
October 2014
(search): to search object matching various criteria (see Edit > Search menu below),
(new filter): to filter the data (see View > Filter menu below),
(modify filter): to modify filters (see View > Filter menu below),
(sort by): to sort the data (see View > Sort menu below),
(choose columns): to choose the columns to display,
(save preferences): to save the view matching the filters, etc.; give the preferences a name
(Preference name) and select whether you want these to be your default view (checking the
Default preference box), the default view for mobiles (checking the Default preference for mobile
box), whether you want them to be accessible to other users (checking the Shared preference box)
and whether you want them to apply to this view only (checking the on this view radio button) or to
all views of the same type (checking the on views of the same type radio button); then a drop-down
list appears on the right (if no preference had been previously saved):
,
allowing selecting these preferences, other saved preferences, or displaying everything with no
filter (selecting All),
(delete preferences): to delete previously saved preferences.
Window
Edit: you can select an object by clicking on its line. To select other objects, you have to click on
their lines while pressing the Ctrl key. The Edit/Select all allows to select all the objects on the list.
The Edit/Unselect all allows to unselect all the selected objects. In the status bar, the number of
selected objects and the total number of objects is shown.
Search: to search for objects; opens a dialog box which allows to find all the objects with an
attribute containing the specified text. The navigation between the found objects is made with
the menus Edit > Next and Edit > Previous.,
October 2014
Ipanema Technologies
3-5
Ipanema System
View
Sort: to sort objects; by clicking on the header of a column, you sort the list according to this
column (by clicking again on the column, you change the order ascending-descending). By
clicking on several columns while pressing the Ctrl key, you make a sort on multi-columns.
These functions are also available with the menu Display/Sort.
Group by: to group objects by various criteria,
Filter: you can create some filters on the list which display only the filtered objects according to
the criteria. A simple filter works with only one field whereas an extended filter is a combination
of simple filters. When a filter is active, the number of displayed objects and the total number of
objects is written on the status bar.
New filter: to create a new simple filter,
Modify filter: to modify an existing filter,
Active filter: to activate or deactivate the selected filter.
Actions: allows to make all the actions achieved through the corresponding buttons:
Consult,
Clone,
Modify,
Delete.
About: shows the software version and license information (the same as the About button).
In some tables (Domains, ip|boss servers, etc.), an LED on the left gives the objects operational
states; for the Domains, it can be:
green (Started),
grey (n/a: disabled),
amber (Starting),
red (the number of ISUs exceeds the total ISU credit),
small and dark (when the Domain has just been created, before an Update has been applied).
It can be displayed by moving the mouse upon it:
3-6
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
3-7
Ipanema System
3. 3. IMPORTING A LICENSE
To create Domains, the license file license.ipmsys must be installed.
To get your license file, please contact the Ipanema Support service at the e-mail address
[email protected] or [email protected].
In the Toolbar, select
About:
It shows the software version and license information (maximum number of Domains, total ISU
credits (Ipanema Software Units), maximum number of ip|engines and tele|engines, authorized
features, etc.):
About menu
The total number of ISUs (Ipanema Software Units) can be allocated in a flexible way accross
different Domains; refer to the Create a Domain section below.
To import a license, click on the Import button, browse your folders and select the proper license
file (license.ipmsys).
(The license file is copied:
3-8
In each Domains directory (if Domains were already existing, for example when upgrading
from a version to a new one): ~\salsa\ipboss\server\domains\<Domain>\conf (on
ip|boss server).)
Ipanema Technologies
October 2014
3. 4. SYSTEM PROVISIONING
The procedures in this section and in the following ones are all based on ip|uniboss web client.
October 2014
Ipanema Technologies
3-9
Ipanema System
In the servers table, the LED on the left shows the compatibility status of the server; it can be:
green (Compatible) if the server is reachable and compatible with ip|boss; ip|boss
version, OS version and JRE version are polled and displayed:
small and dark (when the server has just been created, before an Update has
been applied: an Update
into account).
3-10
Ipanema Technologies
October 2014
3. 4. 2. Domains
The Domains window is opened when you start ip|uniboss client.
If other windows have been opened and if the Domains window is not the active one, click on
the Domains tab.
Domains.
3. 4. 2. 1. Create a Domain
Operating procedure table: service ip|reporter
A creation window opens where you can indicate your Domains characteristics:
October 2014
Ipanema Technologies
3-11
Ipanema System
3-12
Ipanema Technologies
October 2014
The General tab of the Domain creation window contains the following fields:
ip|boss server
ip|boss server: to choose the server that will manage the Domain (from a drop-down list).
In display mode, ip|boss version, OS version, JRE version and the Compatibility
status are polled from the server and displayed:
Domain ISU
Allocated ISU: to specify the number of Ipanema Software Units that are needed on that
Domain. Each function requires a certain number of ISUs, that can be purchased from Ipanema
(a new license file is then provided; refer to the Import a license section above). The number
of consumed ISUs and available ISUs for each Domain is displayed in the Domains windows.
In display mode, the Credit ISUs (as a percentage of the total number of ISUs
accross all Domains), the Consumed ISUs (according to the activated services
and WAN accesses bandwidths) and the number of Available ISUs (= Allocated
Consumed) are computed and displayed:
Access port: port used by the client for that Domain (0 by default 0 stands for a dynamic
port).
Reversor enabled:: to enable the reversor for that Domain.
October 2014
Ipanema Technologies
3-13
Ipanema System
SNMP Parameters
This frame allows configuring the SNMP agent of ip|boss:
SNMP IP Address: to specify the SNMP agent (ip|boss) to be polled by the SNMP Manager
(ip|reporter). By default, it is the same as ip|boss servers. You can specify a different one
in case of multiple interfaces on ip|boss, or a servers cluster (declare the clusters virtual IP
address).
Community name: to specify the community name (public by default).
ip|reporter parameters
This frame allows configuring ip|reporter in order to create/delete reports in InfoVista Server:
Mode: the version of InfoVistas VistaFoundation platform must be specified here: it can be VF0
or VF4, according to the version that was installed. If you dont have any ip|reporter server,
select Disabled.
The next field depends on the selected VistaFoundation platform:
If you are using VF0: IV Server allows to select an InfoVista from the drop-down list.
If the InfoVista server you want to use has not been created yet, you can create it from
this window, by clicking on the New button next to the selection box. Alternatively, you
can use the IV Server function in the Reporting provisioning menu (described below).
If you are using VF4: Group allows to select a servers Group from the drop-down list.
If the servers Group you want to use has not been created yet, you can create it from this
window, by clicking on the New button next to the selection box. Alternatively, you can
use the Server Group function in the Reporting provisioning menu (described below).
Logo URL: to customize the logo in the reports (one logo per Domain). The size of the logo
should not exceed 150 x 80 pixels; most common formats are supported (gif, jpg and png). This
logo will be visible only through a web access.
Tuning
This frame allows configuring the maximum number of Application Groups and User subnets,
the HTTP timeout and the data collection periods between ip|boss and ip|engines and between
ip|reporter and ip|boss, and used as the reporting polling period:
Maximum number of Application Groups: the administrator can limit the number of
Application Groups; -1 (default value) allows an infinite number,
Maximum number of User subnets: the administrator can limit the number of User subnets;
-1 (default value) allows an infinite number,
HTTP timeout: the timeout (in seconds) used on HTTP (or HTTPS) request; the time entered
must be consistent with the network (more than the max. RTT for the most distant ip|engine),
Supervision: the polling period of ip|engine updated status (default values should be used):
1 mn: ip|boss collects the supervision status every minute (default value),
5 mn: ip|boss collects the supervision status every 5 minutes,
15 mn: ip|boss collects the supervision status every 15 minutes.
Collect: the elementary period of the Correlation Records generation (packets collected during
the specified time) and collect period for ip|boss (default values should be used):
1 mn: ip|engines make a CR and are polled every minute (default value),
5 mn: ip|engines make a CR and are polled every 5 minutes,
15 mn: ip|engines make a CR and are polled every 15 minutes.
3-14
Ipanema Technologies
October 2014
This parameter is used for ip|dashboards real time flows updates and corresponds
to ip|boss alarms Trigger occurrences.
Short reporting: update period for clients of collector service (SNMP agent) for short period
reports (default values should be used):
1 mn: the SNMP data are updated by ip|boss every minute (default value),
5 mn: the SNMP data are updated by ip|boss every 5 minutes,
15 mn: the SNMP data are updated by ip|boss every quarter .
This parameter is used for some reports in Ipanema Libraries like Time Evolution,
Detailed per Application, Detailed per Application Group, ....
Long reporting: update period for clients of collector service (SNMP agent) for long period
reports (default values should be used):
5 mn: the SNMP data are updated by ip|boss every 5 minutes,
15 mn: the SNMP data are updated by ip|boss every quarter (default value).
This parameter is used for some reports in Ipanema Libraries such as dashboard,
Site Talker/Listener, Subnet Talker/Listener....
User management
The seventh and last frame allows enabling Remote Authentication Dial-In User Service accounting
for the Domain:
Radius Accounting: to enable (when the check box is enabled) or disable (when the check
box is disabled) RADIUS accounting.
To see the RADIUS parameters, please refer to the Create Radius servers section below.
October 2014
Ipanema Technologies
3-15
Ipanema System
The Storage tab allows setting the data lifetime in ip|dashboard: up to 3 days of per-minute data
(i.e. the last 72 hours, or 4320 minutes of measured traffic) can be stored in the database and
displayed.
Per minute data lifetime (in hours, between 3 no history beyond the last 3 hours and 72):
number of hours of per minute data in all evolution quadrants, when the selected time span is
the minute (then they display 3 hours of per minute information),
Per minute application flows lifetime (in hours, between 0 no history and 72): number
of hours of per minute data in the flows lists, when the selected time span is the minute (then
they display values averaged over a minute),
Per hour data lifetime (in days, between 0 no hourly aggregation and 3): number of days
of aggregated data in all evolution quadrants, when the selected time span is the hour (then
they display 3 days of hourly aggregated information),
3-16
Per hour application flows lifetime (in days, between 0 no hourly aggregation and 3):
number of days of per minute data in the flows lists, when the selected time span is the hour
(then they display values averaged over an hour),
Ipanema Technologies
October 2014
Disk size limit (in Bytes, KB, MB, GB, TB); syntax: the desired value followed by the prefix
multiplier (B, K, M, G or T) with no space (e.g. 500G): provided storage lifetimes are configured,
an additional Disk size limit can be set as a safety net. History does not go beyond the first of
the two limits being met (e.g., if the disk used meets the Disk size limit after 2 days, the new
data will replace the 2day old data, thus keeping 2 days of information only, even though the
Per hour lifetimes have been set to 3 days).
Whatever the configuration, data collection will stop if more than 90% of the physical
hard disk capacity is used.
Technical Notes can help you size the server resources (CPU, RAM, HD) depending
on various factors, such as the number of Domains, the number of Sites, data
lifetime, etc.
Default parameters
When migrating a Domain from SALSA v7 to SALSA v8, the default values are: 3, 0, 0, 0, which
is completely equivalent to what we had in SALSA v7 (no history and the time span could not
be set it was a minute as there was no hourly aggregation).
When creating a new Domain, the default values are: 3, 3, 3, 3 (3 hours of history in the flows
lists, hourly aggregation during 3 days).
The Domains parameters can be read in the Domains window and in the Inventory window.
October 2014
Ipanema Technologies
3-17
Ipanema System
After a Domain creation (HMS in the example below) the following directory tree is created on
ip|boss server (by default in ~\salsa\ipboss\server\domains\):
3. 4. 2. 2. Move a Domain
Refer to the document DomainMove.pdf provided on the DVD-ROM, in the \doc directory.
3-18
Ipanema Technologies
October 2014
3. 4. 3. Radius
The Radius feature allows the user to:
The Radius configuration is common to all Domains. For each Domain, the Radius management
can be activated or not (refer to the Create a Domain section above).
If the Radius management is not activated, or if all declared Radius servers are unreachable, we
automatically fall back to the embedded ip|boss users management mode.
The Radius window can be displayed by clicking on
Radius window
This window contains two tabs: Configuration and Accounting servers.
Configuration
Retry: number of times the server will attempt to contact the Radius servers before falling down
to the embedded ip|boss users management mode; default value is 3;
Timeout: time interval in seconds to wait for the Radius server to respond before a timeout;
default value is 10 seconds;
Dead time: duration between two accesses to an unreachable Radius server (a server is
considered unreachable when the configured number of retries has been reached without
receiving a response within the specified timeout); value 0 means that a server is never
removed from the list of available servers; default value is 10 minutes;
Selection algorithm: allows to choose between a serial and a round-robin algorithm to select
the server, when there are several ones:
serial: the available servers are used one after the other, using the configured timeout
and retry. The order is based on the priority attribute: the lower priority value is taken
first.
round robin: the available servers are used randomly, using the configured timeout
and a retry set to 1. When all servers have been tried, a second loop is done, and so
on depending on the retry value. The order is based on the priority attribute: the lower
priority value is taken first.
Accounting servers
October 2014
Ipanema Technologies
3-19
Ipanema System
3-20
Priority: value between 0 and 32767 used to define different priority levels between the different
servers, when there are several ones; the higher the value, the lower the priority; default value
is 10,
Name: name you want to give the server (50 characters max); names must be unique across
the servers dictionary,
Host name: IP address or host name of the server (50 characters max),
Port: port on which the server is listening to accounting requests (generally UDP/1646),
Shared secret: shared secret for Radius authentication; it must consist of 15 or fewer printable,
non space, ASCII characters; it should have the same qualifications as a well-chosen password.
Ipanema Technologies
October 2014
3. 5. REPORTING PROVISIONING
The Reporting provisioning menu contains four functions: ip|reporter web portals, VistaMart,
Server Group and IV Server.
It allows to configure the ip|reporter components, which differ according to InfoVista platform being
used (VistaFoundation 0 or VistaFoundation 4):
October 2014
Ipanema Technologies
3-21
Ipanema System
3-22
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
3-23
Ipanema System
VistaMart window
This window shows all created VistaMart servers in a table with 7 columns:
3-24
grey (when a new VistaMart server has been created but before the configuration
has been updated),
Host name,
Version: VistaMart version (this piece of information is polled from the server),
Description: description for the VistaMart server,
Port: port being used to access the VistaMart server,
Login: login to the VistaMart server,
ip|reporter web portal: ip|reporter web portal that runs the VistaPortal attached to the
VistaMart server.
Ipanema Technologies
October 2014
Host name,
Description: a short description can be written for each VistaMart server,
Port: port being used to access the VistaMart server; default value is 11080,
Login: login to the VistaMart server; default login is vmar_operator,
Password and Confirm password: the password, if any, must be typed in twice,
ip|reporter web portal: the ip|reporter web portal that runs the VistaPortal attached to the
VistaMart server can be selected from a drop-down list. A new ip|reporter web portal can be
created using the New button next to the selection box. It opens the same creation window as
described in the previous section.
October 2014
Ipanema Technologies
3-25
Ipanema System
3-26
Ipanema Technologies
October 2014
3. 5. 4. IV Server
The IV Server window can be displayed by clicking on
IV Server window
This window shows all created IV Servers in a table with 12 columns:
Basic contains the following parameters: Host name (mandatory), Server Group (VF4
only, mandatory), Description (not mandatory), Username (default value: administrator;
mandatory), Password (there is no password by default for the administrator login; not
mandatory) and ip|reporter web portal (VF0 only, not mandatory)
October 2014
Ipanema Technologies
3-27
Ipanema System
Advanced contains the following parameters: Viewer username (VF4 only, default value:
viewer; mandatory), Viewer password (VF4 only, not mandatory), Port mapper (default
value: 1275; mandatory), Manager (not mandatory), Collector (not mandatory), Browser (not
mandatory)
All these parameters are described above. There is one more field, at the top of the creation window,
to select the VistaFoundation version:
Mode: select either VF0 or VF4 with the radio buttons, according to InfoVistas platform version
being installed.
3-28
Ipanema Technologies
October 2014
3. 6. MANAGING USERS
UNIFIED USER MANAGEMENT
SALSA can be configured to enable different types of user accesses to its resources:
Internal or external:
internal:
authentication and authorization are performed by ip|unibosss internal LDAP; Users
only have to be declared in ip|uniboss (see 3.6.1.);
external:
authentication is performed by an external LDAP (see 3.6.5.) or using the SAML
service (see 3.6.6.);
authorization is performed by ip|unibosss LDAP, at the Users (see 3.6.1.)
and/or at the User Groups (see 3.6.2.) levels; when defined at both levels,
authorizations are merged.
If authentication is external, whatever the method (LDAP or SAML) it is
always possible to use an internal URL to perform authentication using
SALSA users only. Internal authentication is not impacted by the different
external services. To use it, simply replace salsa in SALSA portal URL
(https://<salsa_server>/salsa/salsa_portal/) by internal
(https://<salsa_server>/internal/salsa_portal/) this also applies
to all URLs used in the SALSA suite.
Manual or automatic:
manual:
users supply their credentials on logging in SALSA portal (no configuration is required
in SALSA this is the default);
automatic:
the users credentials can be supplied in the URL (see 3.6.3.) or the user name can
be passed as an HTTP header, without authentication only permissions are checked
using the user name and the group supplied in the request headers (see 3.6.4.).
The sections below describe how to configure SALSA to enable these different accesses to its
resources:
3.6.1.
3.6.2.
3.6.3.
3.6.4.
3.6.5.
3.6.6.
October 2014
Ipanema Technologies
3-29
Ipanema System
External Users can belong to User Groups (see the next section), in which case they
do not have to be created as (individual) Users with the procedure described here. If
they are defined at both levels, their authorizations are merged.
Users window
This window shows a table with the following columns:
(*): Access is granted when these columns display access, it is denied when they are blank.
3-30
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
3-31
Ipanema System
ip|uniboss
ip|uniboss rights: allows to give read only or read/write access to ip|uniboss (no access at
all by default).
domains
This frame allows restricting the User access on certain Domains only when they use ip|boss,
ip|dashboard or ip|reporter (this frame does not affect ip|uniboss, as ip|uniboss is the piece of
software that allows creating Domains so it shows them all):
All domains: if the box is checked , then the User is granted an access to all Domains; if not,
they are only granted an access to the Domains selected below,
Domains: allows specifying which Domains the User can access (greyed if the previous check
box has been selected).
The left frame shows the Domains the User can not access (all existing Domains before
any selection has been made),
the right frame shows the Domains the User can access.
One can grant the User access to one or more Domains by moving them from one frame to the
other:
Click All Domains above the left frame
3-32
Ipanema Technologies
October 2014
All Domains
to move all Domains to the right frame (the User will have access
to all Domains)
to move the Domains selected in the left frame to the right
(i.e. to grant the access to these Domains)
to move all Domains to the right frame
(it is equivalent to selecting the All domains box, but for the already
existing Domains only)
to move the Domains selected in the right frame to the left
(i.e. to deny the access to these Domains)
to move all Domains to the left frame
(the User will not have access to any Domain!)
ip|boss
ip|boss access: checking this box grants access to ip|boss; then the access levels must be
specified for each menu (below);
System administration, Service activation, Supervision, Reporting, Application
provisioning and System provisioning: if access is granted to ip|boss (above), one must
select the access level for each of the six ip|boss menus from the corresponding drop-down
list (read only or read/write; blank by default i.e. no access);
ip|dashboard
ip|dashboard access: checking this box grants access to ip|dashboards basic functions, i.e.
all views and functions except the Discovery, Real-time Flows, Real-time Graphs and SSL
configuration; access to these views and functions can be set independently, thanks to the
following check boxes:
Discovery, Application Flows and Real-time Graph: checking these boxes grants access to
the corresponding function and views;
SSL Configuration: checking this box allows the User to enter the SSL certificate necessary
to accelerate SSL traffic;
iPhone
iPhone access: checking this box grants access to the simplified dashboard thanks to the ad
hoc iPhone application.
ip|reporter
ip|reporter access: checking this box grants access to the reports; access rights can be defined
precisely thanks to the following filters (note that they are case sensitive):
MetaView: one can grant the User an access to the reports on certain MetaViews only.
Syntax in VF0:
Examples:
Site: reports on all Sites (but on Sites only)
Domain|Site: Domain and Sites reports
Application Group.*Internet: reports on AGs containing Internet
October 2014
Ipanema Technologies
3-33
Ipanema System
Syntax in VF4:
*: any text string
Period: access to the reports can be per periods (hour, day, week, month).
Report: one can give the User an access to certain reports only.
*: grant an access to all reports (default value)
|: OR logical operator (VF0 only)
Example (in VF0): slm|sla grants an access to the SLM and SLA reports only.
Note: combining the three previous filters allows defining the access rights very precisely. For
instance, one can grant an access to one report only. E.g., to grant access to SLM - Application
Synthesis monthly report, on Site HQ (mind the case sensitivity!):
MetaView: Site.*HQ
Period: month
Report: slm - application synthesis
Navigation mode (VF0 only): one can choose between three values:
All: the User can navigate in the Sites reports using either the Sites MetaViews folders
or the two Navigation hierarchical levels (called Folder and Subfolder in ip|engines
window),
No navigation: the User can navigate in the Sites reports using the Sites MetaViews
folders only (they cannot select Navigation and navigate using the two Navigation
hierarchical levels),
No Folder: the User can navigate in the Sites reports using the two Navigation
hierarchical levels only (they cannot select Folder and navigate using the MetaViews
folders, so they cannot access reports other than Sites reports the only ones that
are accessible through the Navigation menu).
Folder (VF0 only) and Subfolder (VF0 only): for Users who navigate using the Navigation
menu, one can specify which Folders and Subfolders (as defined in ip|engines creation window,
e.g.: Continents and Countries) they can access (the default is *, i.e. any string of characters).
Scope: one can give the User an access to
the public reports only (by selecting public),
or to the private reports only (by selecting private),
or to both the public and the private reports (by selecting All).
When a User is created, they have no access to any component, by default.
3-34
Ipanema Technologies
October 2014
(*): Access is granted when these columns display access, it is denied when they are blank.
October 2014
Ipanema Technologies
3-35
Ipanema System
Users
All users: if this box is checked, all the Users will belong to that Group.
Internal users: allows specifying which internal Users (created in ip|unibosss embedded
LDAP) belong to that Group:
The left frame shows the internal Users who do not belong to that Group,
the right frame shows the internal Users who do belong to that Group.
One can include or more Users in the User Groups by moving the Users from one frame to the
other using the different arrows:
to move all internal users to the right frame
to move the internal users selected in the left frame to the right
(i.e. include them in the User Group)
to move the internal users selected in the right frame to the left
(i.e. to exclude them from the User Group)
to move all internal users to the left frame
(there will be no internal user in that Group)
External users: allows creating, modifying or deleting external Users (i.e. Users defined in
external LDAPs).
You can create an external user in the Group with the
opens, where you have to specify the User name:
3-36
Ipanema Technologies
October 2014
The name you choose here must match the name of the User in the external LDAP:
on the User logging, if external, then their name will be passed onto the external
LDAP for authentication, prior to authorization according to their rights as defined in
ip|uniboss (either at the User level, or for the Groups they belong to).
External users can be modified or deleted with the ad hoc buttons (
Modify /
Delete).
When a User Group is created, they have no access to any component, by default.
October 2014
Ipanema Technologies
3-37
Ipanema System
The resulting parameter string for a user administrator using password admin is:
ip_auth=Basic%20YWRtaW5pc3RyYXRvcjphZG1pbg==
The resulting URL for this user to access SALSA portal is:
https://<salsa_server>/ipaas/salsa_portal
/?ip_auth=Basic%20YWRtaW5pc3RyYXRvcjphZG1pbg==
It is also possible to use this syntax with all components of the SALSA suite. For instance, to access
the reports of Domain ACME:
https://<salsa_server>/ipaas/ipreporter_portal/ACME
/?ip_auth=Basic%20YWRtaW5pc3RyYXRvcjphZG1pbg==
3-38
Ipanema Technologies
October 2014
Value
Status
Description
REMOTE_USER
User name
mandatory
x-6307-is-user-profile
optional
The permissions are computed using the SALSA groups defined in ip|uniboss (see 3.6.2. System
administration: User Groups) that meet one of the following conditions:
the External users list contains the user name (supplied by the REMOTE_USER header),
the name is equal to the user group name (supplied by the x-6307-is-user-profile header).
All authorizations given to these groups are merged to determine the user permissions.
October 2014
Ipanema Technologies
3-39
Ipanema System
or in the URL (if the service has been activated, see the
the authentication phase. The first check is done using
not found or the password doesnt match then a second
LDAP.
Example with an active directory deployed on my-adserver with the base directory for the search
DC=mycompany,DC=local:
AuthLDAPURL "ldap://my-adserver/dc=mycompany,dc=local?sAMAccountName?
sub?(objectClass=user)" NONE
apache/conf/extra/httpd-salsa-externalLDAPAlias.conf file
AuthFormProvider ldap-internal ldap-external
SalsaAuthzExternalURL "ldap://my-adserver/dc=mycompany,dc=local?
sAMAccountName?sub?(objectClass=user)" NONE
SalsaAuthzExternalGroupClass group
SalsaAuthzExternalGroupAttribute member
apache/conf/extra/httpd-salsa-authz.conf file
if you use an active directory, you can speed up the authorization phase by
using the matching rule LDAP_MATCHING_RULE_IN_CHAIN to retrieve
groups of groups. In this case you must have the following lines in your
apache/conf/extra/httpd-salsa-authz.conf file:
SalsaAuthzExternalMaxSubGroupDepth 1
SalsaAuthzExternalGroupAttribute member:1.2.840.113556.1.4.1941:
3-40
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
3-41
Ipanema System
1. Provide the identity provider (IdP) metadata to the service provider (SP),
2. Activate the SAML module in SALSA Apache server,
3. Provide the service provider (SP) metadata to the identity provider (IdP).
More information on SAML, SP and IdP can be found here:
https://wiki.shibboleth.net/confluence/display/SHIB2
/UnderstandingShibboleth
On Windows, Shibboleth SP is not installed, so you have to install it (it is supplied on SALSA
installation DVD-ROM). During installation, check "Run as 32-Bit". The installer registers a new
service called Shibboleth 2 Daemon (Default).
(On Linux, Shibboleth SP is installed with the SALSA web server package (by default in
/opt/salsa/shibboleth-sp) but it is not started, so you have to start it.)
Step 1: provide the identity provider (IdP) metadata to the service provider (SP)
One way to configure the Shibboleth SP is described here, but you can find all information at
https://wiki.shibboleth.net/confluence/display/SHIB2/NativeSPConfiguration
To begin, you must save the metadata of the IdP on the disk where the SP has been installed. If
you use Shibboleth IdP, metadata are available at this URL:
https://IdPHostname:IdPPort/idp/profile/Metadata/SAML
1. Edit shibboleth-sp\etc\shibboleth\shibboleth2.xml;
2. Remove the <InProcess> XML tag;
3. Change the entityID attribute located in the <ApplicationDefaults> XML tag to one
that is appropriate for your service. An https:// URL is recommended, ideally containing a logical
DNS hostname associated with your service that will not change over time as physical servers
do.
4. In the <Sessions> XML tag, change the handlerSSL attribute value to true;
5. In the same tag, change the cookieProps attribute value to ; path=/; secure;
6. Replace the <SSO> XML tag with <SSO entityID="IdP entityID">SAML2</SSO>,
where "IdP entityID" is the entityID available in the IdP metadata file;
7. After the <Errors> tag, add a <MetadataProvider> tag to reference the IdP metadata
file:
<MetadataProvider type="XML"
file="D:/absolute/path/idp-metadata.xml"/>;
8. Save changes to the XML and restart the Shibboleth 2 Daemon service.
3-42
Ipanema Technologies
October 2014
Step 3: provide the service provider (SP) metadata to the identity provider (IdP)
1. Save the SP metadata file available at the following URL and copy it on the computer where
the IdP is installed:
https://<salsa_server>/Shibboleth.sso/Metadata;
2. Configure the IdP to reference this file;
Steps 3. and 4. are only to be taken if you use Shibboleth IdP.
3. Copy the SP metadata file (salsasp-metadata.xml) in:
C:\Program Files (x86)\Internet2\Shib2IdP\metadata\.
4.
Edit
C:\Program Files (x86)\Internet2\Shib2IdP\conf\relyingparty.xml to add the following information in <metadata:MetadataProvider
id="ShibbolethMetadata" ...>:
<metadata:MetadataProvider id="salsa-SPMD"
xsi:type="metadata:ResourceBackedMetadataProvider">
<metadata:MetadataResource xsi:type="resource:FilesystemResource"
file="C:/Program Files (x86)/Internet2/Shib2Idp/metadata
/salsasp-metadata.xml"/>
</metadata:MetadataProvider>
You need to know the OID of the attribute exposed by the IdP server that contains the list of
user groups (replace ATTRIBUTE_OID in the next step by this OID);
Edit shibboleth-sp\etc\shibboleth\attribute-map.xml and add the following
information in the <Attributes> XML tag:
<Attribute name="urn:oid:ATTRIBUTE_OID" id="memberOf">
<AttributeDecoder xsi:type="StringAttributeDecoder"
caseSensitive="false"/>
</Attribute>
This list of groups exposed by the IdP server is completed with the SALSA groups defined in
ip|uniboss where the External users list contains the user name. All authorizations given to these
groups are merged to determine the user permissions.
October 2014
Ipanema Technologies
3-43
Ipanema System
3. 7. SUPERVISION
The Supervision menu contains three functions: Inventory, Log and Issues.
3. 7. 1. Inventory
In the Toolbar, select
Inventory:
Inventory window
This window is made of two frames:
Domain inventory,
Topology inventory. This frame is contextual: if no Domain is selected in the previous frame,
it displays all Domains topologies; if one (or several) Domain(s) is (are) selected, it displays its
(their) topology(ies) only.
The
Print button prints all the columns of the selected Domain(s),
whereas the Action / Print menu prints the selected columns of all the Domains.
3-44
Ipanema Technologies
October 2014
3. 7. 1. 1. Domain inventory
This frame contains the following information:
Server
Manager port
Collector port
Browser port
Portmapper port
Supervision
Collect
Reporting short
Reporting long
Domain services: shows if the following services are started (Yes) or not (No):
Number of: shows the number of the following objects, with their totals on the last line:
ip|true
ip|fast
ip|coop
ip|xcomp
ip|xtcp
ip|xapp
smart|plan
ip|reporter
ip|export
smart|path
ip|engines
tele|engines
Automatic MetaViews
On demand MetaViews
Automatic reports
On demand reports
Application Groups
Topology subnets
User subnets
Applications
Storage: shows the Domains storage configuration (please refer to the Storage tab of the
Domains configuration window):
October 2014
Ipanema Technologies
3-45
Ipanema System
Per day data lifetime (unused in the current version will always show 0)
Per day rtf lifetime (unused in the current version will always show 0)
Reversor:
Enabled: Yes / No
3. 7. 1. 2. Topology inventory
This frame contains:
Domain name
ip|boss server
Appliance (software version, model and IP addresses are polled from the ip|engine; if it has
not been reachable, the field is blank):
WAN Access:
Total
Total
Total
Total
Domain: shows if the following services are started (Yes) or not (No) at the Domain level (in
ip|bosss Service Activation menu for most of them):
3-46
Name
Main public IP address
Main private IP address
Auxiliary public IP address
Auxiliary private IP address
LAN MAC address
Type: ip|engine or tele|engine
Enabled: Enabled (Yes) or disabled (No)
Software version
Hardware
Custom tag
ip|true: Yes / No
ip|fast: Yes / No
ip|xcomp compress: Yes / No
ip|xcomp uncompress: Yes / No
ip|xtcp: Yes / No
ip|xapp: Yes / No
smart|plan: Yes / No
smart|path: Yes / No
ip|true
ip|fast
ip|coop
ip|xcomp
ip|xtcp
ip|xapp
smart|plan
ip|reporter
ip|export
Ipanema Technologies
October 2014
3. 7. 2. Logs
In the Toolbar, select
Log:
the list of system events (on ip|uniboss server) with a time stamping,
the list of connections/disconnections to/from ip|uniboss with a time stamping.
The events are sorted by antichronological order, by default (the latest event is the first in the list,
at the top of the first page), but you can sort them by chronological order by clicking on the column
header (Messages).
If the list is displayed on several pages, you can select which page you want to see by clicking on
the page number at the bottom of the window.
You can also use the following arrows to navigate:
You can also click on a page number to jump to that page (the current page number is displayed
on the left, and underlined in the list of pages).
A field allows you to specify how many objects (events) per page you want to display (40 by default);
click on the Refresh button next to this field to apply a change:
October 2014
Ipanema Technologies
3-47
Ipanema System
3. 7. 3. Issues
In the Toolbar, select
display):
non
non
non
non
non
created Domains,
deleted Domains,
started Domains,
configured Domains,
reachable Domains.
3-48
Ipanema Technologies
October 2014
4. 1. CONFIGURATION OVERVIEW
Once your Domain has been created (refer to the previous Chapter) and before starting
a measurement, Application Control or optimization session, you have to parameter your
configuration (one configuration per Domain).
This configuration uses:
general settings for all functions (measurement, Application Control, redundancy elimination,
acceleration and smart plan) ensuring:
configuration of the Domains ip|engines and tele|engines,
configuration of the topology subnets associated with the ip|engines and tele|engines,
selection of applications, TOS and User subnets assigned to the session, according
to the specific features of the traffic to be measured, controlled, compressed or
accelerated,
specific settings that depend on customers requests, for measurement, Application Control,
redundancy elimination and acceleration features:
October 2014
Ipanema Technologies
4-1
Ipanema System
SALSA client
4-2
Ipanema Technologies
October 2014
A title bar with the logo of Ipanema Technologies; it closes all opened windows when you
click on it.
A tool bar, on the left: it is composed of menus and icons which give access to the different
functions of the software. It depends on the profile of the connected user.
A status bar, at the bottom: it gives the status and statistics on the system.
A working space (that displays the main image on login).
October 2014
Ipanema Technologies
4-3
Ipanema System
Toolbar
The buttons give a direct access to all functions of the system:
Global functions
Save/Update: saves/updates the configuration; flashes when an update is necessary,
Service activation: allows to activate all services:
4-4
Ipanema Technologies
October 2014
software upgrade
reboot
security status
advanced configuration
October 2014
Ipanema Technologies
4-5
Ipanema System
4-6
Ipanema Technologies
October 2014
Status zone
The status zone is made of four frames, showing the Domain name, LEDs and bargraphs.
Domain: <Domain_name>
Total throughput (Mbps)
Active flows
gauge displaying the current active flows (one flow = all sessions
of a given application, from a given source to a given destination)
measured by all enabled ip|true agents of the Domain (left) over
the peak flows measured since the session start-up (right).
No Topology alarm
ip|boss
This frame shows the state of the system with three colored LEDs:
Connection LED: shows the status of the connection between the client and the ip|boss server:
green
red
green
red
grey
amber
October 2014
Ipanema Technologies
4-7
Ipanema System
ip|reporter
This frame shows the state of ip|reporter with two colored LEDs:
green
yellow
red
grey
green
yellow
grey
red
ip|engine
This frame shows the status and activity of all ip|engines:
Reachable LED and bargraph: display the reachability status of all ip|engines:
green
red
grey
Overload LED and bargraph: display the overload status of all ip|engines:
green
red
no ip|engine is overloaded
some ip|es are overloaded (the WAN throughput exceeds the capacity
of the hardware)
displays the number of ip|es currently overloaded (left) upon the total
number of ip|es reachable (right).
4-8
Ipanema Technologies
October 2014
Synchronized LED and bargraph: display the synchronization status of all ip|engines:
green
yellow
red
grey
service start-up and the server is OK (*); all ip|es are synchronized
the server is OK (*) but one or several ip|es are not synchronized
(synchronization in progress, temporary synchronization loss)
the server is down (*) and no ip|e is synchronized
service is switched off or the status is not available
displays the number of ip|es currently synchronized (left) upon the total
number of ip|es reachable (right).
(*) ITP case.
Measuring LED and bargraph: display the ip|true status of all ip|engines:
green
yellow
one or several ip|true agents are not operational (not configured yet,
configuration refused or failure)
red
none of the ip|true agents are operational (not configured yet, configuration
refused or failure)
grey
Optimizing LED and bargraph: display the ip|fast status of all ip|engines:
green
yellow
one or several enabled ip|fast agents are not operational (not configured
yet, configuration refused or failure)
red
none of the enabled ip|fast agents are operational (not configured yet,
configuration refused or failure)
grey
October 2014
Ipanema Technologies
4-9
Ipanema System
Limiting LED and bargraph: indicates when a Local Traffic Limiting rule is active on an
ip|engine:
yellow
grey
ip|xcomp LED and bargraph: display the ip|xcomp status of all ip|engines:
green
yellow
red
grey
ip|xtcp LED and bargraph: display the ip|xtcp status of all ip|engines:
green
yellow
one or several enabled ip|xtcp agents are not operational (not configured
yet, configuration refused or failure)
red
none of the enabled ip|xtcp agents are operational (not configured yet,
configuration refused or failure)
grey
ip|xapp LED and bargraph: display the ip|xapp status of all ip|engines:
green
yellow
one or several enabled ip|xapp agents are not operational (not configured
yet, configuration refused or failure)
red
none of the enabled ip|xapp agents are operational (not configured yet,
configuration refused or failure)
grey
4-10
Ipanema Technologies
October 2014
A menu bar:
A tool bar with two parts:
A list of objects.
,
Selection: you can select an object in the list by clicking on its line. To select other objects, you
have to click on their lines while pressing the Alt key. To select an interval of objects, you select
the first then the last by clicking while pressing the Shift key. The Edit menu (see below) allows to
select/unselect all the objects on the list. In the status bar, the number of selected objects and the
total number of objects is shown.
Sort: you can sort the list according to one column by clicking on this columns header (by clicking
on the header a second time, you change the order ascending-descending). By clicking on several
columns while pressing the Ctrl key, you make a sort on multi-columns. These functions are also
available through the Display/Sort menu (see below).
October 2014
Ipanema Technologies
4-11
Ipanema System
Search: open a contextual dialog box which allows finding all the objects with an attribute
containing the specified text. The first matching object is highlighted in the table below.
Navigation between the found objects is made with the Next / Previous buttons.
4-12
Ipanema Technologies
October 2014
Sort: by clicking on the header of a column, you sort the list according to this column (by clicking
again on the column, you change the order ascending-descending). By clicking on several
columns while pressing the Ctrl key, you make a sort on multi-columns. These functions are
also available with the menu View > Sort > Sort by.
Sort the data (by any field or combination of multiple fields; other features in the Sort menu are
Invert sort (global), Sort by status (global) and Invert sort by status (global)),
The Invert Sort (global) sub-menu allows inverting the sorting criteria.
The Sort by Status (global) and Invert Sort by Status (global) sub-menus allow sorting by
Status.
Group by: allows grouping the data by any criteria.
Filter: create filters on the list which display only the filtered objects according to the selected
criteria.
October 2014
Ipanema Technologies
4-13
Ipanema System
Extended filter
Select the filter criteria that you need and use the Add, Ok, Apply and Close buttons to perform
the corresponding actions.
The Modify filter and Active filter sub-menus allow modifying filters and activating/deactivating
them. When a filter is active, a tip is displayed before theActive filter sub-menu, and the
number of displayed objects and the total number of objects is written on the status bar. You
can activate/deactivate a filter by double-clicking on the icon of the status bar:
The Actions menu allows to Consult, Clone, Modify, Delete and Change the administrative state
of objects. The list of actions is the same as you get through the context menu of the list.
4-14
Ipanema Technologies
October 2014
The tool bar contains the same icons for most windows:
(Consult): to consult an object (without modification capability),
(New): to create a new object,
(Clone): to create an object from another one,
(Modify): to modify one or more objects,
(Delete): to delete one or more objects,
(Change administrative state): to change the administrative state of one or more objects.
(Export): to export in a text file the content of a list.
(Import): to import the content of a list from a text file.
(Help): to go to the help page.
(search): to search objects matching various criteria (see Edit > Search menu above),
(new filter): to filter the data (see View > Filter menu above),
(modify filter): to modify filters (see View > Filter menu above),
(sort by): to sort the data (see View > Sort menu above),
(choose columns): to choose the columns to display,
(save preferences): to save the view matching the filters, etc. (see View > Preferences menu
above),
(delete preferences): to delete previously saved preferences.
October 2014
Ipanema Technologies
4-15
Ipanema System
4-16
Ipanema Technologies
October 2014
4. 3. 1. CLI architecture
ip|boss and ip|uniboss have a specific GUI client each, that uses CORBA over SSL to
communicate with a dedicated client request handler (called the Leonardi connector because
of the underlying technology).
Quite similarly, there is a CLI client for ip|boss and a CLI client for ip|uniboss. They communicate
exclusively with their respective CLI connector using CORBA over SSL. The best image to illustrate
what the CLI clients and CLI connectors are is to compare the CLI clients to Telnet clients and the
CLI connectors to remote shell services.
The CLI client/server protocol relies on three verbs:
Login
Logout
Execute
The client and the server exchange version information prior to the login request. This allows either
side to adapt to an older peer.
In its current version, the ip|boss CLI connector forwards login and logout requests to the targeted
Domains Leonardi connector, besides establishing its own session information and setting up
a session specific command parser that will process execute requests. If no specific Domain is
targeted, the ip|boss CLI connector will use the naming service to get a list of all running Domains
and will connect to the first available Domain (in alphabetical order) the provided credentials are
valid for.
The ip|uniboss CLI connector will forward the login and logout requests to the ip|uniboss Leonardi
connector.
Once the session is established, the CLI client acts a transparent upstream pipe between the client
systems keyboard or input file and the CLI connector and a transparent downstream pipe between
the CLI connector and the client systems display or output file.
4. 3. 2. CLI language
The ip|boss Leonardi connector essentially maps a Domains configuration to a set of object
classes and objects within each class. The ip|uniboss Leonardi connector does the same at a
higher level, where Domains are objects in a class. (This is very much akin to tables and rows we
are used to in DBMSes such as Oracle for example.)
The CLI language builds on this paradigm. The language basics are the same for ip|boss CLI and
ip|uniboss CLI. The difference currently only lies in the underlying schema - names of tables and
columns.
A CLI script is a (possibly empty) list of statements. A statement is always terminated by a ";"
(semicolon) character. The semicolon is not a statement separator but a statement terminator. The
difference is important, particularly for parser robustness sake. Having the semicolon act as a
statement terminator and not anything else makes error recovery much easier: eat and discard
input until you see the next semicolon and try to parse more statements from there.
CLI statements currently fall into 2 categories:
October 2014
Ipanema Technologies
4-17
Ipanema System
Create ( or insert),
Modify ( or update),
Delete,
List ( or select).
But there are not only similarities, there are differences too. CLI DML statements act on one table
or object class at a time, there is no such thing as a join. Future releases of CLI will make it easy
to clone objects, just overriding a few columns with specific values. That is not easy in SQL.
CLI offers fine grained control over error handling and logging because it is mainly targeted at
procedure automation versus ad hoc queries.
For the same reason, CLI not only produces tabular output but can also use tabular input in
statements
4-18
Ipanema Technologies
October 2014
4. 4. OPERATING PROCEDURE
The operating procedure consists of the following phases:
choosing a Domain,
creating a configuration or using an archived configuration, that is, specifying all ip|engines
and Domain settings (topology subnets, applications, Application Groups, Qos Profiles,
MetaViews....),
running a measurement, control, redundancy elimination or cooperative session, applied to the
Domain,
analyzing the results in real-time,
reporting configuration of measurement and Application Control (optional).
October 2014
Ipanema Technologies
4-19
Ipanema System
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
Manual procedure
Manual procedure
Coloring
WAN access
ip|engines
Topology Subnets
TOS
Applications
4-20
Ipanema Technologies
October 2014
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
Start a session
X
Topology Subnets
X
X
QoS profiles
Application Group
Modify reports
Reports
Update
Stop a session
Service activation, ip|engines: off
October 2014
Ipanema Technologies
4-21
Ipanema System
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
X
X
Start a session
X
ip|dashboard
X
ip|engines
X
QoS profiles
Application Group
User Subnets
X
X
Coloring
X
WAN access
X
X
Update
X
4-22
Ipanema Technologies
October 2014
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
X
X
Start a session
ip|dashboard
X
Update
X
Commands
ip|
true
ip|
fast
(1)
X
X
Start a session
X
ip|dashboard
Management by adjusting
redundancy elimination
settings: Application Group
Application Group
Management by adjusting
redundancy elimination
direction settings:
ip|engines
ip|engines
X
Update
X
October 2014
Ipanema Technologies
4-23
Ipanema System
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
X
X
Start a session
X
ip|dashboard
Management by adjusting
acceleration settings:
Application Group
Application Group
Management by adjusting
acceleration settings:
ip|engines
ip|engines
X
Update
X
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
X
X
Start a session
X
ip|dashboard
ip|engines
X
Update
X
4-24
Ipanema Technologies
October 2014
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
DWS
Start a session
Service activation, ip|engines: on
Management by adjusting
Dynamic WAN Selection
settings: Application Group
Application Group
Management by adjusting
Dynamic WAN Selection
settings: WAN access
WAN access
Management by adjusting
Dynamic WAN Selection
settings: ip|engines
ip|engines
Management by adjusting
Dynamic WAN Selection
advanced parameters:
Tools
Tools
X
Update
X
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
smart|plan service
Enable smart|plan for all
ip|engines
X
X
Start a session
ip|engines
X
Update
X
October 2014
Ipanema Technologies
4-25
Ipanema System
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
IMA service
Enable IMA for all ip|engines
X
X
Start a session
ip|engines
X
Update
X
Operations to be
performed
Commands
ip|
true
ip|
fast
(1)
ip| fast
(1)
ip|sync
Modify the session dynamically
Update
Operations to be
performed
Commands
ip|
true
Reporting
Define InfoVista server settings
Domain creation
4-26
Ipanema Technologies
October 2014
Operations to be
performed
Commands
ip|
true
ip| fast
(1)
ip|boss: management
Supervision management
settings (e-mail, SNMP trap)
Options
Log window
Log
Configuration history
Configuration history
Security configuration
Security
Certificate generation tab enerate the
keys and the certificates
Configuration tab hoose the encryption
algorithm
ip|engine status
ip|engine status
ip|engine status map
Security status
Tools, Status tab: displays the
security status of ip|engines
Discovering of applications,
subnets.....
ip|dashboard
Send results of script to
Ipanema support
Reboot ip|engines
Tools, Reboot tab
Quit the application
File/Exit
October 2014
Ipanema Technologies
4-27
Ipanema System
4. 5. 2. Open a configuration
Operating procedure table
To work with an existing configuration file, you must:
4. 5. 3. Save a configuration
Operating procedure table
The configuration file of the Domain (__active__.ipmconf) is automatically applied and saved
on the following actions:
Update/Save
In case of necessity (for backup), you should make the backup of this file from your
server to the media of your choice (do not backup the file while an update is pending
on the ip|engines).
Important reminder it is advisable to backup your configuration file in a different directory than
that used for installation in order to avoid deleting files during subsequent install.
4-28
Ipanema Technologies
October 2014
Undo table
If a modification has been carried out by another user in the interval, undo will not
operate.
October 2014
Ipanema Technologies
4-29
Ipanema System
In the window containing the objects you want to export, click on the Export icon
File menu, then Export. The following window opens:
or select the
Export window
Select the attributes you want to export by pushing them to the right with the double
right-pointing arrow (objects will be exported with all their attributes) or with the single arrow to
the right (objects will be exported with the selected attributes only). One attribute at least must
be selected (otherwise, there would be no data to be exported, at all; in that case, all of them
are exported, as if the double arrow had been clicked).
if some objects were selected before using the Export function, an Export selection check
box allows exporting selection only, If no object was selected or if the Export selection box is
not checked, all objects are exported.
Click OK. A dialog box appears, allowing you to either open the result file (_exportXXX.res)
or save it.
The first line of the result file (wrapped in the example below) is the description of the fields present,
and the subsequent lines are the exported objects with the selected attributes:
@ipboss_name|ipboss_topology_subnet_network_prefix|ipboss_topology_subnet
_prefix_length|ipboss_topology_subnet_site|ipboss_administrative_state|
Lan_Augsburg|10.49.4.0|24|Site\Augsburg|0
Lan_Bangalore|10.91.2.0|24|Site\Bangalore|0
4-30
Ipanema Technologies
October 2014
4. 6. 2. Importing objects
The following objects can be created by importing them from a configuration file: Coloring rules,
WAN accesses, ip|engines and Topology subnets.
All objects can be imported using the CLI client.
An existing configuration file in raw format (.res) can be imported. The first line must be the
description of the fields (it is present if the file was made with an export, see the previous section),
and all the subsequent lines are the objects to be imported (some may be already existing).
In the example below, we will import the previously exported file, where we manually added a new
object on the last line:
@ipboss_name|ipboss_topology_subnet_network_prefix|ipboss_topology_subnet
_prefix_length|ipboss_topology_subnet_site|ipboss_administrative_state|
Lan_Augsburg|10.49.4.0|24|Site\Augsburg|0
Lan_Bangalore|10.91.2.0|24|Site\Bangalore|0
Lan_Montelimar|10.33.3.0|24|Site\Montelimar|0
Import window
In the Import window that opens, you can choose which objects to display:
created (objects of the imported file not found in the actual configuration),
modified (objects different in the imported file and in the actual configuration),
deleted (objects of the actual configuration not found in the imported file),
unchanged (objects identical in the imported file and in the actual configuration).
October 2014
Ipanema Technologies
4-31
Ipanema System
Import window
The symbols before the objects indicate if they already exist (red cross) or if they are new
(new icon), etc. Hovering the mouse on these symbols allows reading their exact statuses in a
pop-up; clicking them adds or removes the object from the import file, depending on the case
(as indicated in the pop-ups text message).
A message tells you how many objects could be successfully imported; click on Ok.
If objects could not be created (already existing IP address for an ip|engine, for
example), an error message warns you.
4-32
Ipanema Technologies
October 2014
4. 7. SYSTEM PROVISIONING
4. 7. 1. Configuring Coloring
Operating procedure table: settings, ip|fast service
The Coloring Policy is used with Application Control. It is the capability to modify the TOS or DiffServ
field in the IP header with a new value according to the type and criticality of the packet.
The mode used is Color-Blind (in this mode, all packets are treated as if they were uncolored:
they are marked according to the selected coloring rule, regardless of their initial color).
ip|fast must be enabled.
Coloring:
Coloring window
October 2014
Ipanema Technologies
4-33
Ipanema System
input fields:
Name: to identify the coloring policy (string of characters). By default , the name none is
defined associated with an unspecified service type. The name is used to identify the
Coloring policy,
Service type: to select the type of coloring policy to set-up. The service is selected from
a drop-down list. The values offered are:
TOS: the TOS field of the frame is set to the value specified by the Code point
setting. It then contains the value of the IP PRECEDENCE and the TOS specified
for the Class of Service,
DiffServ: "Differentiated Service" type service. The TOS field of the frame is
set at the value specified by the PHB Group (DSCP) setting, in accordance
with RFC 2474 (definition of the Differentiated Services Fields (DS Field) in the
IPv4 and IPv6 headers), RFC 2597 (Assured Forwarding PHB group), RFC 2598
(Express Forwarding PHB group)
unspecified: not specified,
a Coloring zone: to define or modify the coloring for type of Traffic and Criticality level:
PHB Group (DSCP): when DiffServ is the Service Type selected, the value for each
peer (type of Traffic and criticality level) is selected with drop-down list,
Precedence/TOS (b0b7): when ToS is the Service Type selected,
4-34
a display zone in the form of a table corresponding to the data previously entered.
Ipanema Technologies
October 2014
Service type
PHB
group
DSCP
value
TOS value
Top
Express
Forwarding
EF
101110
EF
101110
Medium
EF
101110
Low
EF
101110
AF11
001010
AF12
001100
Medium
AF21
010010
Low
AF22
010100
BE
000000
High
BE
000000
Medium
BE
000000
Low
BE
000000
Top
High
Background
ToS default
setting
Criticality
level
High
Transactional
Top
Assured
Forwarding
Best Effort
Coloring rules can also be created by importing them from a configuration file. Refer to
section Importing objects.
October 2014
Ipanema Technologies
4-35
Ipanema System
WAN access:
4-36
Ipanema Technologies
October 2014
Ingress (LAN to WAN) max Bandwidth: maximum ingress throughput allocated at the WAN
interface of the CPE (in kbps),
Ingress (LAN to WAN) min Bandwidth: minimum ingress throughput that the tracking function
(see below) can track down (in kbps); if no value is entered, it is automatically set to half of the
max value,
Egress (WAN to LAN) max Bandwidth: maximum egress throughput allocated at the WAN
interface of the CPE (in kbps),
Egress (WAN to LAN) min Bandwidth: minimum egress throughput that the tracking function
(see below) can track down (in kbps); if no value is entered, it is automatically set to half of the
max value,
Coloring: selection, from a drop-down list, of the Coloring policy created in the Coloring
directory, to be applied. If there is no specific coloring (LS, Best effort), select "none". The
default is none.
Trust level: Routine or Business: in case of Dynamic WAN Selection (DWS), defines which type
of traffic is allowed to go through the Network Access Point (Routine and Business sensitivity
levels are also defined for each Application Group, where they are used in the path decision to
route traffic to a NAP with at least the same Trust Level).
Network Report key: this field allows ip|engines to be network aware in case of DWS: all WAN
accesses with the same Network Report key are attached to the same network, thus allowing
ip|engines to know which networks they have in common with the remote Sites (equipped or
tele-managed).
A WAN access which does not have the same Network Report key as the remote Site where
traffic is to be sent to (in the diagram below, the WAN access to Network 2 on ip|engine A, which
has to send traffic to B) will be classified as impossible, so the connectivity to this remote Site
via this WAN access will not even be tested (thus both simplifying the configuration and avoiding
errors for instance if a probing packet is forwarded to another WAN access).
October 2014
Ipanema Technologies
4-37
Ipanema System
Bandwidth tracking
Congestion detection is key to know when and where to manage flows. Network available capacity
may also vary in time (DSL link, Frame Relay access, secondary link with a bandwidth different
from that of the primary link, etc.). The purpose of Bandwidth Tracking is to automatically and
dynamically estimate the available network capacity:
Bandwidth Tracking
Bandwidth tracking principles:
Output:
Available bandwidth for each potential congestion point.
ip|engines manage three potential congestion points between any pair of sites:
4-38
Ipanema Technologies
October 2014
By setting a minimum bandwidth lower than the maximum bandwidth, the tracking function will
automatically and dynamically estimate the actual value of the bandwidth between those two
values:
By setting a minimum bandwidth equal to the maximum bw, the tracking function will not execute:
WAN accesses can also be created by importing them from a configuration file. Refer
to section Importing objects.
October 2014
Ipanema Technologies
4-39
Ipanema System
4-40
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
4-41
Ipanema System
Site name: character string used to identify the site the ip|engine belongs to (50 alphanumeric
characters max); if it is left blank, it is automatically filled in with the name of the ip|engine
(see below). Several ip|engines can belong to the same site (in case of clusters) so the Site
name does not have to be unique ; in this case, creating a report for the Site will automatically
create reports at the Site level (aggregating all the data from all ip|engines belonging to that
site) and on each individual ip|engine.
Local Internet Access: check the box if the Site provides an access to the Internet (avoids
having to use Out of Domain or to declare the 30 subnets of the Internet address space),
Folder: allows defining a first hierarchical level in the sites reports and in ip|dashboards flows
map,
Subfolder: allows defining a second hierarchical level in the sites reports and in ip|dashboards
flows map.
These two fields allow navigating in the reports (in ip|reporter) in two different ways:
The first browsing method does not use these two fields: by selecting Folders in
the drop-down list in ip|reporters main window, you can access the reports with the
following file system tree (4 hierarchical levels):
<Domain> / <type of MetaView> / <MetaView> / <time level, public/private>
As a consequence, in <Domain> / Sites, all sites are displayed together (sorted by
alphabetical order), without the possibility to sort them by geographical location for
instance:
4-42
Ipanema Technologies
October 2014
The ip|engines created without filling those fields are grouped under the Unknown /
Unknown folder and subfolder names.
This method is very helpful on large networks, with hundreds or thousands of sites.
ip|engine
Name: character string used to identify the ip|engine (50 alphanumeric characters max).
Several ip|engines can have the same Site name (in case of clusters of ip|engines on that
Site; see above). If it is left blank, it is automatically filled in with the IP address of the ip|engine.
Main public IP address: IP address of the ip|engine visible by ip|boss server for management
purposes (configuration, collection of the correlation records, supervision),
Main private IP address (if only the Main public address is declared, then the Main private
address is automatically allocated the same value): IP address of the ip|engine as it has been
locally configured (with the ipconfig command).
- In most cases (VPN, flat addressing, ...) only the Main public address is needed.
- In case of NAT, the two addresses must be different.
According to the MGT port being used or not, the Main addresses can be allocated to either the
LAN-to-WAN bridge (if the MGT port is not used in band management), or to the MGT port, if
used (out of band management):
October 2014
Ipanema Technologies
4-43
Ipanema System
4-44
Auxiliary public IP address (mandatory when the MGT port is used; must not be declared
otherwise): IP address of the ip|engine visible by other ip|engines for measurement (ip|true),
Application Control (ip|fast), redundancy elimination (ip|xcomp, signalling + tunnel), TCP
acceleration (ip|xtcp), CIFS acceleration (ip|xapp) and synchronization (ip|sync) purposes;
it allows for out of band management (using the Main address) but in band inter-ip|engines
messages (using the Auxiliary address),
Ipanema Technologies
October 2014
Auxiliary private IP address (option if only the Aux. public address is declared, then the
Aux. private address is automatically allocated the same value): IP address of the ip|engine as
it has been locally configured (with the ipconfig command) for the LAN-to-WAN bridge.
The Auxiliary addresses are allocated to the LAN-to-WAN bridge, when the MGT port is used (in
this case, the Main addresses are allocated to the MGT port). Refer to the second diagram above.
If no Auxiliary address is declared, the inter-ip|engines messages use the Main
address.
- In most cases (VPN, flat addressing, ...) only the Auxiliary public address is needed.
- In case of NAT, the two addresses must be different.
Report key: this field is optional. A report key field is used for SNMP and ip|reporter and
allows to define regrouping of ip|engines. An ip|engine belongs to only one regrouping.
For example, this field can be used to gather ip|engines according to:
a geographical criteria (all ip|engines in Europe, North America, Asia, Africa...).
the type of access line (all ip|engines with an access line at 64 kbps, 128 kbps, ....)
Auto-reporting: to allow (yes) or not (no) the reports created with the Automatic reporting
function to be added for this ip|engine. Refer to the Automatic reporting section.
tele|engine: check the box if there is no ip|engine on the Site (tele-managed site). A
tele|engine is characterized by an alias and an IP address; if no IP address is defined ip|boss
randomizes a virtual IP address with a 240.x.x.x prefix.
October 2014
Ipanema Technologies
4-45
Ipanema System
Path Selection: Disabled (default value): disables DWS and the multipath features:
4-46
Ipanema Technologies
October 2014
Make sure the throughput of the selected WAN access corresponds to the
actual throughput of the physical line, at layer 3. Should it not be the case,
congestions may not be detected, so ip|fast may not avoid them and may
not protect critical applications as expected.
Path Selection: TOS (ip|fast must be checked in the Services frame to allow selecting it):
allows configuring two or three WAN accesses for DWS, with their corresponding TOS values;
TOS values are chosen from a drop down list (xxxx01xx, xxxx10xx or xxxx11xx); the CPE router
has to be configured with the corresponding PBR rules, to route the packets accordingly:
October 2014
Ipanema Technologies
4-47
Ipanema System
Path Selection: CPE (ip|fast must be checked in the Services frame to allow selecting it): allows
configuring two or three WAN accesses for DWS, with the IP addresses of the corresponding
CPE routers:
4-48
Ipanema Technologies
October 2014
Path Selection: L1 Transparent (ip|fast must be checked in the Services frame to allow
selecting it): allows configuring two WAN accesses, managed independently, without path
selection (neither dynamic no DWS nor static) no attribute (TOS or CPE) is required:
Path Selection: L2 Transparent (ip|fast must be checked in the Services frame to allow
selecting it): allows configuring two or three WAN accesses with router-based path selection
(no DWS), with the IP addresses of the corresponding CPE routers:
October 2014
Ipanema Technologies
4-49
Ipanema System
The bandwidth is an important factor for Application Control: make sure all WAN
accesses are correctly configured.
Services
This frame allows defining the ip|engines capabilities. It contains the following check boxes:
Checking these boxes does not activate the corresponding services: it configures the
ip|engines to run them when they are activated in the Service activation window.
To enable all the following services, ip|fast must be enabled (all of them leverage
ip|fast).
4-50
Ipanema Technologies
October 2014
Advanced tab
This tab contains two frames:
By default, both methods of redundancy elimination are enabled (when ip|xcomp is checked in
the Services frame in the General tab).
We do not recommend to change the default settings without advice from the Ipanema
Support.
Custom
October 2014
Ipanema Technologies
4-51
Ipanema System
Topology subnets on equipped sites are automatically discovered by the system, so they do not
have to be configured. Yet, they can be configured, if needed.
If Topology subnets that have been automatically discovered are also
configured, it is the configuration that prevails.
If the discovered Topology subnets and the configured Topology subnets do
not match, an alarm is raised (see 5.2.1.2. Single ip|engine status).
Topology subnets that are discovered are not displayed in the Topology
subnets window.
SA Site throughput report and the Discovery feature help check the
Topology subnets on equipped sites.
Topology Subnets:
4-52
Ipanema Technologies
October 2014
Name: string of characters used to identify the Topology subnet (50 non extended ASCII
characters maximum),
Network prefix: Topology subnet prefix,
Prefix length: length of the prefix of the Topology subnet (value between 0 and 32),
Associated site: site this subnet belongs to, to be selected from a drop-down list.
Administrative State:
enable: Topology subnet taken into account,
disable: Topology subnet not taken into account.
Topology subnets can also be created by importing them from a configuration file. Refer
to section 4.6.2. Importing objects.
October 2014
Ipanema Technologies
4-53
Ipanema System
A Time server, which can be an external clock reference (NTP) or an ip|engine of the Domain,
is used as the main synchronization source,
Synchronization servers, which are ip|engines of the Domain (use several for redundancy
reasons), get their synchronization from the Time server and propagate it to all the other
ip|engines of the Domain,
All other ip|engines of the Domain get their synchronization from the Synchronization servers
(without any out of Domain connection).
This architecture allows GPS-less Domains, out of Domain synchronization and short term no
time function (a Domain can be disconnected from its Time server, the Synchronization servers
will remain synchronized to each other, thus making higher resiliency).
Time servers
Synchronization servers
4-54
Ipanema Technologies
October 2014
Configuration
In the System provisioning Toolbar, select
ip|sync:
Server: allows entering the IP address of an NTP server (several ones can be declared, but it
is not recommended); enter an address then click the + sign.
ip|engine: allows selecting an ip|engine as a time server (select one only).
Declare a Server or an ip|engine.
Select one or the other, do not select an NTP server and an ip|engine.
ip|engine: allows selecting ip|engines as ITP servers (choose three or four, for redundancy
reasons).
the right frame displays the selected ITP servers for the Domain.
October 2014
Ipanema Technologies
4-55
Ipanema System
4. 7. 6. Scripts
Scripts are described in the SUPERVISION section: 5.2.3. Scripts.
4. 7. 7. Tools
The System provisioning toolbar provides a
Tools
They are described in the following sections:
4-56
Ipanema Technologies
October 2014
Sensitivity policiy: matching Application Groups sensitivities with WAN accesses Trust Levels
depends on a policy which can be changed here.
Sensitivity policies allows to choose between three policies:
- Preferred
(default):
- Strict:
- Backup:
October 2014
Ipanema Technologies
4-57
Ipanema System
- no:
- yes
(default):
4-58
Return path:
- Per Packet:
- Per Session
(default):
Ipanema Technologies
October 2014
4. 8. APPLICATION PROVISIONING
4. 8. 1. Configuring User subnets
Operating procedure table: settings, ip|true service, ip|fast service
User Subnets can be used for Application Visibility and for Application Control, so as to identify
specific hosts, servers or subnets on which measurement, control or reporting is required. They can
be used as filters, once created, in the applications, Application Groups and MetaViews definitions.
User subnets are not mandatory. Create them only in case of specific subnets or hosts.
User subnets:
October 2014
Ipanema Technologies
4-59
Ipanema System
TOS:
Configuring TOS
TOS that are not explicitly named in the dictionary are implicitly grouped into the Other category.
The TOS window contains the following input fields and click boxes:
4-60
Ipanema Technologies
October 2014
4. 8. 3. Configuring Applications
Operating procedure table: settings, ip|true service , ip|fast service
A default applications dictionary is available for each configuration. Applications can be added to,
removed from or modified in this dictionary.
This dictionary is used by the ip|true and ip|fast functions.
In the Application provisioning Toolbar, select
Applications:
Applications window
This window is made of two frames:
4. 8. 3. 1. Application recognition
The Ipanema System recognizes application flows using the opening negotiations of the
client/server session conversation (SYN, SYN-ACK, ACK, i.e. layers 3 and 4 information), then it
checks the syntax of the application (layer 7 information) thanks to a syntax engine to uniquely
identify it without any possible error, regardless the ports being used; this also allows to classify
particular applications (such as Codecs, published application names, peer-to-peer applications,
URLs or URIs, etc.)
October 2014
Ipanema Technologies
4-61
Ipanema System
The ip|engines syntax engine uses DPI (deep packet inspection) to detect application signatures
data patterns that uniquely identify a particular application. (Mechanisms such as this are also
commonly used for virus recognition.) We are inspecting the start of the conversation (and only the
start) to detect these patterns to classify the applications.
It is also possible to declare applications on the ports being used (you have defined an application
as traffic on a specific port/server); in this case, it is the port number that prevails to regnosize the
application.
When an ip|engine has not observed this start of the conversation, or if the application cannot
be recognized thanks to its syntax or declared port number, it falls back to RFC1700 ("well known
ports" definition).
So the order of recognition of applications is as follows:
Applications that are not recognized or enabled in the dictionary are implicitly grouped on their
lower layer protocol (e.g. TCP or UDP).
4-62
Adobe Connect
- (Unified Communications)
AIM Express
- (Unified Communications)
AIM Transfer
Altiris
- (Unified Communications)
Applejuice
- (peer-to-peer)
Ares
- (peer-to-peer)
Audiogalaxy
- (deprecated)
AVG
- (anti-virus)
AVG Updates_
Avira
- (anti-virus)
BBC iPlayer
- (streaming)
BGP
Bitdefender
- (anti-virus)
BitTorrent
- (peer-to-peer)
Cisco Unified
MeetingPlace
- (Unified Communications)
Cisco Unified
MeetingPlace_
Citrix
COTP
CUPS
Dailymotion
Ipanema Technologies
October 2014
DCERPC
DHCP
Diameter
- (AAA)
DICT
DIMP
DirectConnect
- (peer-to-peer)
DNS
DRDA
Edonkey
- (peer-to-peer)
EIGRP
- (Application Services)
EtherIP
- (tunneling)
Exchange
Filetopia
- (peer-to-peer)
Flash
- (streaming)
Foxy
- (peer-to-peer)
FTP
FTPS
F-Secure
- (anti-virus)
F-Secure Online
Backup_
G.711a
G.711u
G.723
G.729
GIOP
GIOPS
Gizmo
- (Unified Communications)
GNUnet
- (peer-to-peer)
Gnutella
- (peer-to-peer)
GoBoogy
- (peer-to-peer)
Google Apps
GooglePlus
GoToMeeting
- (Unified Communications)
GoToMeeting_
GRE
October 2014
Ipanema Technologies
4-63
Ipanema System
J
K
4-64
GTP
H.225
- (Unified Communications)
H.245
- (Unified Communications)
HSRP
HTTP
HTTP tunnel
- (tunnelling)
HTTPS
IAX
- (Unified Communications)
iCall
- (Unified Communications)
IBM-DB2
- (database)
IBM Informix
- (database)
- (Unified Communications)
Icecast
- (streaming)
ICMP
ICQ
Identification protocol
- (AAA)
IGMP
IMAP
IMAPS
iMesh
- (peer-to-peer)
IPComp
IPP
IPSec
IP Secure (tunneling)
IRC
IRCS
ISAKMP
Jabber
- (Unified Communications)
JetDirect
Kaspersky
- (anti-virus)
Kazaa
- (peer-to-peer)
Kerberos
- (AAA)
KuGou
- (peer-to-peer)
L2TP
LDAP
LDAPS
Load Balancing
- (deprecated)
Ipanema Technologies
October 2014
Lotus Notes
- (Mail services)
LPR
Mainframe CFT
Manolito
- (peer-to-peer)
MAPI
McAfee
- (anti-virus)
MCS
MGCP
Microsoft ActiveSync
- (Application Services)
MMS
MobiLink
- (database)
Mount
MPEG-TS
- (Unified Communications)
MS Communicator
- (Unified Communications)
MS SQL
= TDS (database)
MS Exchange
MSN
Mute
- (peer-to-peer)
MySQL
- (database)
Napster
- (deprecated)
NARP
Netbios
- (Network Services)
Netflow
- (Network Services)
NFS
NLockMgr
NNTP
NNTPS
NOD32
- (anti-virus)
Norton
- (anti-virus)
NSPI
NTP
OCSP
OpenFT
- (deprecated)
openVPN
- (tunnelling)
OSPF
ooVoo
- (Unified Communications)
October 2014
Ipanema Technologies
4-65
Ipanema System
Q
R
4-66
PalTalk
- (Unified Communications)
Panda
- (anti-virus)
Pando
- (peer-to-peer)
PC Anywhere
- (thin client)
PIM
POP3
POP3S
Portmap
Postgres
- (database)
PPP
PPTP
Printer_ipp
Q.931
- (Unified Communications)
Quake
(game, deprecated)
RADIUS
Radmin
- (Thin Client)
RDP
RDT
Remote Shell
- (thin client)
RFB
RLogin
RLP
RPC
RQuota
RSH
RStat
RSS
RSVP
RSync
RTMP
RTP/RTCP
RTSP
RUsers
Salesforce
SAP
Ipanema Technologies
October 2014
SCTP
SharePoint
Sharepoint 2010_
SHOUTcast
- (Unified Communications)
Siebel
- (Enterprise Applications)
Silverlight
- (streaming)
SIP
- (Unified Communications)
Skype
- (Unified Communications)
SLP
SMB
SMTP
SMTPS
SNMP
SOAP
Socks
Sockets (tunneling)
SopCast
- (peer-to-peer)
Soulseek
- (peer-to-peer)
SrvLoc
SSDP
SSH
SSL
STUN
Sybase
- (database)
Sync
Syslog
- (Network Services)
T38
- (Network Services)
TCP
TDS
Telnet
- (thin client)
TelnetS
TFTP
TIBCO-RV
TNVIP
- (thin client)
TrendMicro
- (anti-virus)
TrendMicro Updates_
October 2014
Ipanema Technologies
4-67
Ipanema System
UCP
UDP
URL
uTP
see Torrent
VMWare
- (thin client)
VNC
Voddler
- (streaming)
VRRP
Webex
- (Unified Communications)
Webex_
WINMX
- (peer-to-peer)
WINS
X.11
XML-RPC
XoT
Yahoo Messenger
- (Unified Communications)
YouTube
YPPasswd
YPServ
YPUpdate
Torrent
- (peer-to-peer)
Recognized applications, by alphabetical order
4-68
Ipanema Technologies
October 2014
Application Services
Authentication
Authorization
Accounting
Cloud Protocols
Database
Deprecated
Enterprise Apps
SAP, Siebel
Mail Services
Middleware
Network Services
Peer to Peer
Routing Protocols
Streaming
Thin Client
Transferring and
Sharing
Transport Layer
Protocols
IPComp, SCTP, SSL, TCP (with specific recognition for AVG Antivirus
Updates, Cisco Unified MeetingPlace, F-Secure Online Backup,
GoToMeeting, Sharepoint 2010, TrendMicro Antivirus Updates and
Webex), UDP
Tunneling
Unified Communications
October 2014
Ipanema Technologies
4-69
Ipanema System
4-70
Ipanema Technologies
October 2014
Syntax:
?
a unique character
separator in a list
Examples:
www.google.fr
www.google.*
www.google.*/*.gif
*/*.gif
Specific cases:
host/*
"any" URI
host/
empty URI
*/full/uri
"any" HOST
/full/uri
empty HOST
for HTTPS: Common Name (usually the FQDN (Fully Qualified Domain Name) of the
web site; it is displayed in the Certificate):
October 2014
Ipanema Technologies
4-71
Ipanema System
for Citrix: Application(s): name of published applications (Word, Excel for example)
when the applications are not multiplexed in the same TCP session.
for RTP/RTCP: Predefined codecs: name of an audio or video codec, to be selected
from a drop-down list with predefined codecs:
Predefined codecs
Codec: name of an audio or video codec, to be written with the following syntax:
audio/<audio codec name> or video/<video codec name> (for instance, to create
the speex codec, enter audio/speex).
To be able to recognize the dynamic codecs (as per RTP), SIP signalling
needs to be decoded, so SIP application recognition must be enabled.
For other protocols, no information is necessary. so there is no attribute.
User Subnets filter: this optional parameter can be used to identify an application by the IP
address of a server or client, or list of servers or clients (ex: SAP). It is possible to choose the
server or client from a drop-down list of the User subnets, or directly:
User Subnets List: choose the subnet or host in the list of User subnets to be associated
with the application by selecting them and pushing them to the right frame with the single
right arrow (selected User subnets only) or double right arrow (all User subnets),
Prefix/Length: set the subnet with the following notation X.X.X.X/Y where X.X.X.X is
the IP address and Y the length integer between 0 and 32; a list of IP addresses can be
configured (; separator).
C/S Side: specify if the application must be recognized on the server side or on the client
side (it is recognized on the Server side by default).
4-72
Ipanema Technologies
October 2014
4. 8. 3. 5. Order of recognition
When describing different applications using the same protocol (e.g. for HTTP: Intranet (=
intranet.company.com), Internet corporate (= *.company.com) and Internet (= the rest of http)),
place the more specific applications first (the Intranet, then Internet corporate in the example)
and the generic one after (the Internet), so that the specific ones can be recognized as such.
This ordering is achieved by selecting an application and by moving it up with the left blue arrow
(move up) if it is more specific than the one above it, or moving it down with the right blue
arrow (move down) if it is more generic than the one below it, and by repeating this for as many
applications as necessary until they are all sorted from the most specific one (at the top) to the
most generic one (at the bottom).
Moving applications to place the more specific ones above the more generic ones
October 2014
Ipanema Technologies
4-73
Ipanema System
QoS profiles:
4-74
Ipanema Technologies
October 2014
Session B/W (kbps): to specify the bandwidth per session; the value is used by ip|fast,
Obj. (objective): nominal bandwidth per session (mandatory parameter).
The objective bandwidth per session is operational during congestion.
Delay (ms), Jitter (ms), Packet loss (%), SRT (server response time, ms), RTT (round trip
time, ms), TCP retrans. (%): to specify, for each flow, the Objective and Maximum values for
that QoS profile. These parameters are enabled or not by checking the boxes or not,
October 2014
Ipanema Technologies
4-75
Ipanema System
These information can be used by the Application Group reporting to control the QoS associated
with each Application Group.
all values <
Obj.
Max.
acceptable
Correct
unacceptable
Interpretation of Obj. and Max. criteria for Delay, Jitter, Loss, SRT, RTT and TCP retrans.
Name
Type
Session
BW (kbps)
Delay
(ms)
Default
Bg
30-600
200-1000
File transfer
Bg
50-1000
Business
Tr
Thin client
Jitter
(ms)
Packet
Loss
(%)
RTT (ms)
TCP
retrans.
(%)
1-10
400-2000
1-10
500-1000
1-10
1000-2000
1-10
50-500
200-500
1-5
400-1000
1-5
Tr
40-400
100-500
1-5
200-1000
1-5
Bg
50-1000
500-2000
1-10
1000-4000
1-10
Net services
Bg
20-200
100-500
1-10
200-1000
1-10
Web
Tr
40-400
200-1000
1-10
400-2000
1-10
Voice
RT
90-120
100-200
Video stream.
RT
150-200
200-1000
400-2000
1-5
50-100
SRT
(ms)
0.2-1
1-5
Ex. of QoS Profiles (Bg: background, Tr: transactional, RT: real-time; in each column: obj.-max.)
4-76
Ipanema Technologies
October 2014
business criticality,
QoS performance objectives (nominal bandwidth per application session, delay, jitter, packet
loss, SRT, RTT and TCP retransmission),
the enabling of compression.
The users objectives are the only input to the system. There is no need to set low-level, network
and device specific policy rules.
The Ipanema System performs:
Application Groups are independent of ip|true, ip|fast, ip|xcomp, ip|xtcp, DWS and smart|plan
services.
Application Groups are given in a tree structure, each AG is characterized by:
a name,
filters to define the rules of traffic classification corresponding to the AG,
a criticality level to define the level of criticality associated to the application(s) in this AG,
a QoS profile that enables QoS objectives for the application(s) in this AG,
the capability to be compressed.
tjhe capability to be accelerated.
The position of the Application Groups in the tree structure is important, it determines
the classification of the packets. The classification is performed by running the structure
tree downwards. The packet is classified with the first applicable classification met.
Other, included the whole classifications, is at the end of the tree.
The configuration of the Application Groups is necessary for the good behavior of the Application
Control agent, ip|fast.
October 2014
Ipanema Technologies
4-77
Ipanema System
Application Groups:
4-78
Ipanema Technologies
October 2014
A zone with four tabs, to define filtering rules for traffic classification in the corresponding AG:
October 2014
Dictionary filters,
Subnet filters,
ip|engine filters,
Advanced.
Ipanema Technologies
4-79
Ipanema System
In this zone, the selection frames depend on the selected tab (see below).
the left frame shows a list of elements of the Dictionaries (Applications, ToS values),
Subnets (source and destination) or ip|engines (ingress and egress) as described in
the system and managed by ip|boss
the right frame shows the selected filters for the AG.
Select elements (you can select several ones simultaneously, using the SHIFT or CTRL keys)
and move them from one frame to the other thanks to the simple arrows, or move all elements
at a time using the double arrows.
A logical Or is applied for the different elements inside a filter (for example filter
Applications: HTTP or HTTPS).
A logical And is applied for the different types of filters (for example Applications:
HTTP or HTTPS and subnet-src=LAN-192).
Application,
TOS.
This is the main tab to use. The others are optional, and lead to the creation of local
rules, so use them with care.
4-80
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
4-81
Ipanema System
4. 8. 5. 4. Advanced tab
Advanced tab
This tab contains two additional frames:
Redundancy Elimination Method
Real time
Transactional
only the Zero Delay method is enabled (the Standard method can
create a small latency usually less than 5 ms),
Background
We do not recommend to change the default settings without advice from the Ipanema
Support.
smart|path
This frame contains three parameters, that can be used to overwrite the global values set in the
System provisioning > Tools > Advanced configuration menu.
Please refer to 4.9.7. Configuring DWS (Tools / Advanced conf.) for a comprehensive
description of each parameter.
4-82
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
4-83
Ipanema System
limit the bandwidth used by the different networks of the departments, services (user subnets)
or applications according to specific criteria taking the following constraints into account:
source subnet,
remote subnet,
applications,
TOS/CP values.
a name,
filters to define the rules to classify the traffic corresponding to the LTL,
a limit on the bandwidth that can be used by the class.
The LTL rules are enabled only if ip|fast is activated on the ip|engine.
LTL.
4-84
Ipanema Technologies
October 2014
To create a new policy, select the ip|engine, the direction (ingress or egress), then by clicking on
the New icon
Filters
Filters allow specifying filtering rules for traffic that are associated with an LTL:
Source user subnet: to filter traffic according to source User subnet. It is selected from a
drop-down list corresponding to the "User subnets" directory,
Destination user subnet: to filter traffic according to destination User subnet. It is selected
from a drop-down list corresponding to the "User subnets" directory,
Application: to filter traffic according to application(s). It is selected from a drop-down list
corresponding to the "Applications" dictionary,
TOS/CP: to filter traffic according to the value of the TOS field. This value specified in the
"TOS/CP" dictionary, is selected from a drop-down list.
October 2014
Ipanema Technologies
4-85
Ipanema System
4. 9. REPORTING
The Reporting menu gives access to three functions: MetaView, reports and Alarming.
4. 9. 1. Configuring MetaViews
Operating procedure table: settings, service ip|true, service ip|reporter
The MetaViews are objects used to show the data according to your criteria (topology,
applications...) in order to be used by external reporting tools (including ip|reporter) and to
trigger logs, traps or e-mails when certain thresholds are surpassed (Alarming). The MIB will be
populated according the settings of the MetaViews.
MetaViews show information about the traffic or availability according to the following criteria:
and any complex definition with the previous parameters, using several fields and, possibly,
several tabs.
For example, a MetaView can aggregate the data on the Domain (no filter), but another MetaView
could detail the behavior between 2 subnets and a particular application.
ip|reporter uses the MetaViews for the reports creation and data collection.
Two modes of MetaView creation are available:
unitary mode: allows to create MetaViews one by one with your own naming rules. This mode
can be used in order to create a troubleshooting MetaView with complex filters (for example a
destination site, a source site and a specific application),
wizard mode: allows to create a big number of MetaViews with automatic naming rules and
simple filter (for example: one MetaView for each user subnet of the Domain).
MetaViews for the Domain, for the Equipped sites, for the tele-managed sites and for the
Application Groups are automatically created by the system (as soon a new Domain,
a new Equipped site, a new tele-managed site or a new Application Group is created,
respectively).
The MetaView name is used by ip|reporter to name the instances of the reports.
4-86
Ipanema Technologies
October 2014
MetaView.
October 2014
Ipanema Technologies
4-87
Ipanema System
4-88
Ipanema Technologies
October 2014
The Name of the MetaView, used by ip|reporter to name the instances of the reports,
The Description: optional text field,
The Type: as this function is used to create a MetaView on demand, the field always displays
on demand.
A zone with three tabs:
Configuration,
User Subnets,
Traffic classification.
the left frame shows a list of elements (Sites, ip|engines, Keys, User subnets, Applications,
AGs, etc.), as described in the system and managed by ip|boss,
the right frame shows the selected elements for the MetaView.
A logical Or is applied for the different elements inside a filter.
A logical And is applied for the different types of filters.
Select the elements you want to move and use the simple arrows to move them from one frame to
the other, or use the double arrows to move them all at a time.
"Configuration" Tab
This tab (screenshot above) comprises the filters which define the rules of traffic topologies
corresponding to the MetaView (from Site A to Site B, etc.). It contains the following areas:
ip|engine A: displays the ip|engines and tele|engines list as described in the configuration,
Reminder: MetaViews for the ip|engines are automatically created by the system.
ip|engine B: displays the ip|engines and tele|engines list as described in the directory,
Engine Report Key A: displays the ip|engine report key list as described in the configuration,
Engine Report Key B: displays the ip|engine report key list as described in the configuration,
WAN Access Id A: displays the Network Access Points list as described in the configuration,
WAN Access Id B: displays the Network Access Points list as described in the configuration,
WAN Access Report Key A: displays the WAN Access report key list as described in the
configuration,
WAN Access Report Key B: displays the WAN Access report key list as described in the
configuration,
October 2014
Ipanema Technologies
4-89
Ipanema System
User Subnet A: displays the User subnets list as described in the configuration,
User Subnet B: displays the User subnets list as described in the configuration.
This list is available only if at least one subnet in User Subnet A is selected.
4-90
Criticality: displays the criticality list as described in the configuration (from Top to Low).
Ipanema Technologies
October 2014
the left frame shows a list of elements (ip|engines, Keys, User Subnets, Application Groups,
etc.) as described in the system and managed by ip|boss,
the right frame shows the selected elements for the MetaViews.
Select the elements you want to move and use the simple arrows to move them from one frame to
the other, or use the double arrows to move them all at a time.
By selecting several elements in each list, the system will create the MetaViews
according to combinative selected criteria.
The wizard mode automatically manages the naming rules, depending on the selected elements.
October 2014
Ipanema Technologies
4-91
Ipanema System
User Subnets: displays the User subnets list as described in the configuration.
4-92
Ipanema Technologies
October 2014
4. 9. 2. Configuring Reports
Refer to 9.2.5. Reports Management.
4. 9. 3. Configuring Alarming
Operating procedure table: settings, service ip|true
The Alarming feature uses the MetaViews for the alarms creation.
In the Reporting Toolbar, select
Alarming.
Alarming window
This window contains three frames:
An alarm is the instantiation of a rule (when does the alarm trigger/rearm?) on a MetaView (on what
objects - sites, Application Groups, etc. - does the rule apply?).
Creating an alarm is achieved in three steps:
creating a rule,
associating a rule to a MetaView,
activating logs and/or mails and/or traps on alarming events.
October 2014
Ipanema Technologies
4-93
Ipanema System
4. 9. 3. 1. Rule creation
By clicking on the New button
A Rearm frame, to define the rule that will rearm the alarm:
Rearm threshold: the threshold that will rearm the alarm,
Ream occurrences: the number of consecutive collects (by default, 1 collect = 1 minute)
that are necessary for this threshold to be reached before rearming the alarm.
When a rule is created, an Identifier is automatically attributed to it by the system, that can be seen
in the Alarming window (Ident).
4-94
Ipanema Technologies
October 2014
Rules syntax
The description of a threshold must respect the following grammar:
exp ::= prefixexp
exp ::= number
exp ::= exp binop exp
exp ::= unop exp
prefixexp ::= var | ( exp )
<lan|wan>_<ingress|egress>_throughput
lan_<ingress|egress>_goodput
ingress_wan_access_ingress
egress_wan_access_egress
lan_<ingress|egress>_sessions
<lan|wan>_<ingress|egress>_min_delay
<lan|wan>_<ingress|egress>_avg_delay
<lan|wan>_<ingress|egress>_max_delay
<lan|wan>_<ingress|egress>_jitter
<lan|wan>_<ingress|egress>_packet_loss
<ingress|egress>_tcp_rtt_min
<ingress|egress>_tcp_rtt_avg
<ingress|egress>_tcp_rtt_max
<ingress|egress>_tcp_srt_min
<ingress|egress>_tcp_srt_avg
<ingress|egress>_tcp_srt_max
<ingress|egress>_tcp_retransmit
<ingress|egress>_aqs
mos_<ingress|egress>
Binary and unary operators (binop and unop) consist of arithmetical, relational and logical
operators.
Arithmetical operators
+
addition
multiplication
modulo
subtraction
division
negation (unary)
Relational operators
==
equal to
<
less than
<=
~=
different from
>
greater than
>=
Logical operators
and
or
not (unary)
Operators
October 2014
Ipanema Technologies
4-95
Ipanema System
1.
2.
3.
4.
5.
6.
or
and
< > <= >= ~= ==
+*/%
not - (unary)
A rule is validated when committed; a mistake will trigger an Error message window.
4-96
Ipanema Technologies
October 2014
The first area (on the left) shows the list of elements (Alarm rules and MetaViews), the second
area (on the right) shows the selected elements.
Use the + and - signs to move the selected elements from the left to the right and from the right
to the left, respectively (or click Select All or Unselect All to move them all at a time).
October 2014
Ipanema Technologies
4-97
Ipanema System
By selecting several elements in each list, the system will create the Alarms according to
combinative selected criteria.
4. 9. 3. 4. Enabling logs/mails/traps
So that alarming events can be logged and/or sent by e-mail and/or trapped, according to the
selected Actions, Log and/or Mail and/or Trap must be enabled in the Options window (see
OPTIONS - FAULT MANAGEMENT below).
4. 9. 3. 5. Operation
Using the alarms triggered by ip|boss is achieved with external tools, according to the selected
Actions:
When an alarm is triggered or rearmed, the following information is available (in a log, an e-mail or
a trap):
Alarms are sent by pair: trigger when the first threshold is reached, rearm when the second is.
4-98
Ipanema Technologies
October 2014
Options.
Options window
This window contains three tabs:
Activation: specify how to manage the Supervision events and the Traffic alarming events.
Mail (e-mail): Supervision and/or Traffic alarming events can be mailed to a list of recipients
configured in ip|boss; it uses its own mailing command.
Trap (SNMP Trap): Fault management traps generated by ip|boss on Supervision and/or Traffic
alarming events are sent to configured SNMP managers.
October 2014
Ipanema Technologies
4-99
Ipanema System
You can manage the Supervision events. They consist of an alarm (log, mail or trap) in case of
system events like:
LicenseExpiration
Start
Stop
Update
Upgrade
Reboot
BeginOfDownStatus
an ip|engine is down
EndOfDownStatus
BeginOfSynchronizationLoss
EndOfSynchronizationLoss
CertificateExpiration
RestartByRecover
IpReporterManagerIsDown
IpReporterCollectorIsDown
IpReporterBrowserIsDown
IpReporterManagerIsUp
IpReporterCollectorIsUp
IpReporterBrowserIsDown
IpReporterBrowserIsUp
BeginOfNotReachableStatus
EndOfNotReachableStatus
MetaViewColors
BeginOfCompressDownStatus
EndOfCompressDownStatus
BeginOfUncompressDownStatus
EndOfUncompressDownStatus
BeginOfLanLinkDownStatus
EndOfLanLinkDownStatus
BeginOfWanLinkDownStatus
EndOfWanLinkDownStatus
Events (ip|engines are identified with Alias, IP Address and Domain name)
You can manage the Traffic alarming events. They consist of an alarm (log, mail or trap) in case
of an alarm triggered or rearmed (see CONFIGURING ALARMING above).
4-100
Ipanema Technologies
October 2014
Activation tab
The tab contains three frames:
Log
Supervision events:
Enable: to send e-mails on Supervision events,
Disable: not to send e-mails on Supervision events.
Trap
Supervision events:
Enable: to trap the Supervision events,
Disable: not to trap the Supervision events.
October 2014
Ipanema Technologies
4-101
Ipanema System
Mail tab
This tab contains three fields:
Subject: ip|boss, the Origin (see table above) and the alarm type,
Alarm timestamp (time when alarm was detected),
description: optional comments on the alarm.
The Origin and Type fields are included in the subject of the mail. The Description field is included
into the body of the mail. The Field format is <Domain><Type><Origin><Events>.
Mail examples:
Object: HMS: ip|boss - OSS - Cold Start
Date: 26/03/02 13:42:42 Paris, Madrid
From: [email protected]
To: [email protected]
ip|boss System has been started by DOC on 26/03/2002 at 13:43:47.
Conf file is: C:\program files\server\domains\HMS\config\__active__.ipmconf.
Object: HMS: ip|boss - OSS - Stop
Date: 26/03/02 13:43:52 Paris, Madrid
From: [email protected]
To: [email protected]
ip|boss System and ip|engine have been stopped by DOC on 26/03/2002 at 13:45:11.
Object: HMS: ip|boss - ip|engine - End of ip|fast down status
Date: 26/03/02 14:06:25 Paris, Madrid
From: [email protected]
To: [email protected]
ip|fast is up on following ip|e on 26/03/2002 at 14:07:43: HQ (192.169.0.100)
4-102
Ipanema Technologies
October 2014
Trap tab
This tab contains the following field:
Hostname: hostname or IP address of the SNMP manager (use the New button
entries).
October 2014
Ipanema Technologies
to add
4-103
Ipanema System
4-104
1. The procedure (steps 1 to 5) is similar to the procedure of the second level, except that the
customer selects and defines a passphrase in Security/Certificate Generation window.
Ipanema Technologies
October 2014
2. Configure the associated ip|engines. THE SAME PASSPHRASE MUST BE USED for the
ip|boss and the ip|engine to allow the SSL connections between ip|boss and ip|engine. This
passphrase should be configured on all ip|engines of the Domain.
3. Before using this command, check the system Administrator to obtain the same
passphrase as ip|boss.
Command usage:
sslpassphrase
usage: sslpassphrase set
sslpassphrase reset
Copyright (c) Ipanema Technologies 2000-2005
Set the passphrase:
sslpassphrase set
Enter old SSL passphrase:
Enter new SSL passphrase: *******************
Confirm new SSL passphrase: ******************
Passphrase has been changed
Do you want to restart HTTP Server with new passphrase now [y/n]?
y
Security.
step 1) defines the certificate name. Under this name, 4 files are generated:
the private key: <alias>.isk (Ipanema Server Key) in the Security directory
(~/ipboss/server/domains/<Domain Name>/Security). If a passphrase was provided,
the key has been encoded with the passphrase in the file,
The same passphrase should be also entered on all ip|engines of the
Domain.
step 2) defines the algorithm (encoding mode or not) used for communication encryption
between ip|boss and ip|engines,
ip|boss adds the ip|engine certificate in the authorized certification list.
October 2014
Ipanema Technologies
4-105
Ipanema System
Certificate group box with the Name: name (without extension) of the key/certificate,
Key group box with:
the field Size: choice of the key size: 512, 1024 (by default), 2048,
the field Passphrase: to enter the passphrase (optional; check the box to enter it). The
selection displays the Security Generation dialog box.
If used, the same passphrase must be used for ip|boss and all the
ip|engines of the Domain.
4-106
Ipanema Technologies
October 2014
Configuration window
The configuration specifies to ip|boss which certificate of the Security directory to use and which
algorithm to associate in SSLv3 with RSA authentication. This window defines the encryption
applied to the communications.
The window contains:
Certificate group box with the Name: name (without extension) of the key/certificate to choose
in the drop-down list. With this name, ip|boss finds the .isk, .isc, .isk and .icc files.
Algorithm group box: click in the corresponding case (Selection) to select the encryption
algorithms to be applied between ip|boss and the ip|engines.
The algorithms are listed in security level order, NULL SHA is selected by default.
October 2014
Ipanema Technologies
4-107
October 2014
Ipanema Technologies
5-1
Ipanema System
5. 2. SUPERVISION
5. 2. 1. ip|engine status (monitoring ip|engines activity)
Operating procedure table: Management
In the Supervision Toolbar, select
ip|engine Status.
5-2
Ipanema Technologies
October 2014
Interface(s) with error(s) detected: indicates whether errors were detected on the various
interfaces of the ip|engine; more details can be obtained for a given ip|engine, interface by
interface, in the single ip|engine status window (described below):
yes: errors were detected on some interfaces,
no: no error was detected, on any interface,
CPU (%): ip|engine load average during the last collect period,
Topology warnings: number of warnings related to the topology; a warning is raised each time
an abnormal event is detected between any two sites during the last polling period, regardless
the number of impacted hosts; the 20 first concerned hosts are displayed in the message; refer
to the Single ip|engine status windows third tab (described below) for more details.
Its possible to modify the columns displayed by the menu View/Choose columns.
October 2014
Ipanema Technologies
5-3
Ipanema System
This window is made of four tabs and provides the following information for the selected ip|engine:
General tab:
5-4
CPU (%): ip|engine load average during the last collect period,
Version: ip|agent software version and type release of the ip|engine,
Serial Number: ip|engines Serial Number,
Overload (diagnostics): it should normally read Normal; otherwise the ip|engine is overloaded.
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
5-5
Ipanema System
Synchronization
Synchronized:
yes: the ip|engine is synchronized (normal state),
no: the ip|engine is not synchronized,
Server:
name or IP address of the synchronization server,
n/a: not available,
Offset (ms): estimated synchronization offset from ITP server (time difference between
synchronizing and synchronized units); by default, an ip|engine is synchronized when the
offset is less than 10 ms,
Delay (ms): average round trip delay between the ip|engine and its ITP server,
Frequency (ppm): local oscillator free running frequency difference with the synchronization
source,
Synchronization (diagnostics): there is no diagnostic message by ip|sync to date.
Application Visibility
Measure (diagnostics): last diagnostic message by ip|true (Alarm in the real-time flows list is
at yes is any):
Discovery (diagnostics): there is no diagnostic message for the Discovery function to date.
ip|fast
Application Control (diagnostics): last diagnostic message by ip|fast (Alarm in the real-time
flows list is at yes, if any):
nothing: no diagnostic message by ip|fast (normal state),
ip|fast unreachable from ip|true: ip|fast is not working (transitory state),
ip|engine set in parallel mode: ip|fast was started on an ip|engine set in parallel mode,
5-6
Ipanema Technologies
October 2014
current state is xxxx (where xxxx can be Initial, Configuring, Configured, Stopping,
Resetting or Unknown): ip|fast has not been started while it should have been; ip|true
tries to start it until it succeeds (transitory state).
ip|xcomp
ip|xtcp
ip|xapp
October 2014
Ipanema Technologies
5-7
Ipanema System
Alarms tab:
* A site is unknown typically when the ip|engine that claimed the hosts belongs to another
Domain, which happens when the traffic crosses several Domains (so it can be normal).
Expected site:
for a mismatch alarm: configured site;
for a migration alarm: site previously discovered.
Discovered site:
for a mismatch alarm: discovered site;
for a migration alarm: latest discovered site.
5-8
Ipanema Technologies
October 2014
either the situation is normal (e.g. traffic crossing several Domains, see above); configuring the
Topology subnets manually can clear the alarm in most cases,
or there is an error in the configuration: check the concerned hosts, check the topology and fix
the configuration.
Interfaces tab:
Deployment mode:
Unknown: the deployment mode is not provided by the ip|engine, which is the case
when its software version is earlier than v8,
Parallel: the ip|engine is installed in parallel mode,
Dual parallel: the ip|engine is installed in parallel mode on two ports,
Serial: the ip|engine is installed in serial mode,
Multi-wan: the ip|engine is directly connected to several WAN routers (but it only has
one LAN connection),
Multi-path: the ip|engine has several LAN connections (it is possibly directly connected
to several WAN routers too),
Redirection GRE: virtual|engine redirecting the traffic via a GRE tunnel,
Redirection L2: virtual|engine redirecting the traffic via a Layer 2 connection.
October 2014
Ipanema Technologies
5-9
Ipanema System
5-10
Ipanema Technologies
October 2014
Click
,
Choose to open or save the zip file containing the monitoring data we recommend you to
save it,
Send the zip file to Ipanema Support.
The zip file is called <ipengine_name>.zip (in case a single ip|engine was selected) or
ipe_monitoring.zip (in case several ip|engines were selected) and it contains the following
folders:
config: contains the configuration made in ip|boss and sent to the ip|engines of the Domain;
<ipengine_name> (one folder per ip|engine): contains CSV files with the GLASS metrics.
October 2014
Ipanema Technologies
5-11
Ipanema System
Supervision maps.
the map itself, with a square for each ip|engine, the size depends on the ip|engine hardware
model, and a color in order to give a quick synthetic view of the supervision status:
Red: when Status is down (ip|engine not reachable), or when one of the following
functions: Measurement, Application Control, Compression, Decompression,
Acceleration is down, not started, not configured or not updated (after three trials
of update),
Yellow: when not Synchronized, and/or Overloaded and/or Updating (update of
configuration running),
Green: all status are OK (Status, Measurement (always); Application Control,
Compression, Decompression and Acceleration, if enabled; Synchronization (always)).
: to consult the detailed supervision status (refer to the supervision details above),
5-12
and
: unused,
Ipanema Technologies
October 2014
By moving the mouse on a square, a contextual text shows the supervision status (see screenshot
above):
October 2014
Ipanema Technologies
5-13
Ipanema System
5. 2. 3. Scripts
Operating procedure table: Management
This function is to be used with the Ipanema Technologies Support.
In the System provisioning toolbar, select
Scripts.
Scripts window
The window comprises the following input fields:
The Execution script result frame displays the scripts being launched, and allows downloading
and deleting them:
5-14
Ipanema Technologies
October 2014
Commands buttons:
(Delete): delete the selected scripts results (the data will be deleted from the
server),.
(Download script result): allows downloading a zip file with the selected scripts
results and other information (see below),
The zip file that can be downloaded is called ExecutionScriptResult.zip and has the following
structure:
root: one<yymmdd-hhmm> folder by selected script result, where yymmdd-hhmm are the date
and time when the scripts were launched.
The root folder has three subfolders, containing five files:
ipboss:
__active__.ipmconf: ip|bosss current configuration
ip_boss_00<X>.log: ip|bosss log file
ipengines:
<alias> <ip|es IP address>.ipmres: script result in itself
script:
<script name>.ipmscp: launched script (encrypted file)
ipengine.txt: list of dumped ip|engines (alias+@ip)
The user can send this zip file (by E-mail or FTP) to Ipanema Technologies support
([email protected]).
All this information can also be found on ip|boss server (until it is deleted) here:
~/salsa/ipboss/server/domains/<domain_name>/temp/Ipanema-dump/<yymmdd-hhmm>.
Different script files are available. The main ones are :
default.ipmscp: dumps all information in the ip|engine, reserved for the support,
flows.ipmscp: dumps all flows in the ip|engine,
ipconfig.ipmscp: dumps information about the IP and Ethernet settings of the ip|engine,
check iptrue.ipmscp: dumps information about ip|true, reserved for the support,
check ipfast.ipmscp: dumps information about ip|fast, reserved for the support,
check ipxcomp.ipmscp: dumps information about ip|xcomp, reserved for the support,
check itp.ipmscp: dumps information about ip|sync synchronization, reserved for the support,
restart iptrue.ipmscp: restarts ip|true agent, reserved for the support,
restart ipfast.ipmscp: restarts ip|fast agent, reserved for the support,
restart ipxcomp.ipmscp: restarts ip|xcomp agent, reserved for the support,
restart itp.ipmscp: restarts ip|sync agent, reserved for the support,
process.ipmscp: dumps information about the process running, reserved for the support.
October 2014
Ipanema Technologies
5-15
Ipanema System
5-16
Ipanema Technologies
October 2014
Reboot window
This window contains:
October 2014
Ipanema Technologies
5-17
Ipanema System
1. At opening, the list of ip|engines in the configuration is displayed in the left frame. The
Version column is not filled in. Select some ip|engines (or all with the Select all button
and click on the Status button
selected ip|engines.
The statuses can be:
upgraded: the ip|engine has the software release which is described in the field version,
download scheduled: the ip|engine will be upgraded, the scheduled Begin hour is
not passed,
install scheduled: the ip|engine is upgrading, the scheduled End hour is not passed,
error occurred: possible reason of failure:
No Space left for file: no more space on ip|engine to download the file,
Cant connect to server (check address/routes): FTP server is unreachable,
Access to server denied (check login/password): login/pw problem on FTP
server,
File not found: xxxxxxx: the file is not in the right directory on FTP server or the
directory is wrong,
Error while downloading: the connection between FTP server and the ip|engine
is broken,
No disk space left for file: no more space to uncompress the software package.
5-18
Ipanema Technologies
October 2014
3. Select the ip|engines to be upgraded in the left frame and the ip|agent software version in
the right frame, and click on the Upgrade button
A message confirms that the selected ip|engines have received the upgrade order.
allows to cancel the upgrade request. Cancelling an upgrade is possible
A Cancel button
before or during the FTP download of the new version of ip|agent, but before the ip|engine
has started swapping.
October 2014
Ipanema Technologies
5-19
Ipanema System
4. A scheduling window opens, that allows scheduling the upgrade (during the night for
example), or launch it immediately by clicking on Ok without specifying any date or time:
5. Check that the upgrade has been completed correctly by selecting the concerned ip|engines
and by clicking on the Status button
5-20
Ipanema Technologies
October 2014
5. 4. IP|BOSS LOGS
Operating procedure table: Management
In the Supervision Toolbar, select
Log.
Log window
This window contains:
the list of Supervision events (on ip|engines, ip|boss server and ip|reporter server) with a
time stamping, in Syslog format,
the list of Traffic alarming events (on MetaViews) with a time stamping (only if it has been
activated in Options / Activation).
October 2014
Ipanema Technologies
5-21
Ipanema System
5. 5. CONFIGURATION HISTORY
Operating procedure table: Management
In the Supervision Toolbar, select
Configuration history.
The Configuration history window is displayed. It contains the list of all configurations saved
with, for each one, the modification date, the name of the User who made the modifications and
the modified section(s) in the configuration file.
To read a configuration in the right pane, click its name:
5-22
The top frame shows the modifications, with the Previous line and the Modified line (in the
example above, the Previous line is empty because an object was created),
the bottom frame shows them in the two configuration files they belong to; two blue arrows allow
jumping from one modification to the next one (down arrow) or to the previous one (up arrow).
Ipanema Technologies
October 2014
Service activation.
October 2014
Ipanema Technologies
6-1
Ipanema System
in case of failure of ip|boss or of the server, at the next start of ip|boss, the session
will be on the same state (automatic restart if it was started, or stop if it was stopped).
6. 1. 2. Stopping a session
Operating procedure table: ip|true, ip|fast, ip|coop, ip|xcomp , ip|xtcp, ip|xapp, DWS,
smart|plan, IMA.
A session can be stopped on the ip|engines by the Toolbar,
Service activation.
Stopping a session will stop all functions of the system (ip|true (measurement), ip|fast,
ip|xcomp, ip|coop, ip|xtcp, ip|xapp, DWS, smart|plan).
Check that the indicator lights on the status zone turn to black.
6-2
Ipanema Technologies
October 2014
A: means that the modifications made by a user of the service are automatically applied,
U: means that the user has to use Update to apply the modifications made.
Table Dynamically modifying a session: ip|true service, ip|fast service, ip|xcomp service,
ip|coop service, ip|xtcp service, ip|xapp service.
Components
Dynamic
Services
Other
Manager
System
System
Administration
System
provisioning
October 2014
Login
Login/User Settings
Update
Help
User
Automatic reporting
Security/Generation
Security/Configuration
ip|engines
Topology Subnets
WAN access
Coloring
ip|sync
Tools/Software
upgrade
Tools/Reboot
Tools/Script
Tools/Security status
Ipanema Technologies
6-3
Ipanema System
Components
Service activation
Supervision
Application
provisioning
Reporting
Dynamic
Services
Other
Enable ip|engines
Disable ip|engines
Enable ip|fast
Disable ip|fast
Enable ip|xcomp
Disable ip|xcomp
Enable ip|coop
Disable ip|coop
Enable ip|xtcp
Disable ip|xtcp
Enable ip|xapp
Disable ip|xapp
ip|engines status
Supervision map
Log
Options/Activation
Options/Mail
Options/Trap
User subnets
Applications
TOS
Application Group
QoS profile
MetaView
ip|reporter
Alarming
Whether for a Start or an Update, the configuration is checked to inform the user that resources
(Domains and services) are referenced even though they are not configured in the directories or
dictionaries. As long as the check is not OK, no Start or Update operation can be performed on
ip|engines. The check operation accepts configurations with empty dictionaries or directories.
6-4
Ipanema Technologies
October 2014
6. 2. 1. Update procedure
Operating procedure table: ip|true, ip|fast, ip|coop, ip|xcomp, ip|xtcp, ip|xapp , DWS,
smart|plan, IMA, ip|sync.
In the Toolbar, select
Update.
If some ip|engines do not apply the new configuration, ip|boss automatically reconfigures these
ip|engines. The status indicator is yellow and shows either:
ip|boss systematically sends a complete configuration file to the ip|engines of the Domain.
6. 2. 2. Transition
In the ip|engines reconfiguration phase, some ip|engines must measure, control and compress
on the basis of different configurations. In addition, as an SNMP agent must take the new
configuration into account (after Update), it may receive measurement results for the previous
configuration. Different problems can arise:
For suppressed dictionary entries, reports on the previous configuration (i.e. with old aggregate
application or TOS values) are automatically classified in other by ip|boss. There is no retroactive
effect on measurement data that may have been saved in ip|reporter.
For suppressed subnet directory entries, reports on the previous configuration (i.e. with old subnet
values) are automatically rejected by ip|boss.
For suppressed ip|engine directory entries, reports on the previous configuration (i.e. with old
ip|engine values) are automatically rejected by ip|boss.
For suppressed ip|engine directory entries, the ip|engines that have disappeared are stopped.
However, the stop signal may not reach the ip|engines concerned after 10 attempts spaced out
over the recovery interval configured in the system, the stop operation is abandoned by the
manager and the user is informed.
October 2014
Ipanema Technologies
6-5
Ipanema System
6. 3. SERVICE ACTIVATION
6. 3. 1. ip|true (measurement)
Operating procedure table: ip|engines Enabled, ip|engines Disabled
Stopping ip|true will stop all other functions of the system (ip|fast, ip|xcomp, ip|coop,
ip|xtcp, ip|xapp, DWS, smart|plan). Refer to the section Stopping a session.
The measurement mechanisms are designed to measure precisely all flows crossing the
ip|engines and to provide comprehensive metrics (volume and quality).
ip|true is enabled, if:
Administrative stare: enable is checked in the ip|engines creation window (Services frame):
6-6
Ipanema Technologies
October 2014
Applications
User Subnets
QoS profiles
MetaViews
Application Groups
Reports
TOS
October 2014
Ipanema Technologies
6-7
Ipanema System
QoS objectives are expressed in terms of "physical" constraints (delay, jitter, loss rate, etc.),
customer policies are expressed in terms of classes, defining relative traffic criticality.
ip|fast: on:
6-8
Ipanema Technologies
October 2014
Applications
User Subnets
QoS profiles
LTL
Application Groups
Coloring
TOS
WAN access
October 2014
Ipanema Technologies
6-9
Ipanema System
6. 3. 3. ip|coop (tele-cooperation)
Operating procedure table: tele-cooperation Enabled, tele-cooperation Disabled
The tele-cooperation mechanisms are designed to control the traffic on tele-managed sites as
efficiently as possible. To achieve this, a remote coordination group (RCG), that contains the main
sources of traffic to that site, is automatically and dynamically configured by ip|boss; the RCG can
contain up to 8 ip|engines. Each tele|engine has its own RCG.
ip|coop is enabled, if:
ip|coop: on.
6-10
Ipanema Technologies
October 2014
If ip|coop is not enabled, tele|engines will still measure and control the traffic, with the
following restrictions:
measurement: the traffic will be measured and reported exactly the same,
control: the traffic will be controlled with no Remote Coordination Group, each
ip|engine managing the flows to and from the unequipped sites (tele|engines) on
its own, without coordination with the other ip|engines communicating with this site.
October 2014
Ipanema Technologies
6-11
Ipanema System
(The ip|engines display window shows yes in the compress and/or decompress columns.)
the Application Groups have been configured (Compress must be checked),
6-12
Ipanema Technologies
October 2014
ip|engines
October 2014
Application Groups
Ipanema Technologies
6-13
Ipanema System
6-14
Ipanema Technologies
ip|xtcp: on:
October 2014
ip|engines
October 2014
Application Groups
Ipanema Technologies
6-15
Ipanema System
ip|xapp: on:
ip|engines
6-16
Ipanema Technologies
October 2014
6. 3. 7. smart|plan
Operating procedure table: Smart Planning Enabled, Smart Planning Disabled
Ipanema Technologies Smart planning reports provide easy-to-use data for Capacity Planning
optimization. smart|plan generates very high added value data enabling a complete analysis
for each network access of the relationship between Traffic (resource) and delivered service
level (results). Using this automatically generated data, it is immediately possible to identify if the
access link is under-provisioned or over-provisioned in regard of the expected service level per
applications business criticality.
smart|plan is enabled, if:
smart|plan: on:
October 2014
Ipanema Technologies
6-17
Ipanema System
6. 3. 8. IMA
Operating procedure table: IMA Enabled, IMA Disabled
Ipanema Mobile Agent is a SoftWOC (Software WAN Optimization Controller), more precisely a
software agent for Windows desktops and laptops, which provides SRE compression and CIFS
acceleration services to nomad users and small offices on non-equipped (or tele-managed) sites
and sites equipped with a nano|engine.
It works in server-client mode, where an ip|engine (ip|e 140ax or above) plays the role of IMA
server and IMA software installed on the users desktop or laptop is an IMA client.
IMAs detection, configuration and activation are fully automatic.
IMA service is enabled, if:
IMA: on:
6-18
Ipanema Technologies
October 2014
6. 4. HELP
In the Toolbar, select
Help:
Help window
This window contains the documentation of Ipanema System.
October 2014
Ipanema Technologies
6-19
CHAPTER 7. MONITORING
(IP|DASHBOARD)
Document organization
This chapter describes ip|dashboard capabilities.
7. 1. CONNECTION
To connect to ip|dashboard from the SALSA client, first select the Domain you want to monitor,
then click on the ip|dashboard button:
SALSA client
October 2014
Ipanema Technologies
7-1
Ipanema System
7-2
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
Quick search
October 2014
Ipanema Technologies
7-3
Ipanema System
and, when Dashboard is selected, several views (the active view is displayed with a blue title):
Sites (<number>), with two frames (<number> is the number of Sites currently configured):
Overview
Sites
Flows (<number>), with two frames (<number> is the number of Flows measured during the
last polling period):
Overview
Application flows
<Site> - Discovery
You can open them by clicking on their names in the view bar. A Site view has to be opened first
by clicking on the Site name or bar in the Domain or Sites views.
7-4
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
Example of a Site view with one frame expanded and all other frames collapsed
The first frame header of each view (at the top of the main space, just below the menu and view
bar) contains, after the name of the frame:
a tooltip
Site tooltip
October 2014
Ipanema Technologies
7-5
Ipanema System
The lifetime of the data and the ability to aggregate hourly data depend on the
storage parameters in ip|uniboss Domain window.
a button to set the date and time to Now and unfreeze the view (the view is frozen when a date
and time have been selected; the button is greyed when clicked);
a
or
button, in the Domain and Site views, allowing an easy and
contextual access to the reports (see Access to the reports below).
7-6
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
You can read the exact values on a bar graph or on a pie chart, by rolling over them with your
mouse. A small pop-up then appears with the name on the field and its value:
You can access a Site view by clicking on its bar in a bar graph.
You can access the Flows view filtered out to match an Application Group by clicking this AG
in a bar graph or in a pie chart. For instance, clicking on VideoStreaming in the Application
Groups by AQS graph in the Domain view shows the flows belonging to the VideoStreaming
AG:
October 2014
Ipanema Technologies
7-7
Ipanema System
Historical graphs
You can read the exact values on historical graphs by rolling over them with your mouse. A
vertical bar then appears on the graph, with a pop-up indicating the exact time and the exact
values of each curve at this time; the same vertical bar and pop-up also appear in the other
historical graphs of the view, thus allowing a synchronized navigation and reading of all graphs:
You can change the time (of the entire page) by clicking anywhere in these graphs; the time
then changes to the clicked moment.
You can highlight any curve by rolling over its legend, and you can hide or show it by clicking
its legend. In the example below, we just show the Top and High traffic, highlighting the High
curve.
7-8
You can export any graph, both in PNG and CSV formats, by right-clicking it.
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
or
To access the reports, click on the icon to display the reports list; for example:
October 2014
Ipanema Technologies
7-9
Ipanema System
7. 3. DOMAIN VIEW
Dashboard views
The Domain view shows two frames:
7. 3. 1. Quality Summary
This frame shows four graphs with the following information:
AQS Evolution
Historical graph showing the evolution of the AQS for all flows, and for the Top, High, Medium and
Low flows, on the whole Domain. The covered period and the granularity of the data depend on
the time span (see Frames and timing above): it can be three hours of per-minute information, if
the time span is the minute (then the user can scroll the past hours with the horizontal scroll bar at
the bottom of the graph), or it can be the last three days of hourly averaged information, if the time
span is the hour.
Site Overview
Pie chart showing the number of Sites (and the percentage of the total that they represent):
7-10
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
Bar graph showing the Top 10 Application Groups (i.e. the 10 AGs with the best quality) sorted
by decreasing quality (the best AG of the Domain is displayed in the first bar on the left), with
their AQS values displayed both as a number (between 0 and 10 with two decimals) and as a
colored bar (the height of the bar indicates the value on the vertical axis and the color can take
any hue between green (AQS = 10) and red (AQS = 0)).
By clicking on Worst 10 at the top of the bar graph, the 10 worst Application Groups are
displayed, sorted by increasing quality (the worst AG of the Domain is displayed in the first bar
on the left), with their AQS values.
Sites by AQS
This bar graph shows the Top 10 Sites (i.e. the 10 Sites with the best quality) sorted by
decreasing quality (the best Site of the Domain is displayed in the first bar on the left), with
their AQS values displayed both as a number (between 0 and 10 with two decimals) and as a
colored bar (the height of the bar indicates the value on the vertical axis and the color can take
any hue between green (AQS = 10) and red (AQS = 0)).
By clicking on Worst 10 at the top of the bar graph, the 10 worst Sites are displayed, sorted
by increasing quality (the worst Site of the Domain is displayed in the first bar on the left), with
their AQS values.
By clicking on a bar, a new window opens and shows detailed information for the selected Site.
October 2014
Ipanema Technologies
7-11
Ipanema System
7. 3. 2. Activity Summary
This frame shows two graphs with the following information:
Throughput Evolution
Historical graph showing the evolution of the WAN throughput for the Top, High, Medium and Low
flows (or any combination of these, according to the selection in the legend by default, it shows
all of them, i.e. the total WAN throughput), on the whole Domain. The covered period and the
granularity of the data depend on the time span (see Frames and timing above): it can be three
hours of per-minute information, if the time span is the minute (then the user can scroll the past
hours with the horizontal scroll bar at the bottom of the graph), or it can be the last three days of
hourly averaged information, if the time span is the hour.
Top by volume
Pie chart showing the names and volumes of the top 10:
7-12
Application Groups in volume (by clicking Top 10 Application Groups at the top of the graph;
this is the default view),
Sites in volume of outgoing traffic (by clicking Top 10 Sites (LAN => WAN)),
Sites in volume of incoming traffic (by clicking Top 10 Sites (WAN => LAN)).
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 4. SITES VIEW
Dashboard views
The Sites view gives access to the following information:
In the view bar, the total number of Sites currently configured on the Domain is displayed into
parenthesis (in the screenshot below: 100).
Overview
Sites
7. 4. 1. Overview
This frame shows two graphs with the following information:
Sites - Overview
AQS Evolution
Historical graph showing the evolution of the AQS for all flows, and for the Top, High, Medium and
Low flows, on all the Sites of the Domain, i.e. for the whole Domain: it is identical to the AQS
Evolution graph described in the previous section (please refer to that section for more details).
Throughput Evolution
Historical graph showing the evolution of the WAN throughput for the Top, High, Medium and Low
flows on all the Sites of the Domain, i.e. for the whole Domain: it is identical to the Throughput
Evolution graph described in the previous section (please refer to that section for more details).
October 2014
Ipanema Technologies
7-13
Ipanema System
7. 4. 2. Sites
This frame shows, for all Sites of the Domain, the following information:
Sites - Sites
Site: name of the Site; by clicking on that name, a new window opens with more details on the
selected Site.
The Sites links usage and quality with, for each direction (LAN => WAN and WAN => LAN), the
following fields:
link size: WAN access throughput, as declared in ip|boss (max BW),
link usage: usage of the link, displayed both as a percentage of the link size and as a
bar, the size of which is proportional to the usage,
AQS: quality of the link, displayed both as an AQS value (between 0 and 10) and as a
color (between green (AQS = 10) and red (AQS = 0)).
The Sites Application Groups volume and quality, sorted by Criticality levels (Top, High,
Medium, Low), with each square color representing the quality of the corresponding Application
Group (in the same column) for the corresponding link (on the same line); it can take any hue
between green (AQS = 10) and red (AQS = 0).
you can read the exact values by hovering your mouse on the squares;
clicking on a square opens a new window for the corresponding Site, where it filters the
flows in the Sites Real Time Flows list (see below) according to the selected Application
Group: thanks to this features, you can immediately access the details of any Application
Group for any Site.
This view is automatically refreshed every minute (or every 5 or 15 minutes, according to the collect
period see the Domains parameters in ip|uniboss).
7-14
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
October 2014
Ipanema Technologies
7-15
Ipanema System
7. 5. FLOWS VIEW
Dashboard views Application flows in the Site view
Operating procedure table: ip|true service, ip|fast service, ip|xcomp service, ip|coop service,
ip|xtcp service, ip|xapp service.
The Flows view shows two frames:
Overview
Application flows
In the view bar, the total number of flows currently running on the Domain is displayed into
parenthesis (in the screenshot below: 3366).
In the Ipanema system, we call a flow all the sessions of a given application, from a
given source to a given destination.
7. 5. 1. Overview
This frame shows two graphs with the following information:
Flows - Overview
AQS Evolution
Historical graph showing the evolution of the AQS for all flows, and for the Top, High, Medium and
Low flows, on all the flows of the Domain, i.e. for the whole Domain: it is identical to the AQS
Evolution graph described in the Domain view section above (please refer to that section for more
details).
Throughput Evolution
Historical graph showing the evolution of the WAN throughput for the Top, High, Medium and Low
flows for all the flows of the Domain, i.e. for the whole Domain: it is identical to the Throughput
Evolution graph described in the Domain view section above (please refer to that section for more
details).
7-16
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 5. 2. Application flows
The top of the view contains four filters (see 7.5.2.1) and the rest of the view shows:
button.
In either case, the information displayed matches the selected filters (all flows on the Domain if no
filter was selected).
7. 5. 2. 1. Filters
It is possible to filter the flows by AQS, moving the two cursors of the AQS filter at the top of the
frame (e.g. to see the bad flows only (AQS <5), as in the example below):
AQS filter
As in the Sites view described above, a text field allows filtering the flows with the Sites tags
(corresponding to the fields Folder, Subfolder or Tag in the ip|engines creation window), a
button opens a map where the flows can be filtered by clicking these tags, and a
button allows downloading or opening a zipped CSV file containing all the flows information
displayed in this frame.
October 2014
Ipanema Technologies
7-17
Ipanema System
Local Sites,
Remote Sites,
Application Groups,
Applications
Flow filters
Applying a filter
The flows in the chord diagram and in the detailed flows list can be filtered out by clicking on any
filter or any combination of filters.
One can select several filters in a column by maintaining the CTRL key pressed during the selection.
To select all filters between line A and line Z, select line A, press the SHIFT key and select line Z
while maintaining the SHIFT key pressed.
Several filters from several columns can be applied simultaneously.
To remove the filters, click the first line (ALL; this is the default view).
When a filter is applied, the two others are automatically updated accordingly. For instance, if FTP
is selected in the Application Groups filter, the Applications filter table will only show the applications
belonging to that Group (ALL shows the total throughput for that Group too), and the throughputs
displayed in the Remote Sites filter correspond to the throughput for that Group only.
It is possible to sort the data in these filters by clicking on the column headers: click once to sort
the data incrementally (an up arrow
data decrementally (
).
(ALL shows all flows with the total values, and it always appears at the top of the filter tables,
whatever the sorting criteria.)
7-18
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
Example where only MailCollaborative between Roma and Paris are shown in the flows list
October 2014
Ipanema Technologies
7-19
Ipanema System
Topology
Local Site
Local User
Subnet
name of the User subnet on the local Site (this field is empty if the local IP
address does not belong to any User subnet defined on the Site)
Local User
Subnet
name of the User subnet on the local Site (this field is empty if the local IP
address does not belong to any User subnet defined on the Site)
direction of the flow:
outgoing (the local Site is the source)
incoming (the local Site is the destination)
7-20
Remote Site
name of the remote ip|engine (where the flow is going to or coming from)
Remote User
Subnet
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
AQS
Application Quality Score of the flow: score between 0 (extremely bad quality) and 10 (excellent
quality), displayed with two decimals.
The color of the field also represents the quality, with the following meaning:
Excellent, Very good, etc., are only a typical
interpretation of the AQS with typical parameters
it may vary according to the users sensibility and
according to the QoS profile parameters.
When the AQS is not good, the parameters (delay, jitter, loss, etc.) that triggered an average
or a bad quality are also highlighted with the same color, so that one can easily find which
parameters objectives were not met (yellow) or which parameters maximum values were
exceeded (red).
100 is a reserved value used when the AQS cannot be computed.
The quality of a flow cannot be computed when ALL three following conditions are met:
it is a real time flow (the bandwidth is not a criteria) or the bandwidth objective of the flow is
not met (the quality is measured thanks to the other parameters),
the flow is not qualified (D/J/L cannot be measured),
the flow runs over UDP (RTT, TCP retransmission and SRT cannot be measured either) or
those parameters are not activated in the QoS profile.
Classification
Application
Group
Application
Criticality
Sens.
Thr. (kbps)
October 2014
Thr.: LAN-to-LAN throughput (number of bits per second sent at the IP layer)
Good: LAN-to-LAN goodput (number of useful bits received at the application
layer i.e. payload of the TCP and UDP packets received on the downstream
side; retransmitted, out of sequence and lost packets are not counted).
Throughput vs Goodput, example:
Ipanema Technologies
7-21
Ipanema System
Sess.
Loss (%)
LAN-to-LAN loss rate (measured between the LAN port of the source ip|engine
and the LAN port of the destination ip|engine)
Delay (ms)
LAN-to-LAN one-way-delay (in ms) measured between the LAN port of the
source ip|engine and the LAN port of the destination ip|engine
Min: minimum LAN-to-LAN one-way-delay
Avg: average LAN-to-LAN one-way-delay
Max: maximum LAN-to-LAN one-way-delay
Jitter (ms)
LAN-to-LAN jitter (delay variation measured between the LAN port of the
source ip|engine and the LAN port of the destination ip|engine)
WAN
Thr. (kbps)
Loss (%)
WAN-to-WAN loss rate (measured between the WAN port of the source
ip|engine and the WAN port of the destination ip|engine)
Delay (ms)
WAN-to-WAN one-way-delay (in ms) measured between the WAN port of the
source ip|engine and the WAN port of the destination ip|engine
Min: minimum WAN-to-WAN one-way-delay
Avg: average WAN-to-WAN one-way-delay
Max: maximum WAN-to-WAN one-way-delay
Jitter (ms)
WAN-to-WAN jitter (delay variation measured between the WAN port of the
source ip|engine and the WAN port of the destination ip|engine)
Comp
Ratio
7-22
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
TCP
SRT (ms)
The Server Response Time measures the delay (in ms) between the last
packet sent by the client during a request (PSH) and the emission of the
acknowledgement to the first packet received from the server (ACK).
When an ip|engine is installed on the client side, it measures this response
time and reports it to ip|boss; otherwise, it is the ip|engine installed on the
server side which does it (and the measurement is made between the reception
of the PSH and the reception of the ACK).
If the same ip|engine does not see the two ways of the TCP connection
(in case of a cluster with asymmetric routing), the SRT will not be measured
unless the two ip|engines of the cluster are connected together and the ASR
feature is configured.
The Round Trip Time measures the time of establishment of a TCP connection
(3way handshake: SYN, SYN+ACK, ACK), that is: the delay (in ms) between
the emission of the SYN and the emission of the ACK.
When an ip|engine is installed on the client side, it measures this RTT and
reports it to ip|boss; otherwise, it is the ip|engine installed on the server side
which does it (and the measurement is made between the reception of the
SYN and the reception of the ACK).
If the same ip|engine does not see the two ways of the TCP connection
(in case of a cluster with asymmetric routing), the RTT will not be measured
unless the two ip|engines of the cluster are connected together and the ASR
feature is configured.
Comp.
Accu.
Al.
this field indicates, when at yes, the presence of an alarm on the ip|engine.
Check its status for further information. In case of alarm, the correlation records
are ignored.
October 2014
Ipanema Technologies
7-23
Ipanema System
TOS / DSCP
name of the TOS / DSCP value used to recognize the application, when applicable
This table is refreshed about every minute (according to the ip|engine collect period option).
The same metrics are used in the reports, with the same definitions. Yet, in the
reports, other metrics and symbols are also used: you can find their definitions in 8.3.5
Definitions.
7-24
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 5. 2. 3. Flows map
The flows map is a dynamic and interactive chord diagram of the flows.
/
One can toggle between this view and the Detailed flows list with the
views are different representations of the same data, with the same filters applied.
button. Both
Flows map
It displays the flows matrix with a hierarchical structure:
1. Folders (e.g. continents*),
2. Subfolders (e.g. countries*),
3. Sites (e.g. called by the name of the cities),
4. NAPs (in case the Site has several NAPs, when the DWS feature is used).
* Folders and Subfolders are defined in the ip|engines creation window. For instance (as in the
example above), they can be used to sort the Sites continent by continent (Folders = continents),
then country by country (Subfolders = countries).
October 2014
Ipanema Technologies
7-25
Ipanema System
zoom in by clicking on the arcs or on their names (in the example below: Europe > France >
Paris); the cursor shows a down arrow:
displayed when one zooms in;
zoom out by clicking on the external arcs; the cursor shows an up arrow:
Flows map with too much zoom and too many chords displayed
When the map is opened, it shows the Folders level (e.g. the flows between continents). Out of
Domain is displayed on its own, indicated by an arrow.
7-26
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
Hovering the mouse on an extremity hide the traffic between the other extremities and displays this
extremitys details (volume and quality) in a pop-up. Here for instance, we show the traffic between
Asia and the rest of the world:
October 2014
Ipanema Technologies
7-27
Ipanema System
Clicking on an extremity or on its name (e.g. Asia) allows zooming in this extremity (e.g. continent),
breaking it up into the next level (here: countries). So here for instance, we are zooming into Asia to
see the traffic between each Asian country and the rest of the world (still displayed as continents):
Flows map, zooming from a continent (folder) into its countries (subfolders)
7-28
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
October 2014
Ipanema Technologies
7-29
Ipanema System
The three switches at the top left of the diagram allow changing some display settings: LAN=>WAN
/ WAN=> LAN, Per link usage / Per throughput and Traffic only / All groups.
By default, the three switches are in the LAN=>WAN, Per link usage and Traffic only positions:
The [LAN=>WAN / WAN=> LAN] switch allows changing the direction of the flows displayed.
[Per link usage / Per throughput] allows showing traffic chords with a size proportional to:
the links (Per link usage); arc = available bandwidth; chords = traffic; in the example
above, we can see that in South America, about a third of the bandwidth is used (we
can read the exact percentage by hovering the mouse on the arcs);
the throughput (Per throughput); arc = sum of the chords = total traffic: the traffic is
displayed independently of the available bandwidth.
7-30
[Traffic only / All groups] allows displaying extremities with traffic matching the filters only (Traffic
only) or all the groups where traffic is also present (but without matching the selected filters).
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
The three switches can be combined to display the desired information. Here for instance, we want
to see the traffic from Las Vegas to Sao Paulo (LAN=>WAN), as a proportion of the links on these
Sites (Per link usage), showing the other links as well (All groups), so that we can see what the
traffic from Las Vegas to Sao Paulo represents on the whole Domain (i.e. also displaying the other
Sites of the Domain):
Flows map, displaying the link usage between two Sites, on the whole Domain
October 2014
Ipanema Technologies
7-31
Ipanema System
By removing the Remote Sites filter, we can now see, on the same diagram, the traffic from Las
Vegas to all remote sites (with the one between Las Vegas and Sao Paulo highlighted):
Flows map, displaying the link usage between a Site and all the remote ones, on the whole
Domain
At any level of the map, clicking on a chord opens the flows list, automatically filtered out to display
the flows corresponding to the selected chord.
7-32
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
October 2014
Ipanema Technologies
7-33
Ipanema System
7-34
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
October 2014
Ipanema Technologies
7-35
Ipanema System
The graph window contains four tabs, and each tab is made of 4 graphs, displayed simultaneously:
Tab
Graphs
What is shown
OVERVIEW
Avg. sessions
Throughput (kbps)
Delay (ms)
Jitter (ms)
LAN-TO-LAN jitter
Throughput (kbps)
Delay (ms)
Jitter (ms)
WAN-TO-WAN jitter
Throughput (kbps)
SRT (ms)
RTT (ms)
Retransmission (%)
TCP retransmissions
Throughput (kbps)
LAN
WAN
TCP
In case of control and/or compression, the differences between LAN and WAN values
can be very different.
If the upstream or downstream ip|engine is not synchronized, or if the flow is between
and equipped site and a tele-managed site, then the delay, jitter and packet loss are not
measured.
7-36
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
October 2014
Ipanema Technologies
7-37
Ipanema System
7-38
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 5. 4. Discovery
From any flow in the flows list described above (7.5.1), one can open a Discovery agent, which
polls additional information on the selected ip|engine.
To access the Discovery function, right click on a flow and select Start Discovery:
October 2014
Ipanema Technologies
7-39
Ipanema System
<Site> - Discovery
7. 6. 1. Quality Summary
This frame shows two graphs with the following information:
AQS Evolution
Historical graph showing the evolution of the AQS for all flows, and for the Top, High, Medium and
Low flows, on the selected Site. It is similar to the AQS Evolution graph described in the Domain
view section above, but at the Site level (please refer to that section for more details).
Application Groups by AQS
7-40
This bar graph shows the Top 10 Application Groups (i.e. the 10 Application Groups with the
best quality) sorted by decreasing quality (the best Application Group of the Site is displayed in
the first bar on the left), with their AQS values displayed both as a number (between 0 and 10
with two decimals) and as a colored bar (the height of the bar indicates the value on the vertical
axis and its color can take any hue between green (AQS = 10) and red (AQS = 0)).
By clicking on Worst 10 at the top of the bar graph, the 10 worst Application Groups are
displayed, sorted by increasing quality (the worst Application Group of the Site is displayed in
the first bar on the left), with their AQS values.
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 6. 2. Activity Summary
This frame shows four graphs with the following information:
top 10 AGs in volume of outgoing traffic (by clicking Top 10 Application Groups (LAN =>
WAN) at the top of the graph),
top 10 AGs in volume of incoming traffic (by clicking Top 10 Application Groups (WAN =>
LAN) at the top of the graph),
Clicking on an Application Group in the chart automatically filters the traffic for that Application
Group in the Real Time Flows frame below (see below).
Top Remote Sites by volume
This pie chart shows the following information, with their names and volumes:
top 10 Remote Sites in volume of traffic sent to these Sites (by clicking Top 10 Remote Sites
(LAN => WAN) at the top of the graph),
top 10 Remote Sites in volume of traffic received from these Sites (by clicking Top 10 Remote
Sites (WAN => LAN) at the top of the graph),
LAN => WAN Throughput Evolution Per Criticality
This historical graph shows the evolution of the WAN throughput of the outgoing traffic, by criticality
level (Top/High/Medium/Low).
WAN => LAN Throughput Evolution Per Criticality
This historical graph shows the evolution of the WAN throughput of the incoming traffic, by criticality
level (Top/High/Medium/Low).
October 2014
Ipanema Technologies
7-41
Ipanema System
the ingress bandwidth of the Site (B/w, dotted black line), corresponding to the Ingress max.
B/W in the WAN access configuration window,
the evolution of the ingress LAN-to-LAN throughput (measured on the LAN interface of the
ip|engine, LAN, in blue and in the background),
the evolution of the ingress WAN-to-WAN throughput (measured on the WAN interface of the
ip|engine, WAN, in orange and in the foreground),
the egress bandwidth of the Site (B/w, dotted black line), corresponding to the Egress max.
B/W in the WAN access configuration window,
the evolution of the egress LAN-to-LAN throughput (measured on the LAN interface of the
ip|engine, LAN, in blue and in the background),
the evolution of the egress WAN-to-WAN throughput (measured on the WAN interface of the
ip|engine, WAN, in orange and in the foreground),
Same remarks as above.
7-42
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 6. 4. Application flows
This frame shows the same information as described above (7.5 Flows view), but for the selected
Site as the Local Site (so the Local Sites filter is not necessary here, reason why there are three
filter frames instead of four). Please refer to that section.
It may not be visible for some Users, depending on their rights (as defined in
ip|uniboss).
October 2014
Ipanema Technologies
7-43
Ipanema System
7-44
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
7. 6. 5. Discovery
Operating procedure table
This frame allows polling more information from an ip|engine.
It may not be visible for some Users, depending on their rights (as defined in
ip|uniboss).
Site - Discovery
The Discovery function consists in creating a Discovery agent for the selected ip|engine (one
agent maximum per ip|engine) to collect additional data (as compared to the data already collected
and displayed in the Real Time Flows list see above).
To use the Discovery function:
1.
2.
3.
2.
7. 6. 5. 1. Filters
The flows can be filtered according to multiple criteria, using the 5 drop-down lists and 2 check
boxes surrounding the network diagram:
October 2014
Ipanema Technologies
7-45
Ipanema System
Local User Subnet: to filter the data using a User subnet declared in ip|boss for the local Site,
An Out of Local Config. check box allows, if checked, to display the traffic which does
not belong to the local configuration only (see Out of local subnets above)
Remote User Subnet: to filter the data using a User subnet declared in ip|boss for a remote
Site,
Remote Site: to filter the data using a User subnet declared in ip|boss for a remote Site,
Application: to filter the data according to one application,
An Out of config check box, allows, if checked, to discover the port number used by
the unrecognized applications (see above).
and
7. 6. 5. 3. Result table
According to the configuration rules this Discovery agent will collect the following data and send
them to ip|boss:
Local IP
local IP address
Remote IP
remote IP address
Application
7-46
Ipanema Technologies
October 2014
Monitoring (ip|dashboard)
percentage of traffic that each line represents over the total, in terms
of LAN=>WAN Packets, LAN=>WAN Bytes, LAN=>WAN Sessions,
WAN=>LAN Packets, WAN=>LAN Bytes or WAN=>LAN Sessions,
according to the Sort by choice
Discovery result table
The counters are cleared at each start of a Discovery agent.
Display settings
The results can be displayed in different ways, thanks to 6 drop-down lists below the network
diagram:
Local IP:
Detail: the local IP addresses are displayed (so different local IP addresses will always
be displayed on different lines),
Group: the local IP addresses are not displayed (and all flows with the same remote IP
address and same application will be merged on one line, even if they have different
local IP addresses).
Remote IP:
Detail: the remote IP addresses are displayed (so different remote IP addresses will
always be displayed on different lines),
Group: the remote IP addresses are not displayed (and all flows with the same local IP
address and same application will be merged on one line, even if they have different
remote IP addresses).
Application:
Detail: the application names are displayed (so different applications will always be
displayed on different lines),
Group: the application names are not displayed (and all flows with the same local IP
address and same remote IP address will be merged on one line, even if different
applications are running between these two addresses).
Top:
20: shows the 20 most significant results (in Packets, Bytes or Sessions, according to
the field used to sort the data),
50: shows the 50 most significant results,
100: shows the 100 most significant results.
Sort by: it is possible to sort the data according to the number of:
Bytes,
Packets,
Sessions,
Bytes,
Packets,
Sessions.
October 2014
Ipanema Technologies
7-47
Ipanema System
Period:
10 s: the results are refreshed every 10 seconds,
1 mn: the results are refreshed every minute,
5 mn: the results are refreshed every 5 minutes.
7-48
Ipanema Technologies
October 2014
8. 1. OVERVIEW
The SSL Optimization feature is actually an enabler for applying any Ipanema optimization service
to the SSL encrypted flows (the main optimization service being ip|xcomp SRE).
8. 1. 1. Deployment
SSL Optimization can apply wherever there are SRE-capable appliances (i.e. ip|engines ax
models) deployed on the flows path, on both sides of the WAN (branch-side and datacenter-side).
8. 1. 2. Applications
SSL Optimization applies on any application over SSL. This includes (but is not limited to):
SSL Optimization does not apply on applications that are not over SSL (whatever is over IPSec,
encrypted MAPI, encrypted SMBv2, SSH ).
October 2014
Ipanema Technologies
8-1
Ipanema System
8. 1. 3. Principles
The datacenter-side ip|engine acts as an SSL proxy and intercepts the SSL handshake between
the client and the server.
SSL proxy
The SSL proxy re-signs server certificates on the fly, using a proxy CA certificate that is provided
by the end-user company IT. Therefore, it is not the original certificate that the client application
(e.g. HTTPS browser) presents, rather a clone of this certificate, issued by the SSL proxy and
signed with the proxy CA certificate.
SSL certificate
Once the security parameters are negotiated on both sides of the proxy connection (client-to-proxy
and proxy-to-server), the session keys are sent over a secure encrypted tunnel to the branch-side
ip|engine.
8-2
Ipanema Technologies
October 2014
8. 2. CONFIGURATION
Enabling SSL optimization requires a simple fourstep configuration process in ip|dashboard SSL
configuration page:
October 2014
Ipanema Technologies
8-3
Ipanema System
either import a Certificate existing in your IT environment, by clicking the Import button:
Import a Certificate
If the Proxy CA Private key you import is encrypted with a passphrase, this
passphrase must also be provided to the ip|engines belonging to SSL proxy
enabled Sites. Please refer to the ip|engines installation manuals.
or generate a Certificate, by clicking the Generate button (then you should export it to your IT
trust-store, using the Export button):
Generate a Certificate
The following fields can be specified (bold characters: mandatory; standard characters:
optional):
Common name (CN),
Passphrase (has to be entered twice, if used): to be used if you want the Proxy CA
Private key to be encrypted with a passphrase, to raise the security level of SSL
Optimization (see 8.3. SECURITY AND LEGALS).
In that case, the passphrase must also be provided to the ip|engines
belonging to SSL proxy enabled Sites. Please refer to the ip|engines
installation manuals.
Expiration date,
Organizational Unit (OU),
Organization (O),
Country (C),
State (ST),
Locality (L).
8-4
Ipanema Technologies
October 2014
SSL proxy
Click Add,
Select the Sites you want to enable and push them to the right with the single arrow pointing
to the right (second icon; the double arrow first icon can be used to select all Sites in a
single click),
Select Activated in the SSL Optimization drop-down list;
Click Ok.
Then the selected Sites appear with a green LED in the Status column.
All ip|engines that belong to these Sites (and only those) will be able to proxy SSL flows.
All sites where your enabled SSL servers are hosted should be on that list.
In case you want to optimize traffic to the cloud, the site where your gateway is hosted should be
in there, too.
It is also possible to select Sites you do not want to be SSL proxies, by doing the same
as above, but selecting Desactivated in the SSL Optimization drop-down list. These
Sites appear with a grey LED in the Status column.
October 2014
Ipanema Technologies
8-5
Ipanema System
You can select the declared Sites (activated or deactivated) by clicking the checkboxes before their
names, or by using the selection menu:
Selection menu
The following operations can be performed for the selected Sites:
SSL status
8-6
Ipanema Technologies
October 2014
SSL server
Click Add,
Enter:
either the SSL servers IP v4 address, followed by the port number if needed (example:
1.1.1.1:123),
or the SSL servers common name (example: *.ipanematech.*),
All flows to these servers can be deciphered and optimized by the ip|engine before being
re-ciphered and forwarded.
It is also possible to select SSL servers you do not want to decipher nor optimize,
by doing the same as above, but selecting Desactivated in the SSL Optimization
drop-down list.
October 2014
Ipanema Technologies
8-7
Ipanema System
8-8
Current Domain Custom Trust Store, where you can import Trusted Certificates, activate
them, deactivate them and remove them,
Default Trust Store, that shows the list of standard institutional certificates; they can be
activated or deactivated;
Current Domain Trust Store Summary, that displays a summary of the current Domain Trust
Store.
Ipanema Technologies
October 2014
8. 3. 2. Legals
Ipanemas SSL proxy cryptographic functions rely on the standard open-source OpenSSL toolkit.
The OpenSSL cryptographic libraries are used unmodified in order to take full advantage of the
standard. OpenSSL toolkit has been approved by the US Department of Commerce for export as
a mass-market encryption product with >64 bit encryption. It is on the end-users responsibility to
ensure that using this library is also permitted without restriction in their local country.
It is also on the end-users ITs responsibility to make sure that the SSL flows inspection is used
respectfully of the current local legal policies and the company collaborators privacy.
October 2014
Ipanema Technologies
8-9
9. 1. MIB ACCESS
9. 1. 1. MIB
The description file is available in the directory of ip|boss:
~/salsa/ipboss/server/interface/ipanema-technologies.mib
~/salsa/ipboss/server/interface/ipanema-technologies-notifications.mib
9. 1. 2. SNMP
Measures can be used via a MIB access thanks to an SNMP agent included in the ip|boss software.
The UDP port used by this agent must be configured, Domain per Domain (a different port must
be declared for each Domain), in ip|uniboss.
Access to the agent is read-only with SNMPv2c protocol. The Community name is public (default
value, can be configured by user).
The SNMP agent instantiates the system and SNMP groups as well as a private MIB.
The SNMP agent is updated every Short reporting period (as defined in the Domain configuration
see chapter 3).
October 2014
Ipanema Technologies
9-1
Ipanema System
9. 2. IP|REPORTER
This section describes the reporting system, ip|reporter, made by Ipanema Technologies.
9. 2. 1. Ipanema Architecture
The Ipanema solution architecture is composed of the following system elements:
ip|boss is the centralized management software for the Ipanema performance management
system which runs on a standard Solaris or Windows platform. Through the ip|boss, business
objectives are communicated to ip|engines and measurement data are collected.
ip|reporter is a full-service report generating utility. It provides a global view of service levels
for each application, as well as detailed, metrics based reports for problem diagnostics.
The ip|reporter is a reporting tool powered by InfoVista and based on OEM agreement.
InfoVista can operate with real-time data or deferred-time data. Real time, such as SNMP data,
is retrieved from the ip|boss at regular intervals by polling the resource and requesting it for
specific information about the behavior of the resource. These data give up to date information
about IS behavior.
Deferred-time data is external to the SNMP world. It has its source in existing log files (a web
site log file, for example) or databases. It is batch-loaded onto the InfoVista server as some time
after it was generated. InfoVista uses these data to calculate Indicators in the same way as it
handles real time data. And, in fact, when the data is displayed on a report, the origin of the
resource data is totally transparent to the user.
9-2
SNMP (System MIB) Collect of measurement. Interfaced with SNMP agent of ip|boss.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-3
Ipanema System
9-4
Ipanema Technologies
October 2014
Reporting (ip|reporter)
9. 2. 3. Terms
9. 2. 3. 1. The Instance
Each monitored resource in the network is represented by an Instance object (equivalent to a
MetaView in ip|boss) . An Instance can represent any logical or physical element in the network
such as an ip|engine source, an ip|engine destination, a subnet source, a subnet destination, an
application, a Key A, a Key B, an Application Group, a criticality.
The Instance consists of values and identify and characterize the resource (for example, the alias
for an application). These characteristics are called Property and the values assigned to them are
called Property Values.
The data is displayed on a Graph. The Instance is mapped to the Graph via a report.
9. 2. 3. 2. The Vista
You create each Instance object from a template object called the Vista. The Vista indicates which
Properties each Instance should have. You can create any number of Instances from the same
Vista. In this way, you define each type of equipment only once and when you create Instances of
this equipment, you simply supply the values of the Properties.
InfoVista is installed with a number of standard, pre-configured Vistas which allow you to get up
and running immediately.
For example:
the Vista SNMP node has the Properties snmprd (SNMP community read) and snmpwr (SNMP
community write).
Rules can be defined to create relationships between Vistas. They are not immediately
visible in the object model but they are exploited by several Vistas you use. For example,
one of the standard Rules states that All Routers are SNMP nodes. The result is that
the Vista Router automatically inherits all the Properties of the Vista SNMP node as
well as its own intrinsic Properties.
9. 2. 3. 3. The Indicator
An Indicator is a measurement. It tells us something about the operation of a resource. Examples
are data traffic or quality of service. InfoVista calculates the values of Indicators from the source
data, which it collects from the monitored resource.
Standard, pre-configured Indicators exist for the most common situations that you encounter (and
for some of the more difficult ones, too).
9. 2. 3. 4. The Report
An InfoVista report shows one or more Graphs and possibly some decorative text or bitmaps. Each
Graph shows the values of a set of Indicators for a set of Instances (the monitored resources).
October 2014
Ipanema Technologies
9-5
Ipanema System
You can also create sub-folders, if necessary, to organize your working environment.
9. 2. 3. 7. Libraries
A Library (supplied by InfoVista or third parties, or created by you) is used to group together objects
such as Vistas, Indicators, etc. in order to obtain logical units.
9-6
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Manager service
Collector service
or
Client-Server communication failure
Browser service
Which may be displayed after trying to connect to a server, means that the InfoVista
server has not started correctly. If you have a problem, refer to chapter 1 section
Troubleshooting.
October 2014
Ipanema Technologies
9-7
Ipanema System
Windows
Starting IVreport
Unix
9-8
Ipanema Technologies
October 2014
Reporting (ip|reporter)
After startup, the Connection dialog box is displayed. Enter the parameters requested and click on
OK.
Startup window
Server name: Name of the system running the InfoVista server or IP address. If the server is on
the same machine as the client application, leave this field blank or put the loop back address
(127.0.0.1).
Several instances of InfoVista can be installed on the same server. In this case the
syntax is the following: <instance_name>@x.x.x.x (where x.x.x.x is the IP address
of InfoVista server).
In a firewall environment, the endpoints for Manager, Collector and
Browser services can be fix. In this case the syntax is the following:
x.x.x.x:ManagerPort:CollectorPort:BrowserPort (where x.x.x.x is the IP address of
InfoVista server). The endpoints ports can be setup using ip|reporter rich client
(IVreport):
October 2014
Ipanema Technologies
9-9
Ipanema System
9-10
Ipanema Technologies
October 2014
Reporting (ip|reporter)
.A
Click a
Click a
Double-click the name of an object to open the Property sheet or List view window of the object
(shortcut for Edit/Open).
October 2014
Ipanema Technologies
9-11
Ipanema System
The right-hand pane of the window displays the list of sub-objects of the object that is currently
selected in the object tree.
Double-click an object name to open the Property sheet of the object (shortcut for Edit/Open).
The tool bar contains buttons which provide shortcuts for the more frequently used menu
commands.
Open the Property sheet of the selected object (shortcut for Edit/Open).
Create a new report with the Instant Report wizard (shortcut for
Reports/Instant Report).
9-12
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Report viewer
Report/Periodical Refresh/Stop
Report/Periodical Refresh/Start
The report template is configured to update the data display in function of the display rate value.
File/Print While a Report is open, you can print it with this command. The report is printed
on your systems default printer.
Edit/Copy
Toggle Information Mode (not in a menu) When depressed, displays a tool tip over graphic
objects, indicating the Metric name, Vista name and acquisition rates, time span and the objects
Description attribute.
October 2014
Ipanema Technologies
9-13
Ipanema System
Use the reference Time slider to adjust the reference time of the report:
or click on the time or date, edit with the keyboard and press Enter to validate
9-14
Ipanema Technologies
October 2014
Reporting (ip|reporter)
The Domain selected in theSALSA web client has no impact, as once in ip|reporter,
you will be able to select the reports on any Domain you have an access to (according
to you User rights).
If you are connected on a Domain with ip|boss (and if you accesses it via SALSA), you can open
ip|reporter web by selecting the
Different accesses can be defined with different user rights (unlike for the users of IVreport (VF0),
who always have access to all the reports managed by the server). Refer to the Technical note
TN-0200011-04__how_to_configure_report_access_with_VPSE2.pdf.
Two different windows can be displayed, according to the VistaFoundation being installed, VF0 or
VF4:
October 2014
Ipanema Technologies
9-15
Ipanema System
9-16
Ipanema Technologies
October 2014
Reporting (ip|reporter)
9. 2. 5. Reports Management
Operating procedure table: settings (automatic reporting), settings (define reports), service ip|true
(automatic reporting), service ip|true (modify reports), service reporting (automatic reporting),
service reporting (define reports)
The reports are managed in the ip|boss interface, thanks to the Reports and Automatic reporting
tools.
ip|boss manages the Instances creation and deletion in InfoVista according to the configuration
parameters.
ip|boss is the reference for the reports and Instances for infovista. If some reports described in
ip|boss configuration file are not present in InfoVista database, then ip|boss creates the missing
reports. On the opposite, if some reports exist (for the Domain) in InfoVista database and not in
ip|boss configuration, then ip|boss deletes them.
ip|reporter uses the MetaViews for the reports creation and filling.
Three modes of reports creation are available:
Reports, unitary mode: one report is created on one MetaView. This mode is to use to add a
specific report on a specific MetaView, or to create some reports that cannot be created in the
Wizard mode.
Reports, Wizard mode: several reports can be created on several MetaViews in one operation.
For example: two given reports on all User subnets.
Automatic reporting: reports are automatically created for the Domain, for all Equipped sites, for
all tele-managed sites or for all Application Groups, and will be added automatically when new
Domains, new Equipped sites, new tele-managed sites or new Application Groups are created.
October 2014
Ipanema Technologies
9-17
Ipanema System
9. 2. 5. 1. Automatic reporting
This tool allows creating reports for the Domain, for all Equipped sites, for all tele-managed sites
and for all Application Groups.
The selected reports are automatically added for existing Equipped sites*, tele-managed sites* and
Application Groups, and will be automatically added when new Equipped sites*, new tele-managed
sites* or new Application Groups are created.
* For the sites (equipped or tele-managed), the selected reports are created only if
Auto-reporting is at yes in the ip|engine parameters.
Automatic reporting.
9-18
Domain,
Equipped sites,
Tele-managed sites,
Application Groups.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Report template: drop-down list of available report templates, to choose the reports attached
to the selected tab.
four click boxes allow to define which time aggregation can be created for the report:
Hour,
Day,
Week,
Month.
a check box that allows defining the level of confidentiality for the report:
Public (unchecked by default):
when checked, the reports are stored in the hour / day / week / month
folders in IVreport, and an access to the reports can be given to all users using
the web client;
otherwise, the reports are stored in the hour private / day private
/ week private / month private folders in IVreport, and the
access to the reports can be restricted, for the users using the
web client, to authorized users only (refer to the Technical note
TN-0200011-04__how_to_configure_report_access_with_VPSE2.pdf).
October 2014
Ipanema Technologies
9-19
Ipanema System
Reports window
This window contains the list of reports created on each instance with the specific parameters.
By clicking on the New button
MetaView: drop-down list of MetaViews, to choose the MetaView on which the reports will be
created.
Report template: drop-down list of available report templates, to choose the reports attached
to the selected MetaView.
4 check boxes allow to define which time aggregation can be created for the report:Hour, Day,
Week and Month
a check box that allows to define the level of confidentiality for the report:
Public (unclicked by default):
when clicked, the reports are stored in the hour / day / week / month folders
in IVreport, and an access to the reports can be given to all users using the web
client;
otherwise, the reports are stored in the hour private / day private
/ week private / month private folders in IVreport, and the
access to the reports can be restricted, for the users using the
web client, to authorized users only (refer to the Technical note
TN-0200011-04__how_to_configure_report_access_with_VPSE2.pdf).
9-20
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Reports.
Reports window
October 2014
Ipanema Technologies
9-21
Ipanema System
Hour,
Day,
Week,
Month.
a check box that allows to define the level of confidentiality for the report:
Public (unchecked by default):
when checked, the reports are stored in the hour / day / week / month
folders in IVreport, and an access to the reports can be given to all users using
the web client;
otherwise, the reports are stored in the hour private / day private
/ week private / month private folders in IVreport, and the
access to the reports can be restricted, for the users using the
web client, to authorized users only (refer to the Technical note
TN-0200011-04__how_to_configure_report_access_with_VPSE2.pdf).
The left frame shows the list of elements (MetaViews and Report templates) as described in the
system and managed by ip|boss; the right frame shows the selected elements.
Select the elements you want to move (you can select several ones using the SHIFT or CTRL
keys), then use the simple arrows to move them from one frame to the other, or use the double
arrows to move them all at a time.
By selecting several elements in each list, the system will create the reports according to
combinative selected criteria.
9. 2. 5. 4. Reports Deletion
To delete some reports in the InfoVista database, just suppress the reports in the list accessible by
Reports. After the validation of the deletion and update of the configuration, the reports are
definitively deleted, the reports and their data cannot be accessed anymore.
It is possible to suppress several reports by selection with the keyboard.
Another way to remove the reports is by clicking on the icon
reports is displayed.
9-22
Ipanema Technologies
October 2014
Reporting (ip|reporter)
9. 2. 5. 5. Update in InfoVista
After creation or deletion of reports, click on the flashing Update button
in order to update
the InfoVista Database with ip|boss configuration. After you have confirmed you want to update
the configuration in ip|reporter, this step is identified by the ip|reporter Database LED (in ip|boss
status zone) in amber during the synchronization (this can last several minutes, or several hours if
you created a large number of reports at a time).
9. 2. 5. 6. Force synchronize
If InfoVista suffers a Database synchronization problem, it is possible to force the synchronization
using Reports menu Actions / Force synchronize.
This function should not be used under normal circumstances. Use it only in case
of synchronization problem. A synchronization problem can be checked in the
logs, and thanks to the Database LED above (grey: an error happened during last
synchronization; red: error in the reports description; amber is a normal color during
synchronization, but it should be a temporary state: if the LED remains amber for an
abnormaly long time, this can also be due to a synchronization problem).
October 2014
Ipanema Technologies
9-23
Ipanema System
9. 2. 5. 7. Default reports
The following reports are created (with the Automatic reporting function) by default (S stands for
Equipped site, T stands for tele-managed site):
Report
Domain
AG
X
X
X
PM - Detailed per AG
PM - Time Evolution
SA - Site Throughput
FI - Availability Overview
FI - Availability Evolution
Default reports
9-24
Ipanema Technologies
October 2014
Reporting (ip|reporter)
9. 3. 1. IVreport (VF0)
To open a report using IVreport, launch IVreport (default login / password are administrator /
(no password)), open the Reports tab, open the following folders: Report folders / <Domain>
/ <MetaView> / <Level of aggregation, level of confidentiality>, then double-click on the reports
name.
If the Public click box was clicked on the reports creation, it can be found in the hour / day
/ week / month folders;
otherwise, it can be found in the hour private / day private / week private / month private
folders.
October 2014
Ipanema Technologies
9-25
Ipanema System
by selecting Folders in the drop-down list in ip|reporters main window, you can access the
reports with the following file system tree (4 hierarchical levels):
<Domain> / <type of MetaView> / <MetaView> / <time level, public/private>
9-26
Ipanema Technologies
October 2014
Reporting (ip|reporter)
The second browsing method allows to navigate in the sites reports with two additional
hierarchical levels, defined by the ip|engines Navigation fields Folder name for level 1 and
Folder name for level 2: by selecting Navigation in the drop-down list in ip|reporters main
window, you can access the sites reports with the following file system tree (6 hierarchical
levels):
<Domain> / Navigation / <Folder name for level 1> / <Folder name for level 2> /
<MetaView> / <time level, public/private>
(the <type of MetaView> level disappears, as this method is valid to access the sites reports
only).
This method is very helpful on larges networks, with hundreds or thousands of sites.
In the example below, Folder name for level 1 was used to group sites per continents, and
Folder name for level 2 was used to group sites per countries. The ip|engines created without
filling those fields are grouped under the Unknown folder name:
October 2014
Ipanema Technologies
9-27
Ipanema System
all the reports available with VF0 are also available (they are called real time reports hereafter),
and there are new high level reports displayed in the main web page (they are called Service
Level Overview reports).
Time Navigator,
Navigation,
Service Level Overview,
and two frames in Reports.
The Time Navigator frame shows the date and time, and allows to browse the selected reports in
the past.
9-28
Ipanema Technologies
October 2014
Reporting (ip|reporter)
To access a report, first select the MetaView or group of MetaViews in the Navigation frame (click
on the
to collapse a branch):
October 2014
Ipanema Technologies
9-29
Ipanema System
The Service Level Overview report corresponding to the selected MetaView(s) is displayed in the
Service Level Overview frame:
For a Site or a list of Sites, this report shows, for each site:
the name of the MetaView (<Domain name> x Site:<name of the Site>),
the AQS per criticality level (Top, High, Medium and Low) with color bars; the colors
indicate the AQS (from red = 0 to green = 10), and one can read the exact value of the
AQS by moving the mouse over the bars,
the ingress (LAN => WAN) and egress (WAN => LAN) WAN accesses utilization (in
percentage of the WAN accesses throughputs) and the WAN accesses throughputs (as
defined in ip|boss); the utilization bars are blue between 0 and 70% of utilization, yellow
between 70 and 90% of utilization, and red above 90% of utilization; the percentage of
utilization can be read by moving the mouse over the bars,
For an Application Group or a list of Application Groups, this report shows, for each Application
Group:
the name of the MetaView (<Domain name> x Application Group:<name of the
Application Group>),
the AQS of the Application Groups with color bars; the colors indicate the AQS (from red
= 0 to green = 10), and one can read the exact value of the AQS by moving the mouse
over the bars,
the ingress (LAN => WAN) and egress (WAN => LAN) throughputs, both on the LAN
interfaces of the ip|engines and on their WAN interfaces,
the number of sessions.
9-30
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A second type of Service Level Overview reports is available by selecting the Evolution tab, at
the top of the window:
Evolution tab
It shows four frames:
the
the
the
the
October 2014
Ipanema Technologies
9-31
Ipanema System
To access the real time reports, once the MetaViews have been selected in the Navigation frame,
select the periodicity in the Reports frame:
9-32
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Report example
On the client you can use the time slider (IVreport) or specify the date and time (both clients) to see
the previous values of each indicator. This presents you with a historical view of each resource
for any moment during the lifetime of the report.
October 2014
Ipanema Technologies
9-33
Ipanema System
9. 3. 5. Definitions
Here is a definition of the symbols and specific metrics that are used in the reports (for the definitions
of the standard metrics, such as AQS, Delay, Jitter, packet Loss, RTT, SRT, TCP retransmission,
etc.), please refer to 7.5.2.2 Detailed flows list):
=>
<=
Session
A session is identified:
Qualified
(sessions,
throughput,
goodput)
Non qualified
or Unqualified
(throughput,
goodput, sessions)
MOS
(1 to 5)
9-34
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Overactivity
(%)
Evolution
(Volume, Quality,
Activity)
(++/+/0/-/- -)
++: the metric has increased a lot (by more than +20%),
+: the metric has slightly increased (between +5 and +20%),
o: the metric is stable (between 5% and +5%),
- : the metric has slightly decreased (between 5 and 20%),
- -: the metric has decreased a lot (by more than 20%).
Default reports
Color Management
October 2014
Ipanema Technologies
9-35
Ipanema System
Ipanema VistaViews
Some of these VistaViews are available only if you have purchased the corresponding
options and if they are enabled in the license file.
VistaViews are used to collect all information by querying ip|boss SNMP agent. They work in pairs:
9-36
<Report family> (e.g.: VoIP): contain the metrics and Indicators for this family;
<Report family - en> (e.g.: VoIP - en): Report Templates used to display these metrics.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
The statistics generated by the different functions are available throughout the whole Ipanema
System:
ip|boss aggregates the data gathered from ip|engines measurement, Application Control,
redundancy elimination and acceleration functions, and makes them available through the
SNMP interface.
ip|dashboard uses uses them to generate the appropriate helpdesk tables and graphs, that
provide real-time analysis for each Site and each network access.
ip|reporter uses them to generate the appropriate easy-to-use reports, that provide historical
analysis for each Site, each network access and each Application Group.
All reports can be created with ip|boss using the single or the wizard mode (unless otherwise
specified).
The reports on the Domain, on Equipped or tele-managed sites (i.e.: equipped or tele-managed
Sites), and on Application Groups can also be created with the Automatic reporting tool.
The available periodicity levels for the reports are the following (unless otherwise specified):
Hourly,
Daily,
Weekly,
Monthly.
The Ipanema System library contains the following report templates, with the following
abbreviations being used:
in What is measured: App: Application; Crit: Criticality; D/J/L: Delay/Jitter/Loss; Ses: number
of sessions; Thput: Throughput; Gput: Goodput; (un)qual: (un)qualified; AG: Application Group;
Vol: volume; evol: evolution
in Filters:
D: Domain;
S: Equipped site;
T: tele-managed site;
K: report Keys;
S: User Subnets;
G: Application Groups;
A: Applications;
C: Criticality
October 2014
Ipanema Technologies
9-37
Ipanema System
What is measured
service level
evolution
site summary
ag summary
ag summary per
direction
Filters
D S
app. synthesis
site synthesis
G A
G A
9-38
Report template
(is - sla -)
What is measured
Filters
domain - aqs
summary
domain - ag aqs
summary
domain - mos
summary
site summary
site exploitation
site customer
D S
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
clients overview
time evolution
Filters
D S
G A
D S
G A
AM (Application Monitoring)
Report template
(is - am -)
What is measured
ag summary - tcp
Filters
ag summary - per
direction - tcp
application
summary - tcp
October 2014
Ipanema Technologies
9-39
Ipanema System
PM (Performance Monitoring)
Report template
(is - pm -)
What is measured
site summary
ag summary
ag sum. per dir
Filters
D S
G A
app. summary
D S
G A
traffic topology
time evolution
detailed per ag
Throughput
What is measured
compression
evolution
compression
synthesis - ag
compression
synthesis application
Filters
9-40
Ipanema Technologies
October 2014
Reporting (ip|reporter)
SSL Optimization
Report template
(is - ssl
optimization -)
What is measured
time evolution
Filters
D S
X
G A
What is measured
acceleration
evolution
Filters
D S
G A
D S
G A
D S
G A
G A
What is measured
time evolution
Filters
X
What is measured
Filters
site summary
time evolution
Report template
(is - VoIP -)
What is measured
Filters
T
synthesis
MOS distribution
time evolution
VoIP
October 2014
D S
Ipanema Technologies
9-41
Ipanema System
SA (Site Analysis)
Report template
(is - sa -)
What is measured
Filters
site summary
ingress
site summary
egress
site throughput
D S
G A
G A
G A
FI (Fault Isolation)
Report template
(is - fi -)
What is measured
availability evolution
Filters
D S
availability overview
K
X
With ip|reporter, FI reports can only be created using the unitary mode.
SP (Smart planning)
Report template
(is - sp -)
What is measured
profile
synthesis
Filters
D S
X
X
9-42
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-43
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Throughput graph
This graph represents the evolution of the Throughput over the period of time:
9-44
Throughput: the surface indicates the non qualified throughput only, whereas the top of the curve
(that sits above the Qualified throughput) indicates the total throughput (qualified + unqualified)
Qualified throughput
Goodput: the surface indicates the non qualified goodput only, whereas the top of the curve
(that sits above the Qualified goodput) indicates the total goodput (qualified + unqualified)
Qualified goodput
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
October 2014
Executive officers
Ipanema Technologies
9-45
Ipanema System
The table
The table presents the following information (note: for color and symbol explanation see the Color
Management picture in Definitions):
Site
Average AQS
Weighted average (in volume) of the ingress AQS and egress AQS of
the site.
In the following columns,
AQS
D/J/L
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
RTT/SRT/Retrans
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
9-46
Average sessions
Average
throughput
(kbps)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The table
The table present the following information (note: for color and symbol explanation see the Color
Management picture in Definitions):
Application
Group
Criticality
AQS
October 2014
Ipanema Technologies
9-47
Ipanema System
D/J/L
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
RTT/SRT/Retrans
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
9-48
Average sessions
Average number of sessions per second for ingress and egress directions.
Average
throughput
(kbps)
Average number of kbits per second at IP level for ingress and egress
directions.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A Domain.
Per Application or a list of applications.
Per Application Group or a list of Application Groups.
Per Criticality or a list of criticality levels.
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
October 2014
Executive officers
Ipanema Technologies
9-49
Ipanema System
The table
The table presents the following information (note: for color and symbol explanation see the Color
Management picture in Definitions):
Application
Group
Criticality
Average AQS
Weighted average (in volume) of the ingress AQS and egress AQS.
In the following columns,
AQS
D/J/L
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
RTT/SRT/Retrans
(The metrics objective and maximum values are defined in the QoS
profiles associated to the Application Groups containing the measured
applications.)
9-50
Average sessions
Average number of sessions per second for ingress and egress directions.
Average
throughput
(kbps)
Average number of kbits per second at IP level for ingress and egress
directions.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-51
Ipanema System
What is measured
How it is measured
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
24 hours
1 week
5 weeks
12 months
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Hourly
Daily
Weekly
Monthly
Display rate
15 minutes
15 minutes
1 hour
4 hours
Time Span
2 hours
2 days
2 weeks
2 months
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Application Group Volume, application volume Top 10, site activity and global evolution
Tables
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
1 hours
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following informations:
Volume Evolution (GB) graph
This graph shows the volume evolution on the last 24 hours, 7 days, 5 weeks or 12 months
according to the periodicity level by criticality.
9-52
Ipanema Technologies
October 2014
Reporting (ip|reporter)
%
%
%
%
green volume
yellow volume
red volume
grey volume when quality cannot be computed
Average (Throughput)
Number of Kbits per second at layer 3 level during a display rate.
Max (Peak throughput)
The peak throughput curve displays the maximum encountered value during a display rate.
Average (Throughput)
Number of kbits per second at layer 3 level during a display rate.
Max (Peak throughput)
The peak throughput curve displays the maximum encountered value during a display rate.
For LAN => WAN throughput (kbps) and WAN => LAN throughput (kbps), the
average and maximum throughputs are calculated on the following periods:
Average (throughput)
Periodicity
Hour
15 minutes
15 minutes
Day
15 minutes
15 minutes
Week
1 hour
15 minutes
Month
4 hours
15 minutes
The tables
The tables present the following information:
Application Group table
Application
Group
Criticality
Volume (%)
Volume (MB)
Volume Evolution
(++/+/0/-/- -)
AQS (0 to 10)
Quality Evolution
(++/+/0/-/- -)
October 2014
Ipanema Technologies
9-53
Ipanema System
Application
Group
Volume (%)
9-54
Site activity
This indicator displays the percentage of time when traffic was measured.
Evolution
(++/+/0/-/- -)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
October 2014
Ipanema Technologies
9-55
Ipanema System
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
24 hours
1 week
5 weeks
12 months
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Throughput graph
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
15 minutes
15 minutes
1 hour
4 hours
Time Span
2 hours
2 days
2 weeks
2 months
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Site table
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
1 hours
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following informations:
Volume Evolution (GB) graph
This graph shows the volume evolution on the last 24 hours, 7 days, 5 weeks or 12 months
according to the periodicity level by criticality.
Quality Evolution (%) graph
This graph represents quality evolution on the last 24 hours, 7 days, 5 weeks or 12 months
according to the periodicity level in percentage of volume with different colors:
%
%
%
%
green volume
yellow volume
red volume
grey volume when quality cannot be computed
9-56
Average (Throughput)
Number of kbits per second at layer 3 level during a display period.
Max (Peak throughput)
The peak throughput curve displays the maximum encountered value during a display period.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
For the Throughput (kbps), average and maximum throughput are calculated on the
following periods:
Periodicity
Average (throughput)
Hour
15 minutes
15 minutes
Day
15 minutes
15 minutes
Week
1 hour
15 minutes
Month
4 hours
15 minutes
The table
The Site table presents the following information:
Site
Volume (%)
Volume (MB)
Volume Evolution
(++/+/0/-/- -)
AQS (0 to 10)
Quality Evolution
(++/+/0/-/- -)
October 2014
Ipanema Technologies
9-57
Ipanema System
What is measured
How it is measured
9-58
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
Used to display in a graph an overall view of the service level agreement supplied by the network.
Presents the following information:
Application Group graph
This graph represents the AQS during no over activity, per critical Application Group (Top and
High).
Site graph
This graph represents the AQS during no over activity of the 10 worst Sites, for the critical
Application Groups (Top and High).
Over activity per site (%) graph
This graph represents the percentage of time when the Right Size (computed by Smart planning)
is higher than the WAN access for Top and High traffic.
October 2014
Ipanema Technologies
9-59
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The tables
The tables present the following information:
9-60
Application
Group
Criticality
Volume (%)
AQS
MOS
Overactivity (%)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Site
Volume (%)
AQS
MOS
Overactivity (%)
October 2014
Ipanema Technologies
9-61
Ipanema System
What is measured
How it is measured
9-62
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
The tables
The tables present the following information:
Application
Group
Criticality
Overactivity (%)
AQS = 10 (%)
Site
Overactivity (%)
AQS = 10 (%)
October 2014
Ipanema Technologies
9-63
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The tables
The tables present the following information:
9-64
Application
Group
Criticality
Overactivity (%)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Site
Overactivity (%)
October 2014
Ipanema Technologies
9-65
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The tables
The tables present the following information:
9-66
Application
Group
Criticality
Overactivity (%)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
AQS = 10 (%)
Application
Group
Criticality
Overactivity (%)
October 2014
Ipanema Technologies
9-67
Ipanema System
9-68
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
AQS graph
This graph represents the Application Quality Score during no over activity, per critical Application
Group (Top and High).
MOS graph
This graph represents the Mean Opinion Score during no over-activity, per Application Group.
Volume (MBytes) graph
This graph represents the volume of data (MBytes) exchanged by each critical Application Group
(Top and High) and for all non critical ones (Medium and Low).
Session density graph
This graph represents the number of sessions for each critical Application Group (Top and High)
and for all non critical ones (Medium and Low).
Overactivity (%) graph
This graph represents the percentage of time when the Right Size (computed by Smart planning)
is higher than the WAN access for Top and High traffic.
October 2014
Ipanema Technologies
9-69
Ipanema System
9-70
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
AQS graph
This graph represents the Application Quality Score during no over activity, per critical Application
Group (Top and High).
MOS graph
This graph represents the Mean Opinion Score during no over-activity, per Application Group.
Volume (MBytes) graph
This graph represents the volume of data (MBytes) exchanged by each critical Application Group
(Top and High) and for all non critical ones (Low and Medium).
Session density graph
This graph represents the number of sessions for each critical Application Group (Top and High)
and for all non critical ones (Low and Medium).
Overactivity (%) graph
This graph represents the percentage of time when the Right Size (computed by Smart planning)
is higher than the WAN access for Top and High traffic.
The table
The table presents the following information:
Application
Group
Criticality
AQS
MOS
Overactivity (%)
Volume (%)
October 2014
Ipanema Technologies
9-71
Ipanema System
9-72
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A Domain.
A Site or a list of sites.
A Key or a list of keys.
A Subnet or a list of subnets.
An Application or a list of applications.
An Application Group or a list of Application Groups.
A Criticality or a list of criticality levels.
This template really makes sense for Applications and
Application Groups.
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Request time,
Response time (should be renamed Server delay in the next software release),
Transaction time (should be renamed Response time in the next software release).
These three metrics are illustrated below (with their new names):
October 2014
Ipanema Technologies
9-73
Ipanema System
The Transaction efficiency (in kbps) is defined as the Transaction size (in KB) divided by
Transaction time (in ms) (multiplied by 8,192 to get the result in kbps).
Note that for the same Transaction, the 3 steps Request / Server delay / Response can
vary a lot, according to whether a proxy is used or not (and to its position, when used):
This does not matter, from the Users perspective (the response time that they get is
the same in either case and so is the Transaction efficiency).
Another consequence of proxies can be a difference in the number of Users: as 1 User
= 1 IP address (= 1 device in fact), if theres a proxy on the LAN side of the ip|engine,
the latter will only see 1 User (In a VPN, the ip|engine generally sits behind the
proxy).
9-74
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Max Users
New sessions/s
Transactions/s
Response time
(ms)
Server delay (this metric should be renamed Server delay in the next
software release).
Transaction time
(ms)
Transaction size
(KB)
Transaction
efficiency (kbps)
Transaction size (in KB) divided by Transaction time (in ms) multiplied
by 8,192 (to get the result in kbps).
Users
Max Users
New sessions/s
Transactions/s
Response time
(ms)
Server delay (this metric should be renamed Server delay in the next
software release).
Transaction time
(ms)
Transaction size
(KB)
Transaction
efficiency (kbps)
Transaction size (in KB) divided by Transaction time (in ms) multiplied
by 8,192 (to get the result in kbps).
October 2014
Ipanema Technologies
9-75
Ipanema System
9-76
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A Domain.
A Site or a list of sites.
A Key or a list of keys.
A Subnet or a list of subnets.
An Application or a list of applications.
An Application Group or a list of Application Groups.
A Criticality or a list of criticality levels.
This template really makes sense for Applications and
Application Groups.
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Users graph
This graph represents the number of Users.
Transaction Time (ms) graph
This graph represents the average Transaction Time (in ms) with its breakdown:
October 2014
Ipanema Technologies
9-77
Ipanema System
What is measured
How it is measured
9-78
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
The table
The table is used to display the following indicators concerning the Site traffic:
Site
Packet retrans.
SRT
RTT
Non-TCP sess.
TCP sess.
Goodput
Non-TCP Thput
TCP Thput
October 2014
Ipanema Technologies
9-79
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
9-80
Packet retrans.
SRT
RTT
Non-TCP sess.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
TCP sess.
Goodput
Non-TCP Thput
TCP Thput
October 2014
Ipanema Technologies
9-81
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
9-82
Packet retrans.
SRT
RTT
Non-TCP sess.
TCP sess.
Goodput
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Non-TCP Thput
TCP Thput
October 2014
Ipanema Technologies
9-83
Ipanema System
What is measured
How it is measured
9-84
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
Application table
Used to display in a table the following indicators concerning the Application traffic.
Application
Packet retrans.
SRT
RTT
Non-TCP sess.
TCP sess.
Goodput
Non-TCP Thput
TCP Thput
October 2014
Ipanema Technologies
9-85
Ipanema System
What is measured
How it is measured
9-86
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
Application table
Used to display in a table the following indicators concerning the Application traffic.
Application
Packet retrans.
SRT
RTT
Non-TCP sess.
TCP sess.
Goodput
Non-TCP Thput
TCP Thput
October 2014
Ipanema Technologies
9-87
Ipanema System
9-88
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
SRT (ms) graph
This graph represents the average Server response time (in ms).
RTT (ms) graph
This graph represents the average Round trip time (in ms).
Packet retransmission graph
This graph represents the percentage of retransmitted TCP segments.
Throughput graph
This graph represents:
TCP: the number of TCP segments per second (in kbps, measured at IP level) (dark blue).
non TCP: the number of non TCP segments per second (in kbps) measured at IP level) (light
blue).
Goodput: the number of kbits per second at layer 4 level (green).
Peak: the maximum encountered value during a display period (red).
Sessions graph
This graph represents:
October 2014
Ipanema Technologies
9-89
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Site table
Used to display in a table the following indicators concerning the Site traffic.
9-90
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Site
LAN average
delay (ms)
WAN average
delay (ms)
LAN total
throughput
(kbps)
Number of kbits per second at the IP level measured on the LAN interface
of the ip|engine.
WAN total
throughput
(kbps)
Total sessions
October 2014
Ipanema Technologies
9-91
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
9-92
Application
Group
Total sessions
Total throughput
(kbps)
Packet size
(bytes)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Delay (ms)
Average delay of packets (in ms) for ingress and egress directions.
Jitter (ms)
Packet retrans.
(%)
SRT (ms)
RTT (ms)
October 2014
Ipanema Technologies
9-93
Ipanema System
A Domain.
Per Application or a list of applications.
Per Application Group or a list of Application Groups.
Per Criticality or a list of criticality levels.
What is measured
How it is measured
9-94
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
Delay (ms)
Jitter (ms)
Packet retrans.
(%)
SRT (ms)
RTT (ms)
Packet size
(bytes)
Total sess.
Total Thput
(kbps)
October 2014
Ipanema Technologies
9-95
Ipanema System
9. 9. 4. is - pm - application summary
Performance Monitoring Table
What is measured
How it is measured
9-96
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
Total sessions
Total throughput
(kbps)
Packet size
(bytes)
Delay (ms)
Average delay of packets (in ms) for ingress and egress directions.
Jitter (ms)
Packet retrans.
(%)
SRT (ms)
RTT (ms)
October 2014
Ipanema Technologies
9-97
Ipanema System
A Domain.
Per Application or a list of applications.
Per Application Group or a list of Application Groups.
Per Criticality or a list of criticality levels.
What is measured
How it is measured
9-98
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
Criticality
Delay (ms)
Jitter (ms)
Packet retrans.
(%)
SRT (ms)
RTT (ms)
Packet size
(bytes)
Total sessions
Total throughput
(kbps)
October 2014
Ipanema Technologies
9-99
Ipanema System
9. 9. 6. is - pm - traffic topology
Performance Monitoring Table
9-100
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The Tables
The tables present the following information:
Total traffic table
Used to display in a table the following indicators concerning the ip|engine traffic or the Domain
traffic:
Packet size
Sessions
Throughput
Volume
Jitter
Packet loss
Packets size
Sessions
Throughput
Volume
The graphs
The graphs present the following information:
Traffic profile (kbps / % time) graph
October 2014
Ipanema Technologies
9-101
Ipanema System
30
50
67
80
90
95
98
99
100
<20
<50
<100
Percentage of packets that had a latency (delay) between 50 and 100 ms.
<200
Percentage of packets that had a latency (delay) between 100 and 200 ms.
<500
Percentage of packets that had a latency (delay) between 200 and 500 ms.
<1000
Percentage of packets that had a latency (delay) between 500 and 1000 ms.
<2000
Percentage of packets that had a latency (delay) between 1000 and 2000 ms.
Sites table
9-102
Site
Ipanema Technologies
October 2014
Reporting (ip|reporter)
9. 9. 7. is - pm - time evolution
Performance Monitoring Table
October 2014
Ipanema Technologies
9-103
Ipanema System
What is measured
A Domain.
A Site or a list of sites.
A Key or a list of keys.
A Subnet or a list of subnets.
An Application or a list of applications.
An Application Group or a list of Application Groups.
A Criticality or a list of criticality levels.
Delay, jitter, packet loss, throughput, number of sessions.
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Delay (ms), Jitter (ms) graph
This graph represents:
LAN average delay: the average LAN-to-LAN delay of total packets (in ms) (Blue).
WAN average delay: the average WAN-to-WAN delay of total packets (in ms) (Orange).
LAN jitter: the average LAN-to-LAN delay variation (in ms) (Light blue).
WAN Jitter: the average WAN-to-WAN delay variation (in ms) (Purple).
LAN packet loss : the percentage of lost IP packets between the LAN interfaces of the
ip|engines (Red).
WAN packet loss : the percentage of lost IP packets between the WAN interfaces of the
ip|engines (Pink).
LAN peak throughput: the maximum encountered LAN-to-LAN throughput during a display
period (Blue).
WAN peak throughput: the maximum encountered WAN-to-WAN throughput during a display
period (Orange).
Throughput: the number of kbits per second at layer 3 level (light blue).
Goodput: the number of kbits per second above layer 4 level (light green).
Qualified throughput: the number of qualified kbits per second at layer 3 level (dark Blue).
Qualified goodput: the number of qualified kbits per second above layer 4 level (dark green).
Sessions graph: this graph represents the number of sessions per second.
9-104
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-105
Ipanema System
What is measured
A Domain.
A Site or a list of sites.
A Key or a list of keys.
A Subnet or a list of subnets.
An Application or a list of applications.
An Application Group or a list of Application Groups.
A Criticality or a list of criticality levels.
Throughput.
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graph
The Throughput graph represents the layer 3 throughput distribution for the flows per application
or Application Group in kbps.
9-106
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A Site.
What is measured
How it is measured
This report does not appear in the hour, day, week and month folders, but in the default
folder. Hour, Day, Week, Month must NOT be selected when creating it with ip|reporter.
Type of report
Default
Display Rate
1 minute
Time Span
1 minute
Life Time
1 week
Audience
Network analysts
Reports creation
The user specifies the filters to create a MetaView then instantiates a report template on the
MetaView. There are the following filters:
A Site.
This report consumes a lot of CPU on the server, and should not be instantiated on
more than 10 sites. As a consequence, it should not be Instantiated by default, but only
when really needed.
Create it with ip|reporter only (do not use the Automatic reporting tool).
The table
Talkers: List of hosts on the site sending data to the other sites (upstream from the
flow).
Listeners: List of hosts on the site receiving data from the other sites (downstream from
the flow).
October 2014
Ipanema Technologies
9-107
Ipanema System
a session is identified:
For TCP or UDP by the following parameters: source address, destination address,
protocol TCP or UDP, source port and destination port.
For other protocols over IP (for example: ICMP) by the following parameters: source
address, destination address, protocol.
The number of sessions represents the average session activity for the duration of
Correlation Record (by default: T = 1 minute). For example, 2 sessions running during
T plus 3 sessions running during half this period of time will give 3.5 sessions (2 x 1 +
3 x 0.5).
These values are measured over the last display rate. Click successively on any column header to
sort the table by increasing or decreasing values. On the report you can use the time slider to see
the previous values of each indicator. Using the slider presents you with a historical view of each
resource for any moment during the lifetime of the report.
Top host application on volume table
Used to display in a table the following indicators concerning the Top Host application sorted by
maximum volume used.
The Top Host application is limited to 10 hosts for each way.
9-108
Host Talkers
Application
Talkers
Volume (KB)
Talkers
Sessions Talkers
Host Listeners
Application
Listeners
Volume (KB)
Listeners
Sessions
Listeners
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Compression Evolution
October 2014
Ipanema Technologies
9-109
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Ingress Throughput (compress) graph:
Total LAN (blue curve): total throughput (in kbps) before compression, on the LAN interface of
the ip|engine.
Total WAN (red curve): total throughput (in kbps) after compression, on the WAN interface of
the ip|engine for all flows (compressed and non-compressed flows).
Compressed WAN (orange surface): throughput of the compressed flows (flows classified in
Application Groups enabled for compression and going to decompressing ip|engines) on the
WAN interface of the ip|engine.
Compressible LAN (blue surface): throughput of the compressible flows on the LAN interface
of the ip|engine, which are not sent to the WAN that is, bandwidth saved on the compressed
flows.
9-110
Total LAN (blue curve): total throughput (in kbps) after decompression, on the LAN interface of
the ip|engine.
Total WAN (red curve): total throughput (in kbps) before decompression, on the WAN interface
of the ip|engine for all flows (compressed and non-compressed flows).
Compressed WAN (orange surface): throughput of the decompressed flows (flows classified
in Application Groups enabled for compression and coming from compressing ip|engines).
Compressible LAN (blue surface): throughput of the compressible flows on the LAN interface
of the ip|engine, which were not sent across the WAN that is, bandwidth saved on the
decompressed flows.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-111
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Ingress Volume (compress) graph:
Compressed WAN (orange surface; in MB): for each Application Group, the total compressed
volume (flows classified in Application Groups enabled for compression and going to
decompressing ip|engines) in MB for the ingress way.
Compressible LAN (blue surface; in MB): for each Application Group, throughput of the
compressible flows on the LAN interface of the ip|engine, which are not sent to the WAN
that is, bandwidth saved on the compressed flows in MB for ingress way.
9-112
Compressed WAN (orange surface; in MB): for each Application Group, the total
decompressed volume (flows classified in Application Groups enabled for compression and
coming from compressing ip|engines) in MB for the egress way.
Compressible LAN (blue surface; in MB): for each Application Group, throughput of the
compressible flows on the LAN interface of the ip|engine, which were not sent across the
WAN that is, bandwidth saved on the decompressed flows in MB for egress way.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
The tables
The tables present the following information:
Ingress Volume (compress) and Egress Volume (decompress) by Application Group table
Used to display for each Application Group, for all traffic in ingress and egress directions, the
volume (in MB) before and after compression, and the compression ratio.
In each column of the table,
Comp. output
(MB)
Comp. factor
Totals table
Used to display the total of volume for all traffic in the ingress and egress directions, the volume
(in MB) before and after compression, and the compression ratio. For the parameters see the
explanation in the table above.
October 2014
Ipanema Technologies
9-113
Ipanema System
9-114
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Ingress Volume (compress) graph:
Compressed WAN (orange surface; in MB): for each Application, the total compressed volume
(flows classified in Application Groups enabled for compression and going to decompressing
ip|engines) in MB for the ingress way.
Compressible LAN (blue surface; in MB): for each Application, throughput of the compressible
flows on the LAN interface of the ip|engine, which are not sent to the WAN that is, bandwidth
saved on the compressed flows in MB for ingress way.
Compressed WAN (orange surface; in MB): for each Application, the total decompressed
volume (flows classified in Application Groups enabled for compression and coming from
compressing ip|engines) in MB for the egress way.
Compressible LAN (blue surface; in MB): for each Application, throughput of the compressible
flows on the LAN interface of the ip|engine, which were not sent across the WAN that is,
bandwidth saved on the decompressed flows in MB for egress way.
October 2014
Ipanema Technologies
9-115
Ipanema System
The tables
The tables present the following information:
Ingress Volume (compress) and Egress Volume (decompress) by Application table
Used to display for each Application, for all traffic in ingress and egress directions, the volume (in
MB) before and after compression, and the compression ratio.
In each column of the table,
Comp. output
(MB)
Comp. factor
Totals table
Used to display the total of volume for all traffic in the ingress and egress directions, the volume
(in MB) before and after compression, and the compression ratio. For the parameters see the
explanation in the table above.
9-116
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Time Evolution
What can it do?
Monitored resource
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
October 2014
Ipanema Technologies
9-117
Ipanema System
Life Time
24 hours
7 days
Audience
Network analysts
5 weeks
12 months
Executive officers
The graphs
The graphs present the following information:
Compress graph:
Compressible SSL LAN (kbps) (blue area): SSL throughput before compression, measured
on the LAN interface of the ip|engine.
Compressed SSL WAN (kbps) (orange area): SSL throughput after compression, measured
on the WAN interface of the ip|engine.
SSL Optimization Eligible (sessions) (green curve): number of eligible sessions for SSL
optimization.
SSL Optimized (sessions) (brown curve): number of SSL optimized sessions.
Decompress graph:
9-118
Compressible SSL LAN (kbps) (blue area): SSL throughput before decompression, measured
on the LAN interface of the ip|engine.
Compressed SSL WAN (kbps) (orange area): SSL throughput after decompression, measured
on the WAN interface of the ip|engine.
SSL Optimization Eligible (sessions) (green curve): number of eligible sessions for SSL
optimization.
SSL Optimized (sessions) (brown curve): number of SSL optimized sessions.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Acceleration Evolution
What can it do?
Monitored resource
What is measured
How it is measured
October 2014
Ipanema Technologies
9-119
Ipanema System
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Acceleration Factors graphs:
Accelerated session:
9-120
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-121
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Throughputs graph:
locally served from the cache (blue surface, in kbps): volume of CIFS data locally served from
the ip|engines cache per time unit that is, bandwidth saved thanks to CIFS acceleration.
from server across the WAN (orange surface): CIFS data actually sent across the WAN.
Requests graphs:
Acceleration factor graph: number of SMB messages sent by clients divided by the number of
SMB messages sent to servers.
Active Sessions graph: number of CIFS active and accelerated sessions.
9-122
Ipanema Technologies
October 2014
Reporting (ip|reporter)
A Domain.
A Site or a list of sites.
This template cannot be created with the Automatic
reporting function for tele-managed Sites.
What is measured
How it is measured
LAN => WAN and WAN => LAN Application Control Activity,
Duration and Evolution, Compression ratio and Saved bandwidth;
CIFS average and maximum active sessions
From data collected every Long reporting period.
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
October 2014
Ipanema Technologies
Executive officers
9-123
Ipanema System
Site table
Used to display in a table the following indicators concerning the Sites traffic.
Site
TRAFFIC CONTROL
LAN => WAN
Activity (%)
Evolution of the Application Control Activity in the LAN => WAN direction.
Evolution of the Application Control Activity in the WAN => LAN direction.
If there are several NAPs on a Site, the metrics are aggregated for all of them. So, for
instance, on a Site with two NAPs, one permanently congested in the LAN => WAN
direction (3600 seconds per hour) and the second one never congested (0 second),
the LAN => WAN Duration will be 3600 seconds (in an hourly report), but the LAN
=> WAN Activity will be 50% only.
COMPRESSION
LAN => WAN
Comp. ratio (%)
Compression ratio for the emitted traffic (in the LAN => WAN direction).
Decompression ratio for the received traffic (in the WAN => LAN direction).
ACCELERATION
9-124
CIFS Active
Sessions
(Average)
CIFS Active
Sessions (Max)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-125
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
Application Control Service graphs:
LAN => WAN Consolidated Congestion Control Activity (%): percentage of time when the
Application Control feature had to kick in to avoid congestion and protect the critical traffic
emitted on all NAPs of the Site, in the LAN => WAN direction.
WAN => LAN Consolidated Congestion Control Activity (%): percentage of time when the
Application Control feature had to kick in to avoid congestion and protect the critical traffic
emitted on all NAPs of the Site, in the WAN => LAN direction.
LAN => WAN Consolidated Congestion Control Duration (sec): number of seconds when
the Application Control feature had to kick in to avoid congestion and protect the critical traffic
emitted on all NAPs of the Site, in the LAN => WAN direction.
WAN => LAN Consolidated Congestion Control Duration (sec): number of seconds when
the Application Control feature had to kick in to avoid congestion and protect the critical traffic
emitted on all NAPs of the Site, in the WAN => LAN direction.
If there are several NAPs on a Site, the metrics are aggregated for all of them. So, for
instance, on a Site with two NAPs, one permanently congested in the LAN => WAN
direction (60 seconds per minute) and the second one never congested (0 second), the
LAN => WAN Duration will be 60 seconds during a given minute (in an hourly report),
but the LAN => WAN Activity will be 50% only.
ip|fast end-to-end activity is not considered.
Consolidated Compression Ratio (%): compression ratio for the emitted traffic.
Consolidated Decompression Ratio (%): decompression ratio for the received traffic.
LAN => WAN Consolidated Saved Bandwidth (kbps): bandwidth saved thanks to
compression, ingress (= ingress LAN-to-LAN throughput ingress WAN-to-WAN throughput).
WAN => LAN Consolidated Saved Bandwidth (kbps): bandwidth saved thanks to
compression, egress (= egress LAN-to-LAN throughput egress WAN-to-WAN throughput).
9-126
Consolidated CIFS Active Sessions: number of CIFS active and accelerated sessions.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-127
Ipanema System
MOS definition
The data generated by the VoIP module is available throughout the whole Ipanema System.
ip|boss makes them available through the SNMP interface, ip|reporter uses them to generate
the appropriate easy to use reports.
9-128
Ipanema Technologies
October 2014
Reporting (ip|reporter)
VoIP Synthesis
What can it do?
Monitored resource
What is measured
A Domain .
A Site or a list of sites.
A Key or a list of keys.
A Subnet or a list of subnets,
MOS distribution ingress and egress direction per Codec
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
MOS distribution graph
MOS range reached in percentage of Time.
October 2014
Ipanema Technologies
9-129
Ipanema System
[1,3]
[3,3.5]
MOS between 3 and 3.5 in percentage of time during the display period.
[3.5,4]
MOS between 3.5 and 4 in percentage of time during the display period.
[4,4.5]
MOS between 4 and 4.5 in percentage of time during the display period.
[4.5,5]
MOS between 4.5 and 5 in percentage of time during the display period.
This representation is very useful to get a view of Voice over IP quality.
MOS example
9-130
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-131
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
The graphs present the following information:
MOS graph:
Delay (ms): the average delay (in ms) (Blue) per Codec.
Jitter: the average delay variation (in ms) (Yellow) per Codec.
9-132
Sessions: the number of sessions per second in direction of tele|engines (light blue).
Qualified sessions: the number of qualified sessions per second (between ip|engines) (dark
Blue).
Peak sessions: the peak sessions curve displays maximum encountered value during a display
rate.
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
A Domain.
A list of Sites.
A Key or a list of Keys.
Throughput to (physical) ip|engines, no correlation, to (virtual)
tele|engines, to Out of Domain, transit, other, locally rerouted, Non
IPv4 WAN, ignored LAN
From data collected every Long reporting period.
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The table
Used to display for ip|engines (in the Domain, list of sites, list of keys) the information concerning
the following indicators:
Site
To physical ipe
(kbps)
No correlation
(kbps)
To Virtual ipe
(kbps)
To out of Domain
(kbps)
October 2014
Ipanema Technologies
9-133
Ipanema System
9-134
Transit (kbps)
Other (kbps)
Ingress throughput in kbps for Other traffic; in fact Other traffic contains
Multicast traffic, Broadcast traffic, local traffic.
Locally rerouted
(kbps)
Ingress throughput in kbps for non IPv4 traffic (Apple Talk, IPX, SNA,
IPv6).
Ignored LAN
(kbps)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
A Domain.
A list of Sites.
A Key or a list of keys.
Throughput from (physical) ip|engines, no correlation, from (virtual)
tele|engines, from Out of Domain, transit, other, locally rerouted,
Non IPv4 WAN, ignored LAN
From data collected every Long reporting period.
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The table
Used to display for ip|engines (in the Domain, list of sites, list of keys) the information concerning
the following indicators:
Site
To physical ipe
(kbps)
No correlation
(kbps)
To Virtual ipe
(kbps)
To out of Domain
(kbps)
Transit (kbps)
Other (kbps)
Egress throughput in kbps for Other traffic; in fact Other traffic contains
Multicast traffic, Broadcast traffic, local traffic.
Locally rerouted
(kbps)
October 2014
Ipanema Technologies
9-135
Ipanema System
9-136
Egress throughput in kbps for non IPv4 traffic (Apple Talk, IPX, SNA,
IPv6).
Ignored LAN
(kbps)
Ipanema Technologies
October 2014
Reporting (ip|reporter)
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
October 2014
Ipanema Technologies
Executive officers
9-137
Ipanema System
The graphs
Used to display for each ip|engine the information concerning the following indicators:
Ethernet-Throughput (kbps) graphs:
9-138
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-139
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
Short reporting
5 minutes
1 hour
4 hours
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The graphs
Used to display for ip|engines the information concerning the following indicators:
Status Down graph
This graph represents the Unavailability status of the ip|engine seen by the management system:
Status Up graph
This graph represents the Availability status of the ip|engine seen by the management system:
9-140
Ipanema Technologies
October 2014
Reporting (ip|reporter)
October 2014
Ipanema Technologies
9-141
Ipanema System
What is measured
How it is measured
Type of report
Hourly
Daily
Weekly
Monthly
Display Rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Executive officers
The table
Used to display for each ip|engine the information concerning the following indicators:
Site
Up Status (%)
9-142
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Synchronization
loss (%)
WAN Overload
(%)
October 2014
Ipanema Technologies
9-143
Ipanema System
What is measured
How it is measured
9-144
Type of report
Hourly
Daily
Weekly
Monthly
Display rate
1 hour
1 day
1 week
1 month
Time Span
1 hour
1 day
1 week
1 month
Life Time
24 hours
7 days
5 weeks
12 months
Audience
Network analysts
Ipanema Technologies
Executive officers
October 2014
Reporting (ip|reporter)
The graphs
Used to display, for each site (ip|engine) in the Domain, for all traffic in the ingress and egress
direction, the throughput (in kbps) and right size (in kbps), by criticality level (top, high, medium
and low) per percentage of time.
The bargraph top shows the bandwidth for top critical flows.
The bargraph high shows the bandwidth for top and high critical flows.
The bargraph medium shows the bandwidth for top, high and medium critical flows.
The bargraph low shows the bandwidth for top, high, medium and low critical flows.
On a flow per flow basis, smart|plan takes into account the traffic demand (the per-session
objective bandwidth, as set in corresponding Application Group), the actual network usage
(from measurement function) and the existence, or not, of local or distant congestions (from the
Application Control function). Flows elasticity is also estimated and taken into account.
Then smart|plan aggregates this data according to access and criticality, and produces the
following information:
the actual traffic usage (what has been exchanged on the network) per percentage of time;
the right size value (estimated access size to match objectives, including correction for
end-to-end congestions and flows elasticity) per percentage of time.
The actual usage Throughput (in kbps) is carried out by the measurement module of the
Ipanema System. The original data produced is processed to be aggregated by criticality level
and by access.
The access right size Right Size (in kbps) presents for the site per criticality refined estimate
of the necessary access bandwidth to match the service level according to the percentage of
time, taking into account the flow matrix, end-to-end congestions as well as characteristics of
the flows. Depending on actual traffic nature and congestion status, it can be equal to or smaller
than the traffic demand.
October 2014
Ipanema Technologies
9-145
Ipanema System
9. 18. 2. is - sp - synthesis
Smart planning Table
9-146
Ipanema Technologies
October 2014
Reporting (ip|reporter)
What is measured
How it is measured
Type of report
Daily
Display rate
1 day
Time Span
1 day
Life Time
1 day
Audience
Executive officers
The tables
A table is provided per each level of criticality you want to take into account (top; top and high; top,
high and medium; top, high, medium and low that is, all the traffic).
Used to display for each site (ip|engine) in the Domain, per selected level of criticality for all traffic
in the ingress and egress directions, the throughput (in kbps), and the trends for the next 3 months
and for the next year per percentile of time. For sites with multiple WAN accesses, it displays the
information both at the WAN access level (for each individual WAN link) and at the site level (all
WAN links, consolidated).
For each criticality level, two tables are provided:
The bandwidth and its trends for the next 3 months and next year,
The right size and its trends for the next 3 months and next year,
On a flow per flow basis, smart|plan takes into account the traffic demand (the per-session
bandwidth objective, as set in corresponding Application Group), the actual network usage
(measured by ip|true) and the presence of local or remote congestions (controlled by ip|fast).
Flows elasticity is also estimated and taken into account.
Then smart|plan aggregates these data according to access and criticality, and produces the
following information:
actual usage Throughput (in kbps): what has been exchanged on the network as a
percentage of time, aggregated by criticality level, by WAN access and by site;
estimated Throughput (in kbps): estimated WAN access size necessary to match objectives,
including correction for congestions and flows elasticity, for the next 3 months (according to the
network activity of the past 3 months) and for the next year (according to the network activity of
the past year), as a percentage of time.
October 2014
Ipanema Technologies
9-147
Ipanema System
The goal of ip|export is to automate scheduled data exports from InfoVista Server Database.
The process exports values from specified sets of existing indicators and instances and produces
outputs files on a given regular period.
All expected parameters by the process are given in input as an XML configuration file, which
contains a list of tasks. Each task describes an export action with filter expressions on Domain,
MediaView, Indicator names and many other parameters such as the type of output files, field
separator, schedule period, etc. (Please refer to ip|export configuration below.)
Reports displaying the requested indicators must by running at all time to allow ip|export to export
them.
create the given output directory (ip|export process will not create it automatically),
make sure that the disk space is always enough to store the new output files,
clean or move old output files (ip|export process will not clean them automatically).
<taskname>_<epochtime>.<ext>" if "splitbyparams=false", or
<taskname>_<params>_<epochtime>.<ext>" if "splitbyparams=true".
where:
9-148
taskname:
params:
epochtime:
GMT(UTC) date and time of the beginning of the analyzed period in number
of seconds since January 1st 1970.
ext:
file extension depending on the output file format as described in the XML
configuration file (txt, csv, xls or xml).
Ipanema Technologies
October 2014
Reporting (ip|reporter)
Type:
Description:
-verbose:
-version:
-help|?:
October 2014
Ipanema Technologies
9-149
Ipanema System
date and time with the specified given format; if no format is provided then it
uses the raw Epoch time (number of seconds since January 1st 1970)
domain:
name of the domain (if "splitbydomain=true" then this column does not appear)
(optional)
metaview:
indicator
name of the Indicator; if a rename entry is found for the indicator then the
new indicator name is used
params:
value:
Examples
9-150
Ipanema Technologies
October 2014
Reporting (ip|reporter)
<?xml version="1.0"?>
<data>
<slot>
<datetime>2010/05/04 15:00:00</datetime>
<domain>default</domain>
<metaview>Site: Paris</metaview>
<indicator> ingress throughput L3 - L4 <params></params>
value>1340</value>
</slot>
<slot>
<datetime>2010/05/04 15:00:00</datetime>
<domain>default</domain>
<metaview>Site: Paris</metaview>
<indicator> ingress throughput L3 - L4 <params></params>
value>0</value>
</slot>
<slot>
<datetime>2010/05/04 14:59:00</datetime>
<domain>default</domain>
<metaview>Site: Paris</metaview>
<indicator> ingress throughput L3 - L4 <params></params>
value>26660</value>
</slot>
<slot>
<datetime>2010/05/04 14:59:00</datetime>
<domain>default</domain>
<metaview>Site: Paris</metaview>
<indicator> ingress throughput L3 - L4 <params></params>
value>0</value>
</slot>
...
</data>
qualified </indicator>
unqualified</indicator>
unqualified</indicator>
unqualified</indicator>
E F
2010/05/04 default
15:00:00
Site: Paris
1340
2010/05/04 default
15:00:00
Site: Paris
2010/05/04 default
15:00:00
Site: Paris
26660
2010/05/04 default
15:00:00
Site: Paris
2010/05/04 default
14:59:00
Site: Paris
1340
2010/05/04 default
14:59:00
Site: Paris
2010/05/04 default
14:59:00
Site: Paris
26660
...
...
...
... ...
October 2014
...
Ipanema Technologies
9-151
October 2014
Ipanema Technologies
10-1
Ipanema System
the Ipanema System. For licenses that require it, machine readable copies of modifications made
by Ipanema are available upon request. List of open source software used in the Software and
related copyright or license is available on the License Information page at the following address:
https://support.ipanematech.com/.
10. 1. 4. Warranty
1. Ipanema warrants that the Software performs substantially according to its documentation for a
period of thirty (30) days date of shipment of the Software license key.
If the Software does not function as warranted during the Warranty Period, the End-User remedy
shall be, at Ipanemas option, to correct the Ipanema Software or to replace it free of charge with
a corrected version.
The warranty shall not apply to any non-conformity that is caused by: (a) the End Users misuse
or improper use of the Software, including, without limitation, the use or operation of the Software
with an application or in an environment other than that specified by Ipanema, or introduction of
data into any data structures or tables used by the Software by any means other than use of the
Software; (b) any third party software or hardware; (c) any modifications or additions to the Software
performed by parties other than Ipanema; or (d) the End Users failure to implement all problem
corrections and new releases.
2. EXCEPT FOR THE WARRANTIES SET FORTH IN SECTION 1. ABOVE, NEITHER IPANEMA
NEITHER ANY PERSON ON IPANEMAS BEHALF HAS MADE OR MAKES ANY OTHER
WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
SATISFACTORY QUALITY, NON-INTERRUPTION OF USE OR FREE OF BUGS, ERRORS OR
OTHER DEFECTS, TITLE, AND OF NON-INFRINGEMENT.
10. 1. 5. Liability
1. The Licensee is responsible for selecting the Software, for the use that is made and the results
that will be obtained. It assumes all liabilities relating to the qualification and competence of its staff.
The Licensee and End User must take all precautions to prevent the loss or destruction of its data,
including, but not limited, backups and regular audits. Licensee shall comply with all export laws
and regulations in particular but not limited to French and United States export restrictions.
2. IN NO EVENT SHALL IPANEMA, ITS AFFILIATES OR PARTNERS (OR THEIR
REPRESENTATIVES) BE LIABLE FOR CONSEQUENTIAL, INDIRECT, INCIDENTAL, SPECIAL
DAMAGES, LOST PROFITS, LOSS OF DATA OR CLIENTS ARISING OUT OF OR RELATING
TO ANY BREACH OF THIS LICENSE OR THE USE OF IPANEMA SYSTEM, EVEN IF SUCH
DAMAGES WERE FORESEEABLE. IN NO EVENT SHALL IPANEMA, ITS AFFILIATES OR
PARTNERS (OR THEIR REPRESENTATIVES) AGGREGATE LIABILITY ARISING OUT OF
OR RELATING TO ANY BREACH OF THIS LICENSE, TORT (INCLUDING NEGLIGENCE OR
OTHERWISE, EXCEED (i) 250.000 OR (ii) THE AMOUNT PAID TO IPANEMA PURSUANT
TO THIS LICENSE IN THE TWELVE MONTH PERIOD PRECEDING THE EVENT GIVING RISE
TO THE CLAIM, WHICHEVER IS LESS.
10-2
Ipanema Technologies
October 2014
10. 1. 6. Miscellaneous
1. This License may be amended only by written agreement of the parties.
2. If any provision hereof is held invalid, the remainder shall continue in full force and effect.
3. A failure or delay in exercising any right, power or privilege in respect of this License will not be
presumed to operate as a waiver, and a single or partial exercise of any right, power or privilege will
not be presumed to preclude any subsequent or further exercise, of that right, power or privilege
or the exercise of any other right, power or privilege.
4. Parties expressly agree that this License is governed by French law and any proceedings arising
out of or in connection with this license shall be submitted to the court of Paris, France.
October 2014
Ipanema Technologies
10-3
Ipanema System
10. 2. 3. Dure
1. La Licence prend effet compter de mise disposition de la cl de licence Logiciel et ce pour la
dure de protection lgale des droits dauteur pour les logiciels. Elle est soumise au paiement de
la redevance initiale du Logiciel et de la maintenance du Logiciel pendant toute la dure deffet.
2. En cas de manquement de lUtilisateur Final aux obligations mentionnes dans la Licence,
Ipanema ou le Revendeur pourra rsilier la Licence. Cette rsiliation sera effective quinze (15) jours
aprs envoi avec Accus Rception dune demande de correction du manquement aux obligations
reste sans effet.
En cas de rsiliation de la licence, lutilisateur final devra :
10. 2. 4. Garantie
1. Ipanema garantit que le Logiciel se comporte conformment la Documentation pendant une
priode de trente (30) jours suivant la mise disposition de la cl de licence Logiciel.
Dans le cas o le Logiciel ne se comporterait pas selon la Documentation, la garantie correspond
uniquement, au choix dIpanema, la correction des problmes rencontrs ou lenvoi dune
version corrige du Logiciel.
Cette garantie ne sapplique pas aux problmes causs par : a) la mauvaise utilisation du Logiciel,
incluant entre autre lutilisation du Logiciel avec une application ou dans un environnement autre
que celui spcifi par Ipanema ou lintroduction de donnes dans les tables utilises par le Logiciel
par un autre moyen que le Logiciel ; b) tout autre logiciel ou matriel externe Ipanema ; c) toute
modification ou addition au Logiciel non effectue par Ipanema; d) la non installation par lUtilisateur
Final dune solution de contournement ou dune version corrige.
2. LA GARANTIE ENONCEE CI-DESSUS EST LA SEULE GARANTIE A LAQUELLE LE
LICENCIE ET LUTILISATEUR FINAL PEUVENT PRETENDRE. AUCUNE GARANTIE
DEVICTION, AUCUNE GARANTIE RELATIVE A LADEQUATION DU LOGICIEL A UN BESION
SPECIFIQUE, DE NON CONTREFACON DE DROITS DE PROPRIETE INTELLECTUELLE,
DABSENCE DANOMALIES OU DERREUR, OU DE FONCTIONNEMENT ININTERROMPU
NEST ACCORDE.
10. 2. 5. Responsabilit
1. Le Licenci est responsable du choix du Logiciel, de lutilisation qui en est faite et des rsultats
qui en seront obtenus. Il assume toutes les responsabilits en ce qui concernent la qualification et
la comptence de son personnel. LUtilisateur Final doit prendre toutes les prcautions pour viter
la perte ou la destruction de ses donnes, incluant notamment des sauvegardes et vrifications
rgulires. Par ailleurs, il est de la responsabilit du Licenci de respecter les lois et rglements
en matire dexportation en vigueur notamment en France et aux Etats-Unis.
2. LES PARTIES CONVIENNENT EXPRESSEMENT QUE LA PERTE DE PROFIT, PERTE
DE CLIENTELE OU DECONOMIE ESCOMPTEES, PERTE DE COMMANDE, PERTE
10-4
Ipanema Technologies
October 2014
October 2014
Ipanema Technologies
10-5
Please refer to the support and maintenance contract for specific information about these services.
Should you have any problem with your system, please contact your supplier for technical
assistance.
In any case, you can get support and information by logging on Ipanemas Support web site:
https://support.ipanematech.com/,
where you can access the Public Knowledge Database, find Technical notes and FAQs, be informed
of the latest developments and updates, download all the Ipanema software, create and track
tickets, and find other relevant information relating to the Ipanema System.
An account will be created on demand.
Other contact information:
E-mail: [email protected]
Phone: +(33)1 55 52 15 22
Fax: +(33)1 55 52 15 01
In the event of a technical problem, please supply as much information as possible, in particular:
your name, address, telephone number and the name of your company,
your Ipanema Technologies license number, see window about in ip|boss field reference,
the names, versions and serial numbers of the products you are using,
the version of ip|boss servers Operating System,
a description of the installed configuration and the configuration files,
a detailed description of the problem you have encountered.
October 2014
Ipanema Technologies
11-1