Home
        PV - User Guide Documentation
         Contents
1.                                  117  10 Frequently Asked Questions 121  10 1 Firefox freezes randomly on some pages                                121  10 2 Aggregate level changes when browsing from tables to charts                     121  103  How can SRT be greater than DIT    4 geen cane bee we bode EE OH OX          Rex     121  10 4 How can we have 0 packets and no traffic at all      a                                            122  10 5 What is this timeout column  in Analysis TCP Error                      eee 122  10 6 Why        some DNS request names missing                               122  10 7 Some TCP conversations are reported twice  whats wrong                       122  10 8          files generated by tcpdump are  mostly  empty                          122  10 9 How to do complex searches on domain names                             122  10 10 How comes my VM keeps losing                                         123  10 11 What about Open Source                                         123  10 12 Standard TOP Session zu   sabra rdus                                    123    11 Known issues    11 1  11 2  11 5  11 4  11 5  11 6  11 7                                 Interface                                Smer 42549  Upgrading         Metrics         Pulsar   5x                12 Glossary    13 Appendix  Integration with other Tools                                          13 1  13 2  15 5  13 4  13 5  13 6    Index    Custom Filters        SPV For Developp
2.                                 eeu ba                     63  13  SPV Functi  nal Conhgu  rati  n    s   ze sararae 9 8 3X 30v BEER Cw       3x b o3 EEE E S 67  8 Interpreting the results 51  8 1 Business Critical Application Dashboard                                81  8 2 Business Critical Networks Dashboard                                 82         YOUPIMOOWIC 442 ow 24h        ox wx Ser E X9 Y  ww                              eee        3 83  8 4 Application dashboards                                          96  So  PCP                                                                                    eS    91   6  Packeidevel Analysis e xonoko9        Beet                                 92  5      Intectpretauon Guidelines    22 22844844348884814854    8        naaa ROUES 95  9 Licensing and Upgrades 113                              uou ovo 2 eed Ge FRG        REE Ee EEE               113  9 2  Deployment Mode  2 uem 9 omo PR Per        eos RB eso x bE Ee See wed OX x P      113  9 3 Product Range Summary s a eee Ue      ER RD DEERE   o xo        114  94  Hardware Versions S ss eae So yee BR        ee                       Wm E Eo 2 115  23  VMWare VERSIONS se ce uus sda    OR NO ROB GR P IROUR      eee GR        115  96  Performance Vision Versions                                      116  97 How can    determine the model that is right for me                           116     Ls ees a ete naaar aer ra 6             ee awe 117  99 License and Upgrade Installation   
3.                    INSERT IMTO  ALUES    LESS 190m i              Figure 2 10  The queries over time     2 8 CIFS Analysis    In the Protocols section  the set of CIFS performance pages allows you to analyse the CIFS traffic  CIFS includes  SMB      to v3 protocols  It shows the CIFS commands with the usual metrics  responsiveness  payload size        and some specific ones like metadata payload or data size effectively written by the server  Of course  when a file  is handled  its path and tree will be available     The CIFS set of protocols contains plenty of commands and statuses  In Performance Vision  we have classified  the statuses in three categories   success    warning  and  error   You can find the details of how each status is  classified in the appendix C FS Status Categories     We defined a category of common statuses  containing the most common CIFS errors and warnings  The list  contains the following statuses     e SIATUS NO SUCH FILE       SIATUS NO SUCH  DEVICE   e SIATUS OBJECT NAME NOT FOUND     18 Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3    e STATUS OBJECT PATH INVALID    e STATUS OBJECT PATH NOT FOUND    e STATUS OBJECT PATH  SYNTAX BAD    e STATUS DFS EXIT PATH  FOUND    e STATUS REDIRECTOR        STARTED    e STATUS TOO MANY OPENED FILES    e STATUS ACCESS DENIED        STATUS PORT CONNECTION REFUSED    e STATUS FILE DELETED    e STATUS INSUFF SERVER  RESOURCES       STATUS MORE PROCESSING REQUIRED    e 
4.                 P                                  OB Performance Vision 2 9 7 Te Getting Started   Summary   Virtual Machines   Resource Allocation   Performance    localhost securalis lan VMware ESXi  5 0 0  469512           Local Users  amp Groups   Event                      9   Supervision Hardware   iew    vSphere Standard Switch       Virtual Tutorial  gt              Health Status Networking Refresh Add Networking    Properties  Processors  Memory Standard Switch  vSwitchO Remove    Properties     Storage Physical Adapters  Networki    419        R vmnio 100 Ful     2  Storage Adapters  Network Adapters E   Advanced Settings Performance Vision 2 9 7 Test TBO     Power Management Virtual Tutorial       EC Supervision a                Port  Licensed Features 592 Management Network e                            10 1 0 11    Figure 6 12  Networking Menu    4  Click on    Add Networking     View    vSphere Standard Switch    Networking Refresh Add Networking    Properties                    Standard Switch  vSwitchd Remove    Properties     Virtual Machine Port Group  L3 VM Network        E 4 virtual machine s     Physical Adapters       e GR vmnico 100 Full       Performance Vision  Performance Vision 2 9 7 Test TBO  Virtual Tutorial  Supervision                Port  L3 Management Network  vmkO   10 1 0 11    Figure 6 13  Add Networking    Then  on  Network Access  Menu  select the Esx physical port dedicated to the traffic capture  here is vmnic3   and unselect the others
5.              RTT out         1 1           192 168 20 205 SRV FileServer 192 168 20 9 m Samba CIFS 9 8KiB 43 1      lt 1  3 19505     192 168 20 212 SRV FileServer 192 168 20 9    Samba CIFS 542 2       1179057 166   ims   ims 32ms     192 168 20 217 SRV FileServer 192 168 20 9    Samba CIFS 24 4MiB 44009 7 15ms   ims ims     192 168 20 202 SRV FileServer 192 168 20 9 m Samba CIFS 561 3KiB 1143 0   ims   ims    ims     192 168 20 15 SRV FileServer 192 168 20 9    Samba CIFS 9 1MiB 11434 15   ims   ims    1ms     192 168 20 50 SRV FileServer 192 168 20 9    Samba CIFS 406Bytes 7 0             Figure 8 36  Peak in server response time  Conversations    8 7  Interpretation Guidelines 103    PV   User Guide Documentation  Release 3 3    To achieve this  we can simply display the Performance conversations for the application Samba  CIFS for the  zone VLAN Sales  Here is the result     From this screen  we can draw the following conclusion     Only the clients 192 168 20 205 and 192 168 20 212 seem to be impacted  The other clients have very  short RTT values      amp  Conversations   Performance and analysis of individual conversations    It after  7 2010 06 07 12 00 Start before  7 2010 06 07 18 00        wm dd HAMM    VLAN Sales   Server Zone 7 Private       Figure 8 37  Peak in server response time  Conversations    To confirm this  we need to check that these two hosts are the only ones to be impacted and check whether they  are impacted only when accessing to the Fileserver  
6.           corresponds to the metric for the                   traffic from the caller to the callee  and the value                     out  corresponds to the metric for the RTP RTCP traffic from the callee to the caller     From each line  you drill down      to the MOS chart        to the VoIP conversations        VoIP Overview   vorr overview by caner              zones       MOS over time  This view shows the evolution of the Mean Opinion Score through time  A second graph shows the evolution of  the number of calls  to help you evaluate how many were impacted by a MOS degradation       By pointing a specific point of time on the graph  you can display the exact value for each metric on the  right side of the graph       By clicking on a specific point of time  you are directly to the VoIP conversations for this point of time        Jitter   Packet Loss    This view shows the evolution through time of the jitter and the packet loss  This view can help you understand  MOS variations and see which metric is impacting MOS     8 3  VoIP Module 85    PV   User Guide Documentation  Release 3 3      By pointing a specific point of time on the graph  you can display the exact value for each metric on the  right side of the graph       By clicking on a specific point of time  you are directly to the VoIP conversations for this point of time     2011 09 07 08 15   2011 09 07 18 15   avg  328 6 us   avg  118 0 us       09 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17 00 18 00  201
7.          ERROR  UNUSED   NT STATUS DEVICE NOT CONNECTED   NT STATUS DEVICE POWER FAILURE   NT  STATUS  FREE VM NOT AT BASE   NT STATUS MEMORY NOT ALLOCATED  NT STATUS WORKING SET QUOTA   SMB  STATUS MEDIA  WRITE PROTECTED  NT STATUS DEVICE NOT READY   NT  STATUS INVALID GROUP ATTRIBUTES  NT STATUS BAD IMPERSONATION LEVEL  NT STATUS CANT OPEN ANONYMOUS   NT STATUS BAD VALIDATION CLASS   NT STATUS BAD TOKEN TYPE   NT STATUS BAD MASTER BOOT RECORD  NT STATUS INSTRUCTION MISALIGNMENT  5     STATUS INSTANCE NOT AVAILABLE  SMB  STATUS PIPE NOT AVAILABLE        STATUS INVALID PIPE STATE   SMB  STATUS PIPE BUSY   SMB STATUS ILLEGAL FUNCTION   SMB STATUS PIPE DISCONNECTED   SMB STATUS PIPE CLOSING                13 6  CIFS Status Categories 163    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page  0xc00000b2   NT STATUS PIPE CONNECTED  0xc00000b3   NT STATUS PIPE LISTENING  0xc00000b4   SMB STATUS INVALID READ MODE  0xc00000b5   SMB STATUS IO TIMEOUT  0xc00000b6   NT STATUS FILE FORCED CLOSED  0xc00000b7   NT STATUS PROFILING NOT STARTED  0xc00000b8   NT STATUS PROFILING NOT STOPPED  0xc00000b9   NT STATUS COULD NOT INTERPRET  0xc00000ba   5     STATUS FILE IS    DIRECTORY  0xc00000bb   STATUS        SUPPORTED  0xc00000bc   NT STATUS REMOTE NOT LISTENING  0xc00000bd   NT STATUS DUPLICATE           0xc00000be   NT STATUS BAD NETWORK PATH  0xc00000bf   NT STATUS NETWORK BUSY  0xc00000c0   NT STATUS DEVICE DOES NOT EXIST        00000  1   NT STATU
8.          OE  9 09 9 3 90579 3 99 02 98 9  CS RUE eee ws 30  9 9      0 0        uum de de deu oe dere ERE OR      52825 42           RUE GA AUR uxo ub ded a 30  20          20000   Lek         OF OE E X303 5X RO 4408 eee eee    x OE OS WE             33    4 Metrics Computation 35                   uu              om RED Ree OK RD RES 4 8 3 504        90  40  35  42            36  5 Deployment 39  5 1 How to integrate Performance Vision in                                               39  202  How lo capiiretiamC    o p stes mom xS RE 4888      40  2 Supported Protocols 2 6 s sa         tbe             EERE EK E NOR                                 62 41  5 4 Port mirrorme and duplicated packets              a a a                                      43    2 Distributed Architeci  re  amp   lt s sess           Ge ERROR EERE NDA Re EUR RO x      OR EU 45  50 Virtual Performance Vision s  gt a s x mox ox 3 o  0      EOROROr EO    4o PERE EE Xo   3 x   3 48       S        50  6 Virtual Appliance Step by Step 53  6 1 How to get the image of the Virtual Appliance                             53  6 2 Virtual Appliance Specifications       su 9x ox x 624684685 eh        2       53                       eae eh eee ee RE eG                  eee EG 54  64                       22078   eee bee ee                            61  65  How to use the product               s 444      oko o o9 Rom REEL HERE EY DEH E RO ERR 62  7 Configuration 63  144      o 0 DRM 63  12  12                      
9.         0000098        0000099        000009          0000095        000009          000009          000009          0000097        00000  0        00000  1        00000  2        00000  3        00000  4        00000  5        00000  6        00000  7        00000  8        00000  9        00000            00000            00000            00000            00000            00000            0000050        00000  51       NT  STATUS INVALID IMAGE FORMAT   NT STATUS NO TOKEN   NT  STATUS BAD INHERITANCE           SMB STATUS RANGE NOT LOCKED        STATUS DISK FULL   NT  STATUS SERVER  DISABLED   NT  STATUS  SERVER  NOT DISABLED   NT STATUS TOO MANY GUIDS REQUESTED  NT STATUS GUIDS EXHAUSTED   NT  STATUS INVALID ID AUTHORITY   NT STATUS AGENTS EXHAUSTED   NT  STATUS INVALID VOLUME LABEL   NT STATUS SECTION NOT EXTENDED   NT STATUS        MAPPED DATA   NT STATUS RESOURCE DATA  NOT FOUND  NT STATUS RESOURCE TYPE NOT FOUND  NT STATUS RESOURCE NAME NOT FOUND  NT STATUS ARRAY BOUNDS EXCEEDED  NT STATUS FLOAT DENORMAL OPERAND  NT  STATUS FLOAT DIVIDE BY ZERO   NT  STATUS FLOAT INEXACT RESULT   NT  STATUS FLOAT INVALID OPERATION  NT STATUS FLOAT OVERFLOW   NT STATUS FLOAT STACK  CHECK   NT STATUS FLOAT UNDERFLOW   NT  STATUS INTEGER  DIVIDE BY ZERO  NT STATUS INTEGER  OVERFLOW   NT STATUS PRIVILEGED INSTRUCTION  SMB STATUS TOO MANY PAGING FILES  NT  STATUS FILE INVALID   NT STATUS ALLOTTED SPACE EXCEEDED  NT STATUS INSUFFICIENT RESOURCES  5     STATUS DFS EXIT PATH  FOUND  SMB  STATUS 
10.         SecurActive    PV   User Guide Documentation  Release 3 3    by the PV Documentation Team    September 08  2015    CONTENTS    1 Release notes 1  LA Wha            eth ek      PAE EAE HR EO ER SEE 536mm 43m ws 1  12  CWhatslNew I Ou     2 25 522 EERO EEE                                           1  Lo           x 2  14   WhatsNewidn3 lS  2 422264 Rbk ni                           EO RO SE 4       2  Lo Whats Newm I                                               OECROX EOE RS Ee EES 3  Lo What s New in 2 16                                           3  1  Whats NewS lo sse        deo ERR GC R                                                   EES 4  LS Whats Newin      nuke tah FOXRGRO amp  Wok X mode                      5     48         4  19 What   sNewin2 13                                           4  LIO Wie ewes            SASSER 4814 SOURCE OASEEEE EEE ERE EHS 5  Lob wage wig ll pee eee eee eee ee 3X3 eee       ud    que 5 5  i AE docu dv       2o a ee ok eee                     ee a Ee 5  113  Whats Bow m29 Lok oo        XE de UR m CY  db cdm EAE don CR de ROS           4         6  Lis Whee     22067 resa beii eee RY                 6  LIS Whats Newin  7 ssa be be ocr            7  LIO 22272000  2 5 52 555525455 Re eee ee eee ewe             7  LIT      22601122    se dk We RE pas x               EC A x X EU ERE a      5  9   2 Use The PV Graphical Interface 11  2 1 Access Through a Web browser                                     11  Zc  Network                  
11.        Show the TCP events of this conversation   postgresql      IPv4 TCP PostgreS               sq Show the SQL transactions for this conversation   7 postgresql  IPv4   TCP   PostgreS     ET S  Sync Application   Stack  ICMP                a    m icmp Ethernet   IPv4   ICMP       micmp Ethernet   IPv4  ICMP       Figure 2 18  Links from flow metrics to detailed metrics     Note  Drilldown can return no data for several reasons     e The selected transaction does not match an activated Zone  for metrics like SQL or CIFS      e No response has been parsed for the transaction  check the client and server packet counts for unilateral    flow       The payload does not generate a metric flow  like keep a    A navigation between metrics that are related is available  For    live or notifications for CIFS     example  you can obtain the DNS queries that are    related to a HTTP connection by clicking the    DNS    link in one of the result in the    Pages    view of the HTTP    protocol section     Command    Status       Port  CIFS      445  0x08  5    2 read       445             0x10  SMB2 query info     0x00000000  SMB status ok   0x00000000  SMB status ok       Flows       an        n  28             Request Type                                      Links     Begin Time Chent zone  WS L  N    ONS 13   2014 11 17 10 32 56 000                  ONS L3   2014 11 17 10 32 58 430    Service              System Datab  sername Port Command  SQL        PostgreSQL 543 UPDATE       Su 
12.        Virtual Machine Port Group   3 Mirror e      7  3 virtual machine s    VLAN ID  All  4095     Physical Adapters         vmnic3 100 Half  2       Performance Vision  Performance Vision 2 9 7 Test TBO 8   Virtual Tutorial         Figure 6 18  Two Virtual Networks    The aim of the second vswitch vSwitch1 is to show the flows in promiscuous mode     To set up promiscuous mode on the Mirror Network          Standard Switch  vSwitch1 Remove    properties  T    Virtual Machine Port Group Physical Adapters  2 Mirror e  EB vmnic3 100 Half      2  VLAN ID  All  4095              Figure 6 19  Click on   vSwitchl Properties       In    General    tab  edit MTU settings to 9000     The  in    Security    tabs  select  Accept  from the promiscuous mode listbox     6 3 7 Add a listening network card to virtual appliance     Here we should add a listening network port in promiscuous mode  Right click of the virtual appliance then choose   Edit settings      63  Installation 59    PV   User Guide Documentation  Release 3 3    vSwitch1 Properties    General   Security   Traffic Shaping          Teaming         m vSphere Standard Switch Properties    Number of Ports  120 Y      Changes will not take effect until the system is restarted     m Advanced Properties    MTU  2000 z                      Figure 6 20  General settings  MTU       vSwitch1 Properties    General Security   Traffic Shaping   NIC Teaming         m Policy Exceptions    Promiscuous Mode     MAC Address Changes   Accept
13.       Forged Transmits   Accept                    Figure 6 21  Security settings  accept promiscuous mode    File Edit View Inventory Administration Plug ins Help              Home     ar  Inventory  p Inventory          E 5                10 1 0 11 localhost securalis lan VMware ES   ui Perfor Power   B Supervi Guest     Virtual Snapshot      9 Open Console   C   Edit Settings     Add Permission    Ctrl P  Report Performance     Rename    Open in Mew Window              Remove From Inventory    Delete From Disk             Licensed Features    Time Configuration  DNS and Routing    Figure 6 22  Click on Edit Settings    60 Chapter 6  Virtual Appliance Step by Step    PV   User Guide Documentation  Release 3 3  In the Hardware tab  click on    Add     then choose Ethernet adapter and click on    Next     Attach the new ethernet    adapter to the network in promiscuous mode       Performance Vision   Virtual Machine Properties    Hardware   Options   Resources   Virtual Machine Ve  Memory Configuration     Show      Devices  EC Mee  1011 68            Hardware  Device Type    What sort of device do you wish to add to your virtual machine           Device Type Choose the type of device you wish to add   Information  This device can be added to this Virtual Machine   Help                                SSS     2    Figure 6 23  Attach Ethernet Adapter    In the network connection listbox  choose the accurate network configured above  Mirror here   then click on     Next        
14.      00002  5        00002  6        00002  7        00002  8        00002  9        00002            00002            00002            00002            00002            00002            0000240        0000241        0000242        0000243        0000244        0000245        0000246  0xc00002d7        0000248        0000249        000024    Oxc00002db        000024          0000244        000024    0xc00002df  0xc00002e0        00002  1        00002  2        00002  3        00002  4        00002  5        00002  6        00002  7        00002  8        00002  9        00002           13 6  CIFS Status Categories    NT STATUS DS CANT               NT STATUS DS CANT MOD OBJ CLASS   NT STATUS DS CROSS DOM  MOVE FAILED   NT STATUS DS GC NOT AVAILABLE   NT STATUS DIRECTORY SERVICE REQUIRED   NT  STATUS REPARSE ATTRIBUTE CONFLICT   NT STATUS CANT ENABLE DENY ONLY   NT STATUS FLOAT MULTIPLE FAULTS   NT  STATUS FLOAT MULTIPLE TRAPS   NT STATUS DEVICE REMOVED   NT STATUS JOURNAL DELETE      PROGRESS   NT STATUS JOURNAL NOT ACTIVE   NT STATUS NOINTERFACE   NT STATUS DS ADMIN LIMIT EXCEEDED   NT STATUS  DRIVER FAILED SLEEP   NT STATUS MUTUAL AUTHENTICATION FAILED   NT STATUS CORRUPT SYSTEM  FILE   NT  STATUS  DATATYPE MISALIGNMENT ERROR   NT STATUS WMI READ ONLY   NT  STATUS  WMI SET FAILURE   NT  STATUS  COMMITMENT MINIMUM   NT STATUS REG  NAT CONSUMPTION   NT STATUS TRANSPORT FULL   NT  STATUS  DS SAM INIT FAILURE   NT STATUS ONLY IF CONNECTED   NT STATUS DS SENSITIVE GROUP VIOLATIO
15.      4 2 4 From transactions to pages    Since all transactions of a page are necessarily emitted by the same user  then all transactions are associated to  this user  in chronological order  time and the    Referrer    field are our two best tools from now on   Notice that  since a page routinely involves transactions of several sockets  and since that different sockets are reassembled  by different TCP parsers which thus delivers segments at different pace  then it s possible for the HTTP metric  to reconstruct a transaction A before a transaction B even if B happened and was received by the probe before A   for instance  if A s socket reassembly was delayed by a missing frame   In such occurrence the referrer relation  between A and B may not be honored     We do not wait for the pairing with a response to attach a query to the page it belongs to  When we attach  a new query to a client we look for the referrer of this transaction within the ones that are already attached  to this client  in case the referrer field 1s absent we use the same kind of referrer cache as found in KSniffer   https   www usenix org legacy event osdi04 tech full_papers olshefski olshefski pdf    If the referred page is it   self attached to another page two behaviors are available       we detach it  thus turning the referrer into the root of a new page    or we follow the chain of attachment and attach the new transaction to the parent page    Note that the first behavior is possible only when th
16.      Destination or server IP address      Application  please refer to the chapter Application     3 5 2 Types of Conversations    Performance Vision offers two ways to analyse network conversation  From a user s perspective  network  conversations can be seen in two different ways  which correspond to two different needs  Client Server or  Source Destination  This chapter explains how those views differ  which kind of information they provide  and  how they can be used     Source   Destination    In a source destination conversation  all flows between two hosts will be classified following the concepts of source  and destination  This means that the flows will group data exchanges from a source IP address to a destination IP  address regardless of whether they function as a client or a server     For instance  a traffic from A to Bforan application will be broken down in two conversations  a conversation  from A to Bandaconversation from B to A     Src Dst conversations correspond to a view of network flows for traffic analysis  When reviewing data for traffic  analysis purposes  an administrator wants to view flows without considering the role of each host  that is to say   disregarding if the host is a client or a server        Zone A Zone B  j mi  TCP 15445 80          1    ir   TCP 445 25665    E  14452         UDP 53 44521                 TCP 17465 443   1                 ICM        5         Traffic from A   gt  8 4 4 Traffic from B   gt  A       Figure 3 4  Source De
17.      Graph Types  All   Edit this Host     Create New Host  Management  Graph Trees    Graph Templates       3    DIE            Graph Template Name    Devices Create  Junkie   Denied Parsers    Collection Create  Linux   Memory Usage  Methods    Data Queries Create  ucd net   CPU Usage  Data Input  Methods        Graph Templates   create   Select a graph to create       Host Templates           E C  EJ C1 C1       Data Templates Data Query  Junkie   Muxer Stats     Import Export    Import  Templates  Export  Templates  Configuration    Settings    Figure 13 6  Create CPU and memory graphs    As well as one for junkie   s packet sources  useful to monitor dups as well as dropped packets  in addition to  general purpose interface usage statistics on all listening devices       Data Query  Junkie   Query Pkt Sources     j Data Query  Metrics   Dumped Cells   Metric      Data Query  SNMP   Interface Statistics   Index Status Description Name  IF MIB  Type High Speed Hardware Address IP Address    Speed  1  1      lo lo softwareLoopback 24  10000000 10 127 0 0 1             E  ethernetCsmacd 6  1000000000 1000 _52 54 00 AD EF 63 o    Select a graph type   n Out Bits             Figure 13 7  Create device   protocol graphs    13 1  Integration with other Tools 133    PV   User Guide Documentation  Release 3 3    At the very bottom of the page you will have the opportunity to add graphs to monitor hard disk space  interesting  partitions          and   srv      Data Query  SPV   BC
18.      e ccs               54466 65      4                 OS 11  2 3 Application Performance       um ok ue dG RR e e LR ER GRO RON ORO UB 12  24 BORNE       13  2 5 Conversations  Flow Details  amp  Raw Data                                14  240          Analysis espa   4 eo x      Ee    0 Rum ee ee                    POR EORR             14  27  01201010 11 26 66 6 6   6 4         Pe GSE Ee BES Ee DEES           8 RSE S We 16  22      1 ogee mov         6             0m 4 ACA ee ee ee                  8 eG 18  20        o x95   CRA ERG   x4 52245 94448 Ee Ree Wm         ea 20   EUM 0016 2224                oe    8                                   Oe              BS      22  211 DNS 01010 2 2 243009          9          22  2012        woes tee eee eee eee eRe 020  640 6 64 0883 48444 23  2s             c3 x 9    48 He PR 55 4545431 9   33 995195955     35 5 23  24  DAI DOWN  s ce eee ade dom dete ue eee ooh RARER               XO CRE UR 4 23  219           Coy Exo             cedo w P eee eo SSeS Gee ERE              3 60         60  25  Z LO              OER Roy Rom wu he o   X  4 hon         gt  EA     Bud RR ra 25   3 Main terms and concepts 27  SJ  General Conventions s s                4    PT XC Kom we Se Oe         o dere Ue                      27           cea lt                              0244                  0 40060669 27            224546                                                                             29        IPM 5 2452 35 3 915 2 35  9   3 5   
19.     13 6 CIFS Status Categories    The CIFS Status codes must be interpreted in one of two ways  depending on the capabilities negotiated between  the client and the server  either as an NTSTATUS value  or as an SMBSTATUS value  For more details on the NT  statuses  you can check the official documentation here  http   msdn microsoft com en us library cc704588 aspx    If you re looking for the SMB statuses  check the CIFS documentation here  http   msdn microsoft com en   us library ee44 1884 aspx      We have classified these statuses into three categories  depending on their severity  as shown in the table below     NTSTATUS severity      0x00000000  0x00000080  0x000000c0  0x00000100  0x00000101  0x00000102  0x00000103  0x00000104  0x00000105  0x00000106  0x00000107  0x00000108  0  00000109  0x0000010a  0x0000010b  0x0000010c  0x0000010d  0x0000010e  0x000001 10  0x00000111  0x000001 12  0x000001 13  0x000001 14  0x00000115  0x00000116  0x000001 17  0x000001 18  0x000001 19  0x00000120  0x00000121  0x00000122  0x00000123  0x00000124  0x00000367  0  00010002  0  00050002  0  00060001  0x000c0001  0x00160002  0x005b0002    158    SMB STATUS OK   NT STATUS ABANDONED   NT STATUS USER APC   NT  STATUS KERNEL          NT  STATUS ALERTED   NT STATUS TIMEOUT   NT STATUS PENDING   NT  STATUS REPARSE        STATUS MORE ENTRIES   NT STATUS NOT ALL ASSIGNED   NT STATUS SOME NOT MAPPED   NT STATUS OPLOCK BREAK IN PROGRESS  NT STATUS VOLUME MOUNTED   NT STATUS            COMMITTED   NT 
20.     4 Internet Protocol version 4 Ethernet IPv4      IPv6 Internet Protocol version 6 Ethernet IPv6      IRC Internet Relay Chat Ethernet IPv4 TCP IRC  Jabber Extensible Messaging and Presence Protocol Ethernet IPv4 TCP Jabber  MGCP Media Gateway Control Protocol Ethernet IPv4 UDP MGCP SDP  MySQL MySQL or MariaDB databases Ethernet IPv4 TCP MySQL  Netbios Network Basic Input Output System Ethernet IPv4 TCP Netbios      NTP Network Time Protocol Ethernet IPv6 UDP NTP  PCanywhere   Symantec   s PCanywhere Ethernet IPv4 TCP PCany where  POP Post Office Protocol Ethernet IPv6 TCP POP  PostgreSQL   PostgreSQL database Ethernet IPv4 TCP PostgreSQL  RDP Remote Desktop Protocol Ethernet IPv4 TCP RDP  RTCP RTP Control Protocol Ethernet IPv4 UDP RTCP  RTP Real time Transport Protocol Ethernet IPv4 UDP RTP  SDP Session Description Protocol Ethernet IPv4 UDP SIP SDP  SIP Session Initiation Protocol Ethernet IPv4 UDP SIP  SKINNY Skinny Client Control Protocol Ethernet IPv4 TCP SKINNY  SMTP Simple Mail Transfer Protocol Ethernet IPv4 TCP SMTP  SSLv2 Secure Sockets Layer Ethernet IPv4 TCP SSLv2  TCP Transmission Control Protocol Ethernet IPvA TCP      TDS Tabular Data Stream Ethernet IPv4 TCP TDS      TDS msg  Tabular Data Stream messages Ethernet IPv4 TCP TDS TDS msg   Telnet Interactive terminal Ethernet IPv4 TCP Telnet  TLS Transport Layer Security Ethernet IPv4 TCP TLS      TNS Transparent Network Substrate  Oracle  Ethernet IPv4 TCP TNS  UDP User Datagram Protocol Ethernet IPvA4 UDP   
21.     861 Bytes 43 ms 43 ms  853 Bytes 45 ms 45 ms  567 Bytes 44 ms 44 ms  855 Bytes 44 ms 44 ms  494 Bytes 44 ms 44 ms   na 115          M  Hee ee oud  x  ase eee ud    0690909999996             4444444         Using the graphs  you can check HTTP status and performance  including timing  error rate  payload size  over  time     4                                       2  Use The PV Graphical Interface    2 6  HTTP Analysis       PV   User Guide Documentation  Release 3 3    HTTP Performance Chart    Begin 2013 0316 1200 92013031700 Q        Q       Client Zone Server Zone Client IP Server         All  gt  All      Device id HTTP Status Host      Poller    Client or server IP VLAN    Custom Filters  BETA           Begin  2013 03 16 12 00  End  2013 03 17 00 00      Page LT  Load Time     HIT RT  Response Time     Aggregate Level  15 minutes       800  5    600ms    400ms    200ms                           A    13 00 14 00 15 00 16 00 17 00 18 00 19 00     Hits in Error  4      amp  Sxx    Page Count    Total Hit Count  30  25  20  15    10    13 00 14 00 15 00 16 00 17 00 18 00 19 00       Response Content Length Avg    Query Content Length Avg    48 8KiB  39 1KiB  29 3KiB  19 5KiB    9 8          20 00 21 00 22 00 23 00    20 00 21 00 22 00 23 00       13 00 14 00 15 00 16 00 17 00 18 00 19 00    20 00 21 00 22 00 23 00         Page LT  Load Time   avg  14 9 ms      HIT RT  Response Time   avg  407 3 ms       Hits in Error  4      amp  5       sum  0   Page Count  sum  139    
22.     MySQL         TNS         Example of invalid inputs  MySQL    13 2 32 String    A character string enclosed between single or double quotes  It can contains wildcards    that matches anything   or for more accurate search  it can be prefixed by a   which will treat the value as a regular expression pattern     Operators          e Example of valid inputs    some thing             a z  2            Example of invalid inputs  not enclosed between quotes    13 2 33 Wildcard or regex    Either a string containing wildcards     or a regular expression if prefixed by    The value should be surrounded  by simple or double quotes     Operators              Example of valid inputs   google com       4 Nogooglev toom f  r        Securactive org        Example of invalid inputs  foo com    13 2 34 Zone name    The name of a zone  using the path notation    Private Local   The   operator will return results matching  only this specific zone  whereas the in operator will also return results contained in children zones  Note that the  value mustbe enclosed between single or double quotes     Operators               Example of valid inputs   Private Local       Example of invalid inputs   NonExistent Zone    13 3 SPV For Developpers    For developpers  it is possible to programmatically generate and retrieve the result pages as HTML or PDF     13 3 1 Getting Data    To request a page you wil use the same URL that you would in a Web  browser  Filters are implemented in the URL      the f
23.     Port Range  1433        P protocol             33  Application                29    PV   User Guide Documentation  Release 3 3        P Server  192 168 1 4 32   An HTTP application running on a server along with several other applications will be defined as follows        Web Application Pattern  xintranet securactive lanx     3 4 IP Merging    In order to maximize usage of the available disk space  some information are removed to allow better aggregation   This 18 the case for IP data of foreign host on aggregation levels 3 and 4     3 4 1 Principle   Upon data consolidation at the third aggregation level  all IP tagged on the Internet zone  or whatever name was  given to this default zone  will be removed in favor of a merged identifier  Consequently  these IPs will appear as  merged in all tables where IP values are displayed if the IP was belonging to Internet Zone and your observation    period is such that the third or the fourth aggregation level is used  This will happen with long observation periods      8 hours  and also on old data     1 week old      3 4 2 Example    Let s say a user has access to the Internet zone using the same application  for example  a web browser using  HTTP on port 80 to access to different web sites for a period of time  Originally  you will see for that period       Client Zone Client IP Server Zone Server IP Application   Traffic  Internet 86 71 197 86 Private  fallback  192 168 50 34 E http 535Bytes    Figure 3 2  TCP conversation b
24.     RST packets    A TCP connection is reset by a RST packet  There is no need to acknowledge such packet  the closure is immedi   ate  A RST packet may have many meanings     If a TCP client tries to reach a server on a closed port  the server sends a RST packet  The connection  attempt could be a malicious one  port scanning     nmap  etc   or the consequence of an unexpectedly down  server  client server misconfiguration  server restart  etc     A router might send a RST packet if the incoming TCP packet does not fit with the security policy  source  range IP address is banned  the number of connection attempts is too high in a small period of time  etc      A QoS  Quality of Service  equipment limits the bandwitdh  or the number of connections  by sending a  RST packet to any new connection attempt     If a Intrusion Detection System  e g  Snort  detects a malicious connection  he can send a RST packet to  roughly close it     If a host between Client and Server wants to do a Denial of Service  it can reset the connection by sending  RST to both peers  Basically it   s the same mechanism than the previous one  but the motivation is quite  different     Retransmissions    One of the TCP metrics which is interesting to analyze is the retransmission  A TCP Retransmission is when a  TCP packet is resent after having been either lost or damaged  Such retransmitted packet is identified thanks to  its sequence number  In SecurActive SPV we do not consider packets with no payload
25.     Traffic    Packet Count    Retransmission Rate   RR     Round Trip Time  RTT       GUI  One click integration from Performance Vision to Wildpackets OmniPeek  take the best of both  worlds    High Level  Identify issues and drill down to specific traffic with Performance Vision    Low  Level  In depth troubleshooting at packet level with Wildpackets OmniPeek      Zones  High flexibility in network zone definition to easily deal with complex architectures    Subnet    MAC Adress   VLAN   Listening Device   Poller     Zones  Support CSV based zone definition through both import and export  Manage your network zones  with the internal editor or use your own favorite tool  Excel or any other CSV capable application       Reports  Possibility to edit modify parameters page per page      Sniffer  Junkie is now in charge of zone application tagging  so this work is distributed on each poller     What s New in 2 12 5    PV   User Guide Documentation  Release 3 3         Sniffer  Support MTU metric     e  Sniffer  Junkie now gets the PCAP files from pcap replay directory as it was from a new network interface     1 13 What   s new in 2 9    1 13 1 New Features    e  Alerts  Business Critical Networks metrics are available through SNMP  The values can be queried through  SNMP  Performance Vision MIB         Metrics  Implementation of a new heuristic to find out clients from servers without    SYN    packets        Metrics  Support for HTTP chunked transfer encoding     1 13 2 Chang
26.    13 6  CIFS Status Categories 169    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page  0xc000026c   NT STATUS DRIVER UNABLE TO LOAD  0xc000026d   NT STATUS DFS UNAVAILABLE  0xc000026e   NT STATUS VOLUME DISMOUNTED  0xc000026f   NT STATUS       86 INTERNAL ERROR  0xc0000270   NT STATUS WX 86 FLOAT STACK  CHECK  0xc0000271   NT STATUS VALIDATE CONTINUE  0xc0000272   NT STATUS NO MATCH  0xc0000273   NT STATUS NO MORE MATCHES  0xc0000275   NT STATUS NOT A REPARSE POINT  0xc0000276   NT STATUS IO REPARSE TAG INVALID  0xc0000277   NT STATUS IO REPARSE TAG MISMATCH  0xc0000278   NT STATUS IO REPARSE DATA INVALID  0xc0000279   NT STATUS IO REPARSE TAG NOT HANDLED  0xc0000280   NT STATUS REPARSE POINT NOT RESOLVED  0xc0000281   NT STATUS DIRECTORY IS    REPARSE POINT  0xc0000282   NT STATUS RANGE LIST CONFLICT  0xc0000283   NT STATUS SOURCE ELEMENT EMPTY  0xc0000284   NT STATUS DESTINATION ELEMENT FULL  0xc0000285   NT STATUS ILLEGAL ELEMENT ADDRESS  0xc0000286   NT STATUS MAGAZINE NOT PRESENT  0xc0000287   NT STATUS REINITIALIZATION NEEDED  0xc000028a   NT STATUS ENCRYPTION FAILED        0000285   NT STATUS DECRYPTION FAILED  0xc000028c   NT STATUS RANGE NOT FOUND  0xc000028d   NT STATUS NO RECOVERY POLICY  0xc000028e   NT STATUS NO EFS  0xc000028f   NT STATUS WRONG  EFS        0000290   NT STATUS NO USER KEYS  0xc0000291   NT STATUS FILE NOT ENCRYPTED  0xc0000292   NT STATUS NOT EXPORT FORMAT  0xc0000293   NT STATUS FILE ENCRYPTED  0xc0000
27.    6 ms    5   standard 1 packet query from    RT  RTT srv 3 ms client awaiting data response  from server     DTTsrv Oms  Anoptional empty ACK is common  RTT cit 3ms from server if compute time of the  response is long    Transmission of 1 packet sized data  from server is acknowledged by client   Thus Data Transfer Time  DTT  is nul     DTT client    st    requ     RTT server   54    RTT server  SRT  DTT server    simple query sample  re         sponse    30 14 RTT client     gt   Standard multi packet query from  client  with multi packet response  from server              2        DTT client 2   RTT server    Optional ACK from server    RTT serv     Start of multi packet response from   RTT client         Optional ACK from client    1  First part of data is PUSH by server    RTT client   Optional ACK from client      RTT cit 9 ms    complex query sample  se    respon              5                        5             9    2 ACK     5              ini 5  RD cit 8 ms Packet containing data d is lost     Acknowledgment from client will  hint the server that packet d was    70   RTT client not received correctly        Server retransmission of packet d       Retrans     5 which is lost again        Second ACK from client waiting for  5 next packet   a  Retrans DTT server           Final retransmission of packet d that  1 is correctly acknowledged by client   Legend  FIN server c          FIN client        5   n  04 9  un            Securactive Performance Vision interpreting
28.    Add Hardware    Network Type  What type of network do you want to add     Device Type Adapter Type  Network connection Type  Flexible        Adapter choice can affect both networking performance and migration compatibility   Consult the VMware KnowledgeBase For more information on choosing among the  network adapters supported for various quest operating systems and hosts              Connection   Network label          Network        Port           Device Status       Connect at power on       Help    lt  Back              1                     Figure 6 24  Network Connection    Click on  Finish  to complete the operation     6 4 Validate the traffic capture    You can power on the virtual appliance and validate traffic Capture  There are 2 main methods to validate the  traffic capture  with the graphical interface  GUI  or with Pulsar     With the GUL  as an example  you can monitor the bandwidth after 6 minutes of listening by clicking on the green  validation button  See Use The PV Graphical Interface for more information about how to use the GUI     With Pulsar  connect via ssh or from the virtual appliance console on the Esx and type bmon  See Pulsar for  more information about the command line interface     64  Validate the traffic capture 006    PV      6 5    User Guide Documentation  Release 3 3       Add Hardware    Ready to Complete  Review the selected options and dick Finish to add the hardware     Device Type Options    Network connect d   Ready to Comp     
29.    VNC Virtual Network Computing Ethernet IPv4 TCP VNC       13 5 Licenses of open source libraries    13 5 1 Operating System   SPV uses the Debian operating system  http   www debian org  SPV does not use the    non free     repository provided by Debian     According to Debian Social Contract v1 1  April 26  2004   the license of a Debian component  may not restrict any party from selling or giving away the software as a component of an aggregate  software distribution containing programs from several different sources  The license may not require  a royalty or other fee for such sale     13 5 2 License inventory for the sniffer         glibc   GNU Lesser General Public License      guile library  GNU General Public License  version 2 or later  with exceptions  no copyleft on link      guile sglite3   GNU Lesser General Public License  version 3 or later    e Junkie   Copyright and AGPLv3     libpcap library   BSD style license  3 clause BSD      libgc   libgc license        libuuid   libuuid License    13 5  Licenses of open source libraries 155    PV   User Guide Documentation  Release 3 3    openssl library   BSD style license   SSLeay license  pOf fp file   GNU Lesser General Public License     13 5 3 License inventory for the javascript GUI     13 5 4 License inventory for GUI and database management     e jquery   The MIT License      jquery mb browser   The MIT License or GNU General Public License    e jquery multiple select   The MIT License      jquery ui   The M
30.    s needed to upgrade some third party internal softwares         information is available in  the release note of the new version  These packages are called Service Packs  To apply them  put the file   SPV ServicePackX rY bin using the same method     9 9 1 Check the license or upgrade  The status of the license can be validated in Pulsar with the command                        Usage   poller  poller add IP  poller modify  poller delete  APS  poller    Name  APS   Address  localhost   Created the  2612 82 18 17 23   Device ID  564D9B2D C67 F  0562  38B  684806858682  Device      89f a724182B8baf e6f cc8B8da13b3644d2a  Time  2012 02 15 17 24   SPU Version  2 5 13   2   Sniffer status  ok  pid 2768   Sniffer version  2 5 13   License  invalid   Expiration  no limit       Figure 9 8  Pulsar  command                     It can also be done through the web interface  in the page    Poller status    in the Configuration section  The page  displays SPV versionand License Status and then see if your upgrade or license is correctly installed     PV   User Guide Documentation  Release 3 3             3 Pollers Log    Current State    Folter Created Address Device ID Probe Time mE T       Name version 5 Version    2012 02 24 2012 02 24  11 01 11 41       APS localhost 564DBD87    2 5 13   2 ok  pid 2869 2 5 13    d  Is the sniffer working        Figure 9 9  Poller Status page  invalid license    9 9  License and Upgrade Installation 119    PV   User Guide Documentation  Release 3 3   
31.   1s element  the evolution of End User Response Time through time       24 13 1402  cn   nn  400 eon    Figure 8 9  End User Response Time  EURT  graph    This EURT graph shows     the evolution of the quality of experience for users of this application over the period of time       the number of transactions help you consider the evolution of EURT with rigor and common sense  you  would not consider a degradation of EU Response Time for 10 applicative transactions in the same way as  for 10 000      The breakdown of               three intelligible components  RTT for network latency  SRT for Server Response  Time and DTT for Data Transfer Time  let you know at first glance what is the origin of the possible performance  degradation  For example in the screenshot here above  we can observe an increase in the SRT  the network and  the time required to send the response to the client have not increased  Either the server overall responded slower  or some specific queries required a much larger treatment time  you can determine this by drilling down to that  specific point of time      2nd element  EURT by Server    Breakdown by server    T T T 1  50 100 150 200 250    9 2  Wen                         Figure 8 10  EURT by server    88 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    What we can see here  is a comparison between the EURT for that application on each server that provides this  application  In this case  it is obvious that Atla
32.   2  2  2            2  2            Sniffer Data    The pollers listen and analyze the network traffic  The collector receives data from the pollers  integrate them in  the database  and then provides an access to the data through the Web UI     You can add a new poller via Pulsar by using the command poller add   IP    The specified IP of the poller  must be reachable with SSH port 22     The Pollers Status page in the Configuration menu display some status information about pollers     55  Distributed Architecture sss    PV   User Guide Documentation  Release 3 3    5 5 2 Where is data being merged   segregated     The data 15 merged  1 6  the data 15 integrated in the reports with no consideration for the poller  which has captured  it  in       Business Critical Application Dashboard      Business Critical Network Dashboard      Application dashboards      Graphs  performance  bandwidth  matrix       Comparison tables  Client   Server  Network performance  Application performance      Please note that in these reports  you can enter a filter to view the data captured by one poller only  The data is  segregated  i e  the data is kept separated depending on the poller which captured the data  in all other tables     Please note that in these reports for a single conversation viewed by two pollers  you will get two lines     5 5 3 What happens if a poller does not answer     If a connection to a poller is broken  the collector wait for it during 10 minutes  After this time 
33.   5  according to bandwidth available  Mib s         A minimum volume for triggering  Mib s   This value represents the minimum bandwidth observed from  which you will consider the performance and volume thresholds as relevant       The thresholds values can be configured as symmetric by ticking the Symmetric Link check box or be  configured as distinct values for both directions  This is particularly useful when the critical network         refers to asymmetric connections like ADSL         has one of its zones closer to the poller than the other zone and latency  RTT  computation is im   pacted  see Distributed Architecture      You can define thresholds from either one criterion or more  any of the following  latency  retransmission rate and  consumption level   But you cannot define a BCN from one zone to itself  as their intended purpose is to check  the performance of most important links or routes between two network segments     By applying your changes  the BCN Dashboard will be updated in accordance with the new threshold values   including already captured data   To be useful and pertinent  these parameters must be accurate values adjusted  to your network configuration  These values can be easily changed for fine tuning or to cope with any change in  the network or applications you are using     7 3 6 Reports    Creating Reports 18 just a matter of a few clicks  You can easily create and define exactly the level of information  you want to get  You will receive it
34.   5 2500ms 3500ms 4500ms  Eze        Bor                            Figure 8 8  Overall view of the application dashboard    8 4 1 How can it help     For reporting    In a single report you have enough to explain a business user or a manager how the application performance went  through time  which servers were doing worse and which zones were impacted  On top of the EURT  all this is  based on three synthetic metrics that are easy to explain  so that you can address non technically aware people  with an understandable speech about    what is going on        e RTT     network performance  e SRT   Server Performance        DTT     Delivery of application response through the network     84  Application dashboards         87    PV   User Guide Documentation  Release 3 3    For troubleshooting    For network administrators this report brings together all the information about a business application required to     validate whether there is a slowdown or not    identify the origin of a slowdown  network  application  response delivery     which users or servers were impacted    In no more than one click  you can conclude on whether there was a slowdown or not  what was the origin of the  degradation  which client zones were impacted  With a single additional click  i e  two clicks in total    you can  view whether all clients in a zone were impacted or if the server response time degradation was due to another  application hosted on the same server machine     8 4 2 Components  
35.   Figure 7 10  Business critical application edition      The warning threshold level of the EURT  End User Response Time  value in milliseconds  When the  value is above or equal to this level  the color displayed      the BCA dashboard will be    orange     When the  value is under this level  the color displayed on the BCA dashboard will be    green          The alert threshold level of the EURT value in milliseconds  When the value is above or equal to this  level  the color displayed on      BCA dashboard will be    red        Note  To be useful and pertinent  these parameters must be accurate values adjusted to your network configura   tion  These values can be easily changed for fine tuning or to cope with any change in the network or applications    you are using     A new critical application will benefit of all the data history  after having defined an application as critical  if the  data has already been collected for this application then the thresholds levels will be automatically applied on the         dashboard  even for a period back in time     7 3 5 Business Critical Networks    A BCN consists of a virtual link between two zones  its objective 1s to monitor normal volume and performance  levels between two network segments  which represent a strategic network link for your organization  e g  link  from the data center to a remote site  from the server VLAN to a user VLAN        administrator can configure  thresholds for warning and alert on bandwidth consu
36.   ISO  8859 1  utf 8 q  0 7    q  0 3    Response  view raw content   View body   Display              1 0 200         Server     Apache    X Content Type Options  nosniff    Cache Control  private  5              0                0  must revalidate   Content  Encoding  gzip   Vary  Accept Encoding   Content Length  164   Content Type  text javascript  charseteutf 8   X Cache  MISS from sq65 wikimedia org   X Cache Lookup  HIT from s q65 vikimedia org 3128   X Cache  HIT from amssq34 esams wikimedia org   X Cache Lookup  HIT from amssq34 esams wikimedia org  3128   Age  3   X Cache  HIT from knsq27 knams wikimedia org   X Cache Lookup  HIT from knsq27 knans  vikimedia org 80   Connection  keep alive   0000 1 88 08 00 00 00 OO 00 00 03 65 BE Cl OA C2 30      86 SF 45 72 EE 61 2D 7   09 CD 09 38      65 17                 0           2          0020      22 25 6C BS 06 BB B4 08 00 11 Fl 00 80 05 45      98 SF SF F2      87 07 30 SE CE      68 84 BG       41                     0       0040 54 C6 B6 71      01 27 BA 6C F7 BB B6 B3 90 18 09 14      1C           04 BS 59 29 18 28 A7 80 77      1       4   1                            0060 19      FD 13 F4 BD SC      55 29 38 C9 98 28 52 26 F6 85 Cl 79      81 F8 52 86 80      CB C2 26 F4 2    j     V  UI B                 8  amp   0080 88 70 FB Bl 7F 95 68 BS      OF 18 29 02      98 90 BC 88 61      06 B4 SE 16 00 S    C7 17 3C 46 1   93                                        0040      00 00 00       By default  for performance r
37.   Information on the duplicated packets rate in Pulsar    This means that 5 12  of the listening traffic is duplicated          Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3    5 4 5 Deduplication algorithm    The sniffer usually receive frames from multiple locations on a network  and so it can be cumbersome  if not im   possible  to avoid the situation where the same frames are mirrored several times toward the probe  Deduplication  is the process of ignoring selectively packets that are artificial duplicates due to the network infrastructure  On the  other hand  automatic deduplication makes it harder to find out if duplicates were present in the network in the  first place     The following chapters covers the deduplication system in order to help minimizing duplication issues     The packet sniffer detects and drops duplicate frames based on a digest of their content  which 1s compared to the  digest of the packets received shortly before  After this rough description we are going to see in more depth over  what content is computed the aforementioned signature  which previous packets are considered and how short the  sniffer looks for duplicates in the past     When computing the digest  only a selected set of bytes are compared     For small frames  which size is below the size of an IP header  all bytes are taken into account       For bigger frames  bytes after the Ethernet header  including the VLan tag if collapsing VLans  and up to  the 64th b
38.   NT STATUS INVALID OPLOCK PROTOCOL  0xc00000e4   NT STATUS INTERNAL DB CORRUPTION  0xc00000e5   NT STATUS INTERNAL ERROR  0xc00000e6   NT STATUS GENERIC NOT MAPPED  0xc00000e7   NT STATUS BAD DESCRIPTOR FORMAT  0xc00000e8   NT STATUS INVALID USER BUFFER   Co    164 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity              00000  9        00000            00000            00000            00000            00000            00000            0000070        00000  1        00000  2                              00000  4        0000075        0000076        00000  7        0000018        0000079  OxcO00000fa        00000   OxcO00000fc        00000            00000                            0xc0000100        0000101        0000102        0000103        0000104        0000105        0000106        0000107        0000108        0000109        000010    0xc000010b        000010          000010          000010          0000107        0000110        0000111        0000112        0000113        0000114        0000115        0000116        0000117        0000118        0000119        000011          000011  5        000011          0000114        000011    0xc00001 1f       NT  STATUS UNEXPECTED IO ERROR   NT STATUS UNEXPECTED      CREATE ERR  NT STATUS UNEXPECTED      MAP ERROR  NT STATUS UNEXPECTED MM  EXTEND ERR  NT STATUS NOT LOGON PROCESS   NT STATUS            SESSION EXISTS   NT  STATUS INVAL
39.   Operators            Example of valid inputs  0  NoError ServFail      Example of invalid inputs  45778  SomeCode    13 2 16 Date and time    A date and time value of the following format   YYYY MM DD hh mm  Note that the value must be enclosed  between simple or double quotes     Operators        lt    lt      gt   gt       Example of valid inputs   2000 01 01 00 00  72012 06 14 17 15        Example of invalid inputs   2000 01 01   2013 11 02 14 58    13 2 17 Decimal or hexa     Either    decimal number      an hexadecimal number which must be prefixed by 0x   Operators        lt    lt        gt    gt      Example of valid inputs  0x21  0x7a5E  4      Example of invalid inputs  0X45  OxTH    13 2 18 Duration    A duration in microseconds  minutes  etc  depending on the unit set  The lowest value 18 in microsecond  specified  as us      ns     Operators        lt    lt        gt    gt       Example of valid inputs  42115  4us  5m      Example of invalid inputs  4 microseconds    13 2  CustomFilters 149    PV   User Guide Documentation  Release 3 3    13 2 19 Ethernet Type    The ethernet protocol ID  Operators            Example of valid inputs         4   0  0800  2048    e Example of invalid inputs   FOO   123456789    13 2 20 HTTP Method    A symbol representing the HTTP method name   Operators            Example of valid inputs  GET  HEAD      Example of invalid inputs          get    13 2 21 HTTP status  A HTTP status number  or a symbol representing the category of HT
40.   PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity    RPC NT INVALID ASYNC HANDLE  RPC NT INVALID ASYNC CALL   RPC NT PROXY ACCESS DENIED   RPC NT NO MORE ENTRIES   RPC NT 55 CHAR TRANS OPEN FAIL  RPC NT SS CHAR TRANS SHORT FILE  RPC NT SS IN NULL CONTEXT   RPC NT 55 CONTEXT MISMATCH   RPC NT 55 CONTEXT DAMAGED   RPC NT 55 HANDLES MISMATCH   RPC NT SS CANNOT GET CALL HANDLE  RPC NT NULL REF POINTER          NT          VALUE OUT OF RANGE  RPC NT BYTE COUNT TOO SMALL  RPC NT BAD STUB DATA          NT INVALID ES ACTION   RPC NT WRONG ES VERSION   RPC NT WRONG STUB VERSION   RPC NT INVALID PIPE OBJECT   RPC NT INVALID PIPE OPERATION  RPC NT WRONG PIPE VERSION   RPC NT PIPE CLOSED   RPC NT PIPE DISCIPLINE ERROR   RPC NT PIPE EMPTY    13 6  CIFS Status Categories       175    LCA    PV   User Guide Documentation  Release 3 3    176 Chapter 13  Appendix          Aggregation  33  121  Aggregation period  127  Alerting  76   Application  29  70  99  105  127  Application NC  127  Application Port Range  127  Autopcap  92    B    Bandwidth Chart  13   BCA  72  81   BCN  73  82   Browser  121   Business Critical Application  72  81  Business Critical Network  73  82  Byte  27    C    Cacti  131   Client  31   Collector  127   Connection Time  CT   127  Conversation  30  121  127  CSV  23    D    Dashboard  81  82  86  89   Data Transfer Time  DTT   127  Deduplication  43  122   Delta sessions  127  Destination  31   Device 
41.   The Esx physical will be bound to the new virtual network  here VM Network2   Click  on    Next       We can customize the new network label as    Mirror    here     Vlan ID  optional  for vlans tags     63  Installation        B7    PV   User Guide Documentation  Release 3 3    Add Network Wizard    Connection Type  Networking                      can be pertitioned to sccommadete each service thet requires connectivity    Connection     Network  Access Connection Types         Virtual Machine  Add a labeled network to handie vitual machine network affir   C wMkermnel    The kernel            stack handles traffic For the          ESXI services  vSphere vieron  GCSE  NFS   and host managemart        Figure 6 14  Select Virtual machine as Connection Types  then Click on    Next       Select which vSphere standard switch will handle the network traffic For this connection  You may also create a new  vSphere standard switch using the unclaimed network adapters listed below      Create a vSphere standard switch peed Networks  Intel Corporation 82571EB Gigabit Ethernet Controller     89 vmnici Down None    89 vmnic2 Down None  i 100 Half 81 131 151 5 1 131 151  5 254   VLAN 5     vmnic4 Down Mone  vmnicS Down Mone  vmnic6 Down Mone  vmnic  Down Mone    Preview     Virtual Machine Port Group Physical Adapters  VM Network 2 ef        vmnic3       Figure 6 15  vSphere Switch          Add Network Wizard    6    Virtual Machines   Connection Settings  Use network        to iderkiy m
42.   Time greedy application request  a complex SOL command can let the server processes during many sec   onds        Application layer overloaded  too many requests  such that the server can t handle all of them in a small  period of time        Marginally SRT can be affected by the increase of network latency between the point of capture and the  server  parallel increase of the RTT Server value      To pinpoint the root cause of the slowdown  we firstly want to compare the SRT for a given couple  server application to other applications on the very same server  If there is a blatant difference  the application is  guilty  Otherwise  we want to compare it to other servers in the same zone  then different zones     DTT    DTT stands for Data Transfer Time     DTT server is defined as the time between the first data packet of the response  with ACK flag and a non  null payload  from the server and the last packet considered as part of the same response  if the packet has the  same acknowledgement number   FIN  RST packets from server or client will also be considered as closing the  sequence  A Timeout will cancel a DTT  Note that if the answer is small enough to be contained in only one  packet  the DTT will be of   0        DTT client is the same metric in the other direction     DTT  sum of both server and client DTT  is meaningful of the time the user is going to have to wait for the response  to circulate on the network from the server to the client  It is not dependent on
43.   WARNING    WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING  WARNING       Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity              0xc000000b   NT STATUS INVALID CID   0xc000000c   NT STATUS TIMER NOT CANCELED   0xc000000d   SMB STATUS INVALID PARAMETER      0xc000000e   SMB STATUS NO SUCH DEVICE Y   0xc000000f   SMB STATUS NO SUCH FILE Y   0xc0000010   SMB STATUS INVALID DEVICE REQUEST Y   0xc0000011   SMB STATUS END OF FILE Y   0xc0000012   SMB STATUS WRONG VOLUME            0000013   SMB STATUS NO MEDIA IN DEVICE            0000014   NT STATUS UNRECOGNIZED MEDIA   0xc0000015   SMB STATUS NONEXISTENT SECTOR      0xc0000016   SMB STATUS MORE PROCESSING REQUIRED Y   0xc0000017   NT STATUS NO MEMORY   0xc0000018   NT STATUS CONFLICTING ADDRESSES   0xc0000019   NT STATUS NOT MAPPED VIEW   0xc000001a   NT STATUS UNABLE TO FREE VM   0xc000001b   NT STATUS UNABLE TO DELETE SECTION   0xc000001c   NT STATUS INVALID SYSTEM SERVICE   0xc000001d   NT STATUS ILLEGAL  INSTRUCTION   0xc000001e   SMB STATUS INVALID LOCK SEQUENCE Y         000001     SMB STATUS INVALID VIEW SIZE Y   0xc0000020   NT STATUS INVALID FILE FOR SECTION         0000021   SMB STATUS ALREADY COMMITTED      0xc0000022   SMB S
44.   Zone name   Zone name    Operand Type    Owin    win count clt  Owin count srv  app   bandw  bandw clt  bandw srv  begin  capture begin  capture end   ce          Counc   delta session  device  diffserv  diffserv olt  diffserv srv  dtt  dtt  dtt                                                                                CdCl  Sry  dup ack counc    Zero Window Size in both direction  Zero Window Size from client  Zero Window Size from server  Total traffic   Traffic from caller   Traffic from callee   Number of SYN packets   Capture begin time   Capture end time   Connection time   Number of successful handshakes    Difference between created session and finished sessions    Client or Server Diffserv   Client Diffserv   Server Diffserv   Sum of both DTT client and server  Data transfer time from client    Data transfer time from server  Total duplicate acks    Decimal or hexa   Decimal or hexa   Decimal or hexa   Application name  Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Date and time  Date and time  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa     Duration  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration  Decimal or hexa        Continued on next page    146    Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 8     continued from previous page    Operand Type    dup                               qok ocountsbv           eth proto            Irin count                             P
45.   be processed  In such case  the result is that only a part of the total traffic will be analyzed  An alert is sent to the  Administrator     9 9 License and Upgrade Installation    Apart from the trial version  all virtual and physical appliances are provided with no license key  You have to get  the license key  which will be provided by email by SecurActive          SPV entities  virtual  poller and collector  see Distributed Architecture  needs a specific license  The licenses  are specific to a given hardware serial number  the device id   so that each device must be sent its own license  package     Note  With this system you can transform an APS into an APP or an APS Free into an APS express  for example  There is a special case  when you transform any APP probe into a non APP you must do a for     mat data disk command after installation to be able to save captured data   See Pulsar     The same procedure must be performed for all the entities either for license or upgrades  please follow the steps  below        Connect to the FTP server of the probe    user  ftp  password  S3c7r     2  Upload  put  your license or upgrade file     Wait a few minutes and it s done  The installation is complete when the license key is not available anymore by  refreshing the destination folder lists     Check your license or new version with the status or poller commands  For upgrades  please redo the same  procedure on all the entities     9 8  Limits 117    PV   User Guide Documenta
46.   partitions  df  passwd  set_date set_time  traceroute tzselect    hostname log  smtp snmp support       Figure 7 2  Available commands    7 2 7 Configuration example    pulsar  config network   NETWORK     Connection Type    1  Static network   2             Your choice  1   IP address  192 169 1 1  netmask  255 255 255 0  gateway  192 168 1 254    7 2 8 Support access through VPN    The probes come with an already configured VPN connection to allow access for support operations  if needed   The VPN address is set by default and should normally not be changed  If it needs to be changed  this can be done  by the command config and option 7  The VPN service is stopped by default  It can be started or stopped at  any moment by the corresponding commands support start orsupport stop     66 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    Note  In order to have the VPN connection of the probe working fine  you will probably have to configure your  network and or security equipment like your firewalls  Default Host DNS is vpn securactive net and    default port is 443     7 2 9 Support with no remote access    In case the probe is not accessible from the Internet  you can use the diag command  It ll generate    tarball  containing all necessary information for the support team to do the diagnostic  Once the tarball is generated   you ll have to download the file by FTP with the classical admin account  in the  diag directory  and send it to the  support t
47.   process  MonitorNevrax  RUNNING  pid 10201  uptime 22 05 18    distribute  RUNNING  pid 10202  uptime 22 05 18    dumptimer  RUNNING  pid 16877  uptime 1 19 02    junkie  RUNNING  pid 16575  uptime 1 19 14    junkie dumper  RUNNING  pid 16725  uptime 1 19 09    low space watchdog  RUNNING  pid 10203  uptime 22 05 18    nevrax  RUNNING  pid 10205  uptime 22 05 18    storage  RUNNING  pid 10204  uptime 22 05 18    You can see in this example that some processes have been restarted recently     Here is the table of all involved processes with a brief explanation     7 2  Pulsar 65    Moni   torNevrax  distribute    dumptimer    junkie    junkie   dumper  low space   watchdog  nevrax  storage    PV   User Guide Documentation  Release 3 3    Check nevrax resource consumption    Deploy configuration and collect  synchronize and merges  CSV files about traffic statistics    Signal the end of a 2 minutes statistics collection  Network sniffer that computes various statistics about the  traffic   Write the statistics into CSV files for the RDBMS    Checks available disk space    Web user interface  Stores new data into the RDBMS and handle data aggregation       7 2 6 More about pulsar    help provides both global and command help  Tab completion is enabled for commands and subcommands such  as help  config and show     Pulsar shell  configure your probe    help     quit  exit     csv status extend_disk format_data_disk  process reset status    show    system commands  dig  ifconfig
48.   service_description BCA SSH   use generic service   check command check securactive bca ssh  host name beta    define service     name        pop3s   Service description BCA POP3S   use generic service   check command check securactive bca pop3s    13 1  Integration with other Tools 137    PV   User Guide Documentation  Release 3 3    host name         define service     name    service description    use  check command  host name   1          define                    name    service_description    use  check command  host name   1       define service     name    Service description    use  check command  host name    beta    bos hbtp  BCA_http    generic service  check_securactive_bca   https     beta    ben BetDVerslnternet    generic service    BCN RetDVersInternet    check securactive bcn R D    beta    ben voip  BCN VOIP    generic service    check securactive bon Voip    beta    PV BCA BCN and Nagios BCA BCN          beta    ocal Voip    Private Serveurs Voip        Begin  2013 03 18 14 08 Aggregate Level  2 minutes  End  2013 03 18 15 08 Number of collected results  7      2013 03 18 14 08    EURT thresholds over time  EERE        E HE                       EEE                          ee        2013 03 18 15 08 1 Traffic                              4070           eT TT TT tT  5         ic   Transactions    64 8        165  0 Bytes         amm 29 7 MiB 10479    1 8 MiB 1549         Figure 13 12  BCA on PerformaceVision    Begin  2013 03 18 14 07 Aggregate Level  2
49.   since duplicate ACKs are  much more frequent  and not really characteristic of a network anomaly  There are several common sources of  TCP retransmission     106    A network congestion  If a router can   t cope with the whole traffic  its queue will grow bigger until it  gets full and then start dropping the incoming packets  If you reach a predefined QoS limit  the exceeding  packets will be dropped as well  Such drop will result in TCP retransmission  A common way to identify  this kind of problem is by taking a glance to the traffic statistics  If you see a flat line at the max traffic  allowed  then you get the root cause of retransmission  If the traffic graph looks OK  you can check over    Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    the load of the routers switches you own  e g  with the SNMP data   If the load is too high  you found the  culprit        An overloaded server  Check the Section Slow Server       A hardware failure  Maybe a network equipment is simply down  It will obviously result in TCP retrans   mission until a new route is computed  or the issue fixed  This type of retransmission should occur with  very short time effects and give some quite big peaks of retransmission  on very broad types of traffic on a  specific subnet  If this happens often  it becomes important to find the faulty hardwares by tracking down  which subnets are concerned       A packet header corruption  Network equipments are used to rewr
50.  0       14 00 15 00 16 00 17 00 18 00    30 000   25 000                       mum                           The evolution of DNS response times which impacts the quality of experience of end users        Unexpected name resolution protocols  are you still using Netbios WINS  when you thought you only rely  on pure DNS  Do you have more DNS requests in error than successful ones      Info Begin  2012 03 21 13 15 Aggregate Level  15 minutes  End  2012 03 21 19 15 N umber of collected results  4    Request              Response Code Packets   Traffic DNS RT   1  A na 39164 29 MiB    6 14  1  A  0  NoError 61129 6 8 MiB 97 ms  Q     114  2  ServFail 55015 36 MiB 166 ms  G 14  1  A  3  NXDomain 31596 37 MiB 18 ms      Are some of my hosts trying to resolve out of abnormal servers   Rest of migrations  misconfigurations   infections                 see hosts with abnormal request volumes   infection  misconfiguration        Begin 201203211324   End 20120321192               Zone Emitting         Emitting zone Server       Request Name Request Type  Response Code    Device id Poller            Have I got some configuration issues  short TTL values  lack of caching   Look at the DNS conversations  with the largest number of transactions     This view can be accessed through Diagnostic   DNS     22 Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3    2 12 TCP Events    Performance Vision provides an in depth view of TCP anomalies and events  Whe
51.  00 09 10 09 20 09 30 09 40     Response Payload    Query Payload    Meta Payload       19 1MiB             09 00 09 10 09 20 09 30 09 40       Response Packets    Query Packets    20 000    T            UI       Figure 2 12  The CIFS graph with its four charts     Status  File ID Path Queries     rrors  Warnings SAT w   0xc0000120  NT status cancelled   80x60000000  SMB 2   0xc8008120  NT status celled 1  10    0000120  NT status 1   0xc0000120  NT status celle     1  10  00000000  SMB status ok 0x8023   urs 1  19    0000129  NT status cance lled 6x8613 Peugeot VPdm 1 1 1735 771  1  1  4  1  1                 0xc0000120  NT status cancelled 0x402e    0    0000120  NT status cancelled              sqlprod     0x00000000  SMB status ok     2      0xc0000120  NT status cancelled 0  14    Peugeot  Pda Inbox    0x00000000  SMB status ok   Exp        Figure 2 13  CIFS queries showing Status  File Path and SRT     2 9 Matrix    The matrix view provides a representation of various metrics  where every cell represents the value of this metric  from one zone to another zone  Each cell can contains extra values to better interpret the result  such as the number  of packets used to compute a mean  and so on   This report provides a very synthetic view of the mapping of the  metric which is observed     The matrix can be used both for Client Server and Source Dest observations  The Client Server matrix can be  found in the APPLICATIONS section  while the Source Dest matrix can be found i
52.  0xc0000226   NT STATUS NOT TINY STREAM  0xc0000227   NT STATUS RECOVERY FAILURE  0xc0000228   NT STATUS STACK OVERFLOW READ  0xc0000229   NT STATUS FAIL CHECK  0xc000022a   NT STATUS DUPLICATE OBJECTID  0xc000022b   NT STATUS OBJECTID EXISTS  0xc000022c   NT STATUS CONVERT TO LARGE  0xc000022d   NT STATUS RETRY       168 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity        0xc000022e        0000221        0000230        0000231        0000232        0000233        0000234        0000235        0000236        0000237        0000238        0000239        000023    0xc000023b  0xc000023c        0000234        000023          0000231        0000240        0000241        0000242        0000243        0000244        0000245        0000246        0000247        0000248        0000249        0000250  0xc0000251  0xc0000252  0xc0000253  0xc0000254  0xc0000255  0xc0000256  0xc0000257  0xc0000258  0xc0000259  0xc000025a  0xc000025b  0xc000025c  0xc000025e        0000251        0000260        0000261  0xc0000262  0xc0000263  0xc0000264  0xc0000265  0xc0000266  0xc0000267  0xc0000268        0000269  0xc000026a  0xc000026b       NT STATUS FOUND OUT OF SCOPE   NT STATUS ALLOCATE BUCKET   NT STATUS PROPSET NOT FOUND   NT STATUS MARSHALL OVERFLOW   NT STATUS INVALID VARIANT   NT STATUS DOMAIN CONTROLLER  NOT FOUND  NT STATUS ACCOUNT LOCKED OUT   SMB STATUS HANDLE NOT CLOSABLE   NT STATUS CONNECTION REFU
53.  120 Chapter 9  Licensing and Upgrades    CHAPTER  TEN    FREQUENTLY ASKED QUESTIONS    10 1 Firefox freezes randomly on some pages    This seams to be caused by the java plugin  and deactivating this plugin fixes the issue  This has no effect on SPV  since it does not use java  To disable the Java plugin  enter the Tools     Add ons  This will open a new window  with a button bar on top  with a Plugins icon  Select it  and it will open the list of all currently installed plugins     Locate your java plugin  that 15 the one that handles java applets  on the following screenshot it s titled IcedTea  NPR Web Browser Plugin  but it may also appear under the name OpenSDK  or merely Java   Once located  select  it and click on the Disable button  You should then restart firefox     Note  This should not appear anymore since release 2 10  Flash plugin is not required anymore     IcedTea NPR Web Browser Plugin  using IcedTea6 1 8 1  6b18 1 8 1 Oubuntul    5       IcedTea NPR Web Browser Plugin  using IcedTea6 1 8 1  6b15 1 8 1   ubuntul   execute     ava applets     Disable         a  Shockwave Flash 10 1                 Find Updates    Figure 10 1  The Add ons pop up window of Firefox    10 2 Aggregate level changes when browsing from tables to charts    The aggregate level for tables is chosen to display a synthetic view on data  while the charts choose the aggregate  level in order to have enough points to plot  So  this is not an error if the aggregate level changes from one pag
54.  16 00 More     yyyy mm dd      MM yyyy mm dd Het       Application   Samba     5 Search    Application performance    Info Query begin  2010 06 07 14 00 00 402 00   ggregate Level  1205  Query end  2010 06 07 16 00 00402 00    14 00 00   15 58 00        DIT 121 30 us      SRT 209 87 us  100 ms   9        189 54 ms          1416 14 30 14 46 15 00 1516 15 30 1546  14 00 00   15 58 00         Transactions 139 399  30     m Cee mnn Fn   1416 14 30 1446 15 00 1516 15 30 1546        EE   m A         00 M 14 30      1500 1530   eakdown      server Breakdown by zone  client   Breakdown by server Breakdown by zone  client            Sales  fallback   192 168 20 9            R amp D           T T T T T    T T T 1 T T T T T T T T T 1  20 40 60 80 100 120 140 160 180 200 20 40 60 80 100 120 140 160 180 200                                                    Figure 8 35  Peak of RTT in Application Dashboard    c   Conversations 7 Performance and analysis of individual conversations    Start after  P 2010 06 07 12 00 Start before    2010 06 07 18 00 More     yyyy mm dd HH MM yyyy mm dd HH  MM  Client Zone 7 VLAN Sales      Server Zone P SRV FileServer     Client Ip    ServerIP    192 168 20 9  Both client and server IP     Application Samba CIFS Protocol  Any z   Search  Info Query begin  2010 06 07 12 00 00  02 00 Aggregate Level  9005  Query end  2010 06 07 18 00 00 02 00 Number of collected results  6       Client IP  Server Zone   Server IP Application Traffic Packets   Handshake EURT 
55.  17 21 19 05 521      Duration    Status         Re Spore       Flags       Client       Elements    Time line  Client DTT  SRT  Server DTT   00 12600 ms700 mi800 ms900     1   1 1    ser 7208                        9    Ez s   2                i i E    GET 204       4424 44 44444444 2           g           You can also display the details of a single transaction by clicking on it  This will show a summary of the HTTP  query and the response  in addition to the headers and an excerpt of the payload     2 7 SQL Analysis    In the Protocols section  the set of pages for SQL performance allows you to analyze the SQL traffic  It shows  you the queries with the usual metrics  responsiveness  payload size  SQL errors  etc  from the following database  systems  SQL Server  PostgreSQL  Oracle Database or MySQL     The poller should be able to decode the protocols from the following database systems     SQL The poller should be able to decode the Tabular Data Stream  TDS  protocol from version 7 0 to 7 4  Server   which corresponds to SQL Server 2000 to SQL Server 2012   Post  Only the protocol 3 0 is supported which is implemented in PostgreSQL 7 4 and later     greSQL   MySQL   The protocol v10 is supported which is implemented by MySQL 3 21 0 and later    Oracle   Oracle database uses the Transparent Network Substrate protocol  TNS   Since this protocol is  proprietary and almost no technical specification 18 available  the decoding is best effort  It has  mainly been tested on Ora
56.  172 16 8 26 12 2MIB 660 3 25 46ms 3 15 146ms    G 172 16 8 29 66 5Mi5 2753 Sima rome 146m 412mx  e    172 16 8 24 13 4min 193  3780ms Some 17           145mx        172 16 8 22             1614                      104mxs         e     172 16 8 32 6n2 3K in 774 165 ms 19m 147 mx 70m  5    172 16 8 28 25 B0Kkin 148m   Amer 149me   Ime  e     172 16 8 23 105 5K in 15    56m ime 100m    Figure 8 13  Breakdown by client      EURT breakdown by client zone  so that you can compare the performance offered to different client zone  from that server       Comparison with other applications provided by that server  so that you can identify whether a peak of  transactions on another application is impacting the performance of that application  and see the volume of  data  transactions and performance metrics for all applications provided by this server      Application End User Response Time    Inf        aqui 168 08 21                           wads           2 1   smena  o       3  Im    m            4                                z      LI    Server Overall Load     ton    rre                        5       2             Breakdown by client zone Server Applicetions Overview  apas  plica Thetneibers             oun 7 ore        rr E                   Lees     2   ae            19  2                              Mi LI       n   i     2                  m    T T       Bow Boe Bow    Figure 8 14  Server   Application Dashboard    8 4 4 Interactions    Dashboard have been developed so 
57.  20   a    wo 2m     a    wwo 2m 01                              mo        a    INTO 2    71         INTO 2tms     a         2tm           went pro 2  71   su Q mar mo 2m 71         marmo 2im     sa      mermo 207            Figure 2 9  The queries that have the highest SRT measure     2 7 3 Queries    You can also browse the queries over time           save                 sat Query OTT spoweDTT         Oracle SELECT        ams  Oracle SELEC   sas 71 2  n  Oracle SELEC FROM   xas     m  Oracle SELECT sss    ims  Oracle            FROM   3 01       Oracle seLect m        71 ams   17220 Oracle INSERT INTO SELECT 5           p   17229 Oracle SELECT DISTIMCT   FROM           71 ms  229 SELECT 39 1 Tm    Onde SELECT FROM        71 199m     Oracle SELECT FROM        264980          D              Oracle            29905    ims  Oracle saec     3995 7  2018    Oracle sun FROM           5                 zs 71         Oracle SELEC 2               17220 Oracle UPDATE ser                    Oracle SELECT DISTINCT   FROM        71 62m     Oracle INSERT INTO    ims            Ims  Oracle          Lus as    75208       Oracle SELECT           FROM 2960    15m    Oracle SELECT        FROM 2099 71 Sm  Orie SELECT m   c      m 3655 71       Oracle INSERT INTO    SeLect     Oracle SELECT FROM xos            Oracle SELECT DISTINCT FROM        71 3m    Oracle                           30m    Oracle INSERT INTO  NVES            Se   Oracle INSERT INTO UES    1609    Once INSERT INTO NUES  te   
58.  254 R amp D 44 6 0        pypi mirrors rd securactive lan rd secur  AAAA NXDomain  192 168 10 254 R amp D 44 8 1 KiB mail google com 17ms    NoError    192 168 10 5 R amp D 42 7 2 KiB eque  e Unknown DNS type 0 NoError   192 168 80 255 Private  fallback  36  32KiB WORKGROUP NB na       Figure 8 16  PCAP column in DNS messages         Callee Callee Zone   Application MOS   Packet loss Server sign  traffic  Voice traffic   Code   Last Call State Pcap  aaln 1  172 25 51 150  Private  fallback     NC udp 1 05   3 1 KiB 1 2 MiB 200 closed         aaln 1  172 25 51 150  na m NC udp 0 00   989 Bytes Bytes 200 closed     unknown Internet W NC udp 0 19   6 9 KiB 2 3 MiB 200 closed     aaln 1  172 25 51 150  Private  fallback     NC udp 0 00   3 1 KiB 1005 8 KiB 200 closed    aaln 1  172 25 51 150  Private  fallback  m NC udp 5 11   2 6 KiB 241 6 KiB 200 closed we  aaln 1  172 25 51 150  Private  fallback     NC udp 0 00   3 0 KiB 267 0 KiB 200 closed            1  172 25 51 150  Private  fallback  B NC udp 0 00 96 3 0 KiB 891 4 KiB 200 closed     aaln 1  172 25 51 150  Private  fallback  W NC udp 0 00   2 6 KiB 195 0 KiB 200 closed    aaln 1  172 25 51 139  Private  fallback  B NC udp 0 00   6 3 KiB 250 closed                    10 172 25 51 150 Private  fallback  m NCud 0 00 96 3 4 KiB 515 5 KiB 200 closed       Figure 8 17  PCAP in VOIP details    For instance  if you are using Wireshark to decrypt the packets  you can directly view the packets     To view the query and the beginni
59.  3 steps       Connect to Pulsar  see Pulsar     2  Enter the command to launch the trace  for example  tcpdump_tofile  i   interface   host   lt HOSt              3  Enter Cont ro14C to stop the trace     Use the tcpdump command instead of tcpdump  tofile to display the results of real time packet capture     Note      you can access a help by entering help tcpdump_tofile        you can refer to tcpdump command  http   www tcpdump org   Please  have a look at the online manual   http   www tcpdump org tcpdump  man html          all parameters are availiable except the    w     Accessing the tracefile    To access the PCAP file generated by the tcpdump  tofile command  you should connect to the probe via  FTP  using a FTP client and the Pulsar admin user  see Pulsar      8 6 3 Automated Packet Capture   AutoPCAP      Principles  Performance Vision can capture packets automatically  in case abnormal values are observed on critical servers     These packets are presented for later analysis as PCAP files  which can be downloaded through the web graphical  interface at the conversation level     92 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    Applications    These files are presented in the following views     Conversations      DNS messages    VOIP details    In each of these views  a column at the right end of the table indicates PCAP  a small icon indicates that packets  have been captured for a given conversation or not  If the PCAP fil
60.  Ethernet Type  Address or netmask  Address or netmask  Address or netmask  MAC address  MAC address  MAC address  String   Decimal or hexa   Byte quantity  Zone name   Zone name   Zone name    145    PV   User Guide Documentation  Release 3 3    13 2 8 Non IP    Operand Type    app   bandw  bandw clt  bandw srv  capture begin  capture end  device  evh proto   mac  mac   mac   IU                                 Count             010011          Pkt count  Srv  poller name  proto  protostack  vlan  VoIp Te EE  zone    cit  Sry    cit  zone srv    zone     13 2 9 VolP    Total traffic   Traffic from client to server   Traffic from server to client  Capture begin time   Capture end time   Ethernet Protocol   Client or Server MAC address  Client MAC  physical  address  Server MAC  physical  address  Client MTU  Maximum Transmission Unit   Server MTU  Maximum Transmission Unit   Number of IP packets   Number of packets sent from client  Number of packets sent from server  Poller name  distributed probe   Protocol   Protocols stack   Tagged Link  802 1Q    Total traffic in both directions  Server or Client Zone   Zone of the client IP   Zone of the server IP    Application name  Byte quantity  Byte quantity  Byte quantity  Date and time  Date and time  Decimal or hexa   Ethernet Type  MAC address  MAC address  MAC address  Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   String   Wildcard or regex  Decimal or hexa   Byte quantity  Zone name 
61.  Hardware type  Ethernet Adapter  Adapter type  Flexible  Network Connecbon       Network  Connect at power       Yes          Figure 6 25  Ready to Complete    n Interface    APS  source  local   4 885 2 H BHB  bB   BOB    Hu   41 U4Kib 23 Y  Bubp    Press g to enable graphical statistics  1 to enable detailed statistics       Press d t      prev interface  v next interface   lt   prev node    gt  next node    help    Figure 6 26  Command              displays the traffic per interface     How to use the product     The Performance Vision Virtual Appliance is shipped with a default configuration that will likely not match your  site very closely  For a better experience it is recommended that you spend some time configuring some additional  zones and applications to suit your traffic     Here are the sections you should consult  in order     User Management for adding new users    Zone configuration for adding new zones or modifying the preset configuration    Application configuration for registering your specific applications    Business Critical Applications and or bcn  config to define your business critical applications links     Reports to schedule periodic reports that will be sent via email     Eventualy  read the Use The PV Graphical Interface then Interpreting the results and you will see your network  differently     62    Chapter 6  Virtual Appliance Step by Step                    SEVEN    CONFIGURATION    7 1 Hardware    The first thing to do 15 to plug a scree
62.  List    The SPV sniffer decodes the different protocol levels  as described in the Glossary  Protocol Stack    You can use them to filter the captured flows or to define applications     Here the comprehensive list of them  with an example of a common use case     Protostack    ARP Address Resolution Protocol Ethernet ARP   BGP Border Gateway Protocol Ethernet BGP   Bittorrent Peer to peer file sharing Ethernet IPv4 TCP Bittorent  CIFS Microsoft Common Internet File System Ethernet IPv4 TCP Netbios CIFS  Citrix  BETA  Citrix Remote Desktop Ethernet IPv4 TCP Citrix  DHCP Dynamic Host Configuration Protocol Ethernet IPv4 UDP DHCP  DNS Domain Name System Ethernet IPv4 UDP DNS  ERSPAN Cisco Encapsulated Remote Switched Port Analyzer Ethernet Ipv4 GRE ERSPAN      Ethernet Ethernet Protocol  Certainly the first protocol of the stack   Ethernet       FCoE Fibre Channel over Ethernet Ethernet FCoE       FTP File Transfer Protocol Ethernet IPv4 TCP FTP  Gnutella Peer to peer file sharing Ethernet IPv4 UDP Gnutella  GRE Generic Routing Encapsulation  tunneling  Ethernet IPv4 GRE       HTTP Hypertext Transfer Protocol Ethernet IPv4 TCP TLS HTTP  ICMP Internet Control Message Protocol Ethernet IPv4 ICMP   ICMPv6 Internet Control Message Protocol for IPv6 Ethernet IPv6 ICMPv6    Continued on next page       154 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 9     continued from previous page  IMAP Internet Message Access Protocol Ethernet IPv4 TCP IMAP    
63.  OVF template                               Annuler             Figure 6 2  Find the Performance Vision OVA file  and Click on    Open        The system detects the space available on the disk for the new Virtual Machine  we recommend to allocate the  following spaces       Trial Virtual Appliance  4GB RAM  2 vCPU    2 0 GHz    Production       Virtual Poller  8 GB  2 vCPU    2 0 GHz      Virtual Appliance     16 GB  4 vCPU    2 4 GHz  The Virtual Appliance gets installed     You get notified when the installation is complete     6 3 1 Get it Started    Once the Virtual Appliance is installed  you have to start it     6 3 2 Access the virtual console    The probe is launched  When the network interfaces turn into promiscuous mode  click on the Console view and  then    Enter    to display the login prompt     Note  Clicking on the black screen deactivates your mouse  To reactivate it  you can use the key combination  Ciel   ALD    To know how to login and how works the command line interface  please see Pulsar  With Pulsar you can  configure your keyboard  your timezone and the system like IP  DNS  NTP       54 Chapter 6  Virtual Appliance Step by Step    PV   User Guide Documentation  Release 3 3       e Deploy OVF Template   EN    Deploy from a fle or URL                                        Enter a URL to download and instal the OVF package from the Internet  or  specfy a locaton accessble from your computer  such as a local hard drve  a  network share  or               
64.  Server context    In this matrix  we are presented with a different view of the metrics  Here  we can observe in the red cell that all of  the communications initiated from machines in the Remote zone to the machines in zone Internet accounted  for 12 9GiB  total for both direction   Meanwhile  in the blue cell  the communications initiated by machines  from zone Internet to those in the zone Remote accounted for 52 5           2 9  Matrix 21    PV   User Guide Documentation  Release 3 3    2 10 Top Reports    You can easily get the top clients  servers  applications for any traffic  all or a specific application  zone  etc    You can sort each top on the most adequate criteria  volume  sessions  SYNS  etc      This view can be accessed through Monitoring   Top Reports     2 11 DNS Performance    Performance Vision provides an in depth view of name resolution events and performance  for DNS  Netbios   mDNS  etc   When troubleshooting  this view can display       The evolution of the DNS activity  an excessive peak may reveal a misconfiguration   infection        DNS Performance Chart    Begin 201203211324   End 20120321 19 24                 Emitting zone Server Zone Emitting      Server IP  Request Name Request Type  Response   Al x  Al x Any x  Ay                                        Device id Poller  Any   Any                              Info Begin  2012 03 21 13 15 Aggregate Level  15 minutes  End  2012 03 21 19 15    250 0 ms  200 0 ms  150 0 ms  100 0 ms  50 0 ms   
65.  a image from the Internet from      You should reach a subscription page with a form that needs to be filled such as below     Download a trial Virtual Appliance                       MaCompagny    Netherlands     Envoyer          Then complete the Captcha and submit such as below     D SecurActive    Performance Vision  Welcome to SecurActive Virtual Appliance downloads              Your request has been forwarded to SecurActive     Regards   SecurActive s team       If your request is granted  you ll receive 2 emails from Performance Vision    First email subject  Performance Vision Evaluation   Documentation   Second email subject  Performance Vision   Download of your evaluation Virtual Appliance  From that second  click on the Download Link which will lead you to a page such as below    You will need to Download this file     6 2 Virtual Appliance Specifications    The Performance Vision Virtual Appliance is designed to run in a VMWare ESX v4 or v5 environment     It is designed to run with a minimum RAM of 4096MB  although a larger quantity is recommended to ensure  satisfactory performance rates  Here are the configurations which are validated     RAM  4GB to 192GB            1 to 8 of 2 9GHZ    53    PV   User Guide Documentation  Release 3 3    Performance Vision Download    Thank you for testing               r       6 3 Installation             Figure 6 1  Connect to your Vsphere Client    In the Virtual Machines tab  in the    File    menu  select    Deploy a new
66.  a server   IP of the netflow capture   IP which replied to a connection demand  Client or Server MAC address   Client MAC  physical  address   Server MAC  physical  address   Client MTU  Maximum Transmission Unit   Server MTU  Maximum Transmission Unit   Client or Server Operating System   Client Operating System   Server Operating System   Total payload   Payload from client to server   Number of IP packets with a payload  Number of packets with payload sent from client  Number of packets with a payload sent from server  Total retransmission payload   Retransmission payload from client to server  Retransmission payload from server to client  Payload from server to client   Number of IP packets   Number of packets sent from client   Number of packets sent from server    Decimal or hexa   Decimal or hexa   Decimal or hexa   Application name  Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Date and time  Date and time  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa     Duration   Duration   Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration   Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   Ethernet Type  Duration   Decimal or hexa   Decimal or hexa   Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  Address or netmask  MAC address   MAC address   MAC address  Decimal or hexa   Decimal or hexa   OS name   OS name   OS name   Byte quantity   Byte quantity  Decimal or hexa   Decimal or h
67.  a standard TCP session   v1 3    Figure 10 2  Standard TCP Session    1 https   github com securactive    10 10  How comes my VM keeps losing sync  123    PV   User Guide Documentation  Release 3 3    124 Chapter 10  Frequently Asked Questions    CHAPTER  ELEVEN    KNOWN ISSUES    11 1 Configuration               application is defined with both a webpattern and a client or server zone then all conversations matching  this webpattern but not the zone will belongs to NC         even if it should belongs to another application  according to the TCP ports     Note  This webpattern issue is fixed since release 2 10     11 2 Interface      There is no error message when a login attempt fails      Sometimes where plotting data for the last hour  the chart ends with a zero value        n the charts  when a high value is immediately followed by a zero value then the smooth interpolation  algorithm makes it go underneath the 0 line just after the 0 value     Note  This chart issue is fixed since release 2 10       When another language than English is requested some buttons are labelled in English nonetheless     11 3 Various      SMTP delivery of reports lack retries     There is no procedure to delete oldest data whenever the data disks become full       Configuration dump restore don t work across version boundary     Note  Since release 2 11  you cannot restore a incompatible configuration anymore     11 4 Sniffer         n case of IP fragmentation  the timestamps of involved pac
68.  about Performance     32 Chapter 3  Main terms and concepts    PV   User Guide Documentation  Release 3 3       Source Destination is relevant when we are speaking about Usage     3 5 3 Top Down Analysis    The Src Dst matrix can be the starting point for a fine tuning analysis of traffic  bandwidth and conversation  In  each cell  there are two buttons     e one to display the bandwidth graph from zone    to zone B      one to display the conversations from zone    to zone B     Bandwidth Graph        View conversation    Figure 3 8  Cell detailed view    The first link will open the conversation table and will display all the traffic between the two zones  whereas the  second one will display a bandwidth chart from the source zone on the left and the destination zone on the top     3 6 Data Aggregation    3 6 1 Rationale    By nature  the operations of statistical analysis performed require the storage of large amounts of data  Further   more  that data must be stored over extended lengths of time so as to expose overall trends  In order to minimize  storage space while still making it possible to reveal trends over weeks or months  Performance Vision automati   cally summarizes the collected data  The process of creating these summaries is called aggregation     3 6 2 Process    Aggregation occurs automatically  Whenever your probe displays a chart or a table  this is based on already  aggregated data  In order to display this  Performance Vision first decides on an aggre
69.  between pollers  i e  a network flow captured by two pollers will  counted twice in reports that merge data from several pollers      But you can filter the data for each poller         f there is some load balancing at the packet level  and not at the session level  and two pollers view two  different parts of the traffic  the collector will not be able to rebuild this flow and no performance metric  will be available in this case         The positioning of each poller with regards to client and server will have some impact on some metrics   SRT  RTT Server  RTT Client  RR Server  RR Client            The maximum number of sessions handled by the collector remains unchanged                 100   concurring  sessions      5 5 6 Prerequisites      All pollers have to be synchronized to a single NTP     All pollers and collector require an administration port connected to the network and a fixed IP address      Connectivity between pollers and collector on port         22 is required     e Some network capacity is required to transfer teh data from the pollers to the collector  current evaluation  is 0 2  of the bandwidth analyzed      5 5 7 Adequate   non adequate implementations    2 5    Two Distributed may   Most applications will be deployed in normal conditions on DCa  if in   data centers or may not be normal conditions DCb  receives no production traffic  hence a second    Active   required  probe may not required  if applications are  in normal conditions    passive  
70.  by the exchange of the 3 way TCP handshake  CT stands for Connection  Time  CT is defined as the duration of the three way handshake  SYN  SYN ACK  ACK  of TCP session     Conversation Regroups network exchanges between two network addresses for one application during the ob   servation period     conversation is defined as a group of flows between a client and a server over an  observation period     Data Transfer Time  DTT  Time spent by the client or the server to send data  The DTT stands for Data  Transfer Time  DTT server is defined as the time between the first data packet  with ACK flag and a non  null payload  from the server and the last packet considered as part of the same answer  DTT client is the  symmetric metric in opposite direction  Packets are considered part of the same answer if packet share the  same acknowledgment number   FIN  RST from server or client  A Timeout will cancel a DTT  Note that if  the answer is small enough to be contained in only one packet       DTT will be of    0        Delta sessions Number of session established minus those closed  Delta Session is a metric defined as the  difference of the number of opened session to the number of closed session  Negative value means that  more session were closed than opened     Device Identifier Identifies the physical network adapter that received the network traffic associated to a conver   sation     DiffServ Code Point  DSCP  6 bits value taken from the TOS field of IP header  used in some 
71.  directly in your mailboxor via FTP at the frequency you prefer     Configuration    In the first step  you start by creating a template that will mainly define the name of the report  the list of recipients   a description and the scheduling settings  In the second step you just have to add the different views you want to  see to the appropriate template  Then you re done  just check your mailbox     To create a report template  in the Configuration area  select Reports in the menu list on the left  This will  display the list of existing report templates  Use the button Create to create a new report template  Please note  that this feature is only available for users with administration rights     To create a report template you must fill some information     The name of the report for easy identification purpose     The full description of this report which will be copied in the PDF file generated       The language option defines the language that will be used for this reports  thus the language for the report  can be different than the language of the web screen        The list of recipients defines the email addresses to which the reports will be sent  the recipients email  addresses can be separated by a comma  a semi colon or a new line         Scheduling settings define the frequency at which the reports will be sent  Available options                Day  Generates the report every x day s   example  every two days     74 Chapter 7  Configuration    PV   User Guide D
72.  hexa   volp traffio Voice total traffic Byte quantity  voip traffic sign Signalization total traffic Byte quantity  zone Server or Client Zone Zone name  zone olt Zone of the client IP Zone name  zone srv Zone of the server IP Zone name       Type definitions    13 2 10 Address or netmask  This can be either a complete IPv4 or IPv6 address  or it can also be an IP address completed with wildcards  patterns    to form a netmask   Operators             Example of valid inputs  192 168       192 168 5 10    Example of invalid inputs  192 524 1 1    13 2 11 Application name    This value must be a valid application name  enclosed between quotes   Operators            Example of valid inputs  http       Example of invalid inputs  unknown  app    13 2 12 Byte quantity    This value indicates a quantity of bytes withits unit  Note that there s no space between the quantity and the unit   Operators        lt    lt      gt   gt      Example of valid inputs  42    4KB  4KiB  56MiB      Example of invalid inputs  4 KiB    148 000 Chapter 18  Appendix    PV   User Guide Documentation  Release 3 3    13 2 13 DNS Type    A DNS type value  either numeric or symbolic   Operators            Example of valid inputs  4  A  MX      Example of invalid inputs  1223648  FOO    13 2 14 DNS class    A DNS class  either numeric or symbolic   Operators            Example of valid inputs  1  IN      Example of invalid inputs  A  MX    13 2 15 DNS result    A DNS result code  either numeric or symbolic 
73.  in their Ethernet header   SPV also accepts both IPv4 and IPv6 protocols     Note  Non Ethernet flows are invisible for the SPV solution     5 3 1 Non IP Protocols    If the Ethernet protocol is not an IP protocol  it will appear in Non      submenu       those data will not appear  elsewhere     Hon IP  E      Volume non IP       Figure 5 2  Non IP protocols menu    53  Supported Protocols 04    PV   User Guide Documentation  Release 3 3    Protocol       Figure 5 3  Level 3 4 protocol filter    5 3 2 IP Protocols    Ipv4 and IPv6 are both captured and splitted in four Level 3 4 protocols  TCP  UDP  ICMP and OtherIP     Some of those data are duplicated in other specialised categories  Web  VoIP  DNS to display more specific metrics     Begin 2011 09 07 10 00        2011 09 07 11 00 Q    o 9  Emitting zone Server Zone Emitting      Server IP Request Type   All   All                         Device id Poller    Any      Info Begin  2011 09 07 3Q 00 Aggregate Level  2 minutes  End  2011 09 07 11 Number of collected results  100    12345       Begin Time   End Time Request Name Packets v  Traffic DNS rt  2011 09 07 10 38 31 2011 09 07 10 43 32  pypi rd securactive lan 1712 198 5 KiB  2011 09 07 10 38 31 2011 09 07 10 43 32  pypi mirrors rd securactive lan 596 73 8 KiB  2011 09 07 10 00 50 2011 09 07 10 59 47 N 570 100 9 KiB 1  2011 09 07 10 00 21 2011 09 07 10 59 23  mail google com 120 18 3 KiB 27 ms  2011 09 07 10 00 23 2011 09 07 10 58 37  reviewboard rd securactive lan 112 
74.  minutes  End  2013 03 18 15 07 Number of collected results  3  1 2013 03 18 14 07   Network thresholds over time   2013 03 18 15 07   Traffic Y 1 Bandwidth   Private Local R amp D  gt   Intemet               mE                          o       mE                           925         210 5 Kib s                           BEERS rns cC          Figure 13 13  BCN on PerformanceVision               Service    Status    LastCheck     Duration    attempt      BCA IMAPs OK 2013 03 18 15 06 02 0d 1h 1m 225   BCA MyApplication       2013 03 18 15 06 02 Od 11 1   222 1 4                  5            2013 03 18 15 06 02 04 1h 1   225 1 4   BCA SSH         2013 03 18 15 06 02      1h 1m22s 14                  O       2013 03 18 15 08 02 040 33m 225 44          http       2013 03 18 15 06 02      11 1   225 1 4    BCA nts O         15 06 02 0d oh 10m 22s  BCN RetDVersinternet      2013 03 18 15 08 02 04 Oh 1m 56s   OKI 2013 03 18 15 06 02 04 Oh 2m 565  DRE 2013 03 18 15 06 02 0d Oh 2m 565  OK 2013 03 18 15 06 02 Od 1h 14m 215          BCN VOIP  PING    ttempt Status Information  14 Ok    4 4  3 4  1 4  1 4  1 4       9         Ok  Ok  Alert  Ok  Alert  Alert    Ok  Ok  PING OK   Packet loss   0   RTA   2 06 ms       Figure 13 14  BCA and BCN check on Nagios    13 2 Custom Filters    13 2 1 Client Server    138    Chapter 13     Appendix    PV   User Guide Documentation  Release 3 3    Operand Type    Owin  Owitn count clt  Owin count srv  app   bandw  bandw clt  bandw srv  begin  captur
75.  not a slow server     To begin diagnosis  go to    Monitoring      gt     Clt Srv Table   Select the application server from the drop down  box labled  Server Zone  and click  Search         f we see that all applications on the server are responding slowly i e  the SRT values are high for both   Salesforce  and               the issue related to the server  not to applications        Second  check the Connection Time of the application server  If the connection times are high then this may  also indicate a slow server     104 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3      Third  check for retransmissions between the clients and the application server  If there are a lot of retrans   missions then either the application server or a network device in between are dropping packets  Go to     Monitoring    gt     Performance Over Time chart   Select the application server    Salesforce    from the  drop down box labled    Server Zone  and click    Search        14 00 00   15 58 00     RTTin  avg  151 39 ms  300 00 ms 1   RTT out  avg  301 50 us    RD indic in  avg  8 96 ms  1 MS    RD indic out  avg  101 75       200 00 ms              avg  109 16 ms       14 16 14 30 14 46 15 00 15 16 15 30 15 46    14 00 00   15 58 00    RR out  avg  0 08  e RRin  avg  1 89       14 16 14 30 14 46 15 00 15 16 15 30 15 46    14 00 00   15 58 00       Figure 8 38  Slow server  Performance Over Time chart    Here we see that there is a high Retransmission R
76.  on the icons associated to a specific period of time  the quick links will used this specific period time  when redirecting you to a detailed screen  You will always see up to date information with the auto refresh feature  of the BCN dashboard  The information will be automatically refreshed based on the data aggregation level  see  aggregation period   For example if the    Aggregate level  is    2 minutes   the BCN will be updated every two  minutes  if the    Aggregate level  is    15 minutes   the BCN will be updated every fifteen minutes     8 3 VoIP Module    A specific reporting for Voice over IP traffic is provided  The aim of this module is to show the volume and quality  of service associated with VoIP flows     8 3 1 Supported protocols    These VoIP protocols are supported      SLP FRICP ARIP      MGCP A RICP   RIP  e SKINNY FRICP RIP  For more information  please consult the corresponding RFCs   e SIP as defined in RFC 3261  http   tools ietf org html rfc3261 html       MGCP as defined             3435  http   tools ietf org html rfc3435 html     e RTP as defined in to        3550  http   tools ietf org html rfc3550 html  and        3551   http   tools ietf org html rfc3551 html     e RTCP as defined in RFC 3605  http   tools ietf org html rfc3605 html     8 3 2 Basics of VolP    Voice Over IP relies on three protocols to operate over IP networks     e Signalization protocol  the role of this protocol is to establish and control the voice communications  It  us
77.  processes on the probe       Those events are raised in a new information page in the Configuration menu       Error events are reported in a status bar  available for the administrator group     Configuration of the data merging  over time  data lose precision  The loss levels are now configurable  You  can choose to not merge at all     What   s New in 2 13     Pulsar  The command                  allows to set the MTU of each poller    GUI  Shows that an upgrade is incoming with the install logs  no more white screen    Upgrade  Upgrade logs now have their own file   var log nova install log   BCN workflow       Added a performance chart displaying oriented RTT  DTT  RD and Retransmission rate       New Oriented Flows Details page has more information about oriented conversations       Advanced filters are now the same in the Application and in the Network menus   New Metrics displayed and filterable       Diffserv  IP header to classify the flows  displayed in both Flows Details page       MAC address  Ethernet addresses  displayed in both Flows Details pages         OS  For TCP only  the new sniffer can detect the network fingerprint of a wide range of operating  systems  Displayed in both Flows Details pages     Chapter 1  Release notes    PV   User Guide Documentation  Release 3 3    1 10 Whats New in 2 12     Metric  Add metric MTU  Max Transfer Unit  in the Source Dest Matrix and      Oriented Conversation    Zone  New zone factory settings    License  New VMware ve
78.  the Server Response Time  e g  a  DTT might be short for a long SRT       the request might require a large calculation  but the result represents a small volume of data  or a DTT  might be very large  but SRT very short because the request is easy to handle but the response 18 very large    DTT depends on  from the largest impact to the smaller        the size of the response  the more data is contains the longer it takes to transfer it        the level of retransmission  the more packets are retransmitted  the longer it will take to transfer the whole  response        the network latency  the longer it take to transfer packets through the network  the longer it will be to  transfer the response   minor impact        the actual throughput which can be reached to transfer the response from the server to the client     8 7  Interpretation Guidelines 97    PV   User Guide Documentation  Release 3 3    DTT may vary  for most common to a the rarest        globally or not on a per transaction basis  if only for some transaction  it may be linked to the size of some  specific application response        for all client zones or for some only  if for some client zones only  it may be linked to specific network  conditions     retransmissions        for all servers or for some server  if for a specific server  it may be due to a specific server issue in broad   casting the response      8 7 2 Scenario guidelines    Slow site connection    Hypothesis    One or several end users compla
79.  the consequence of a crucial service  the DNS  Check  out DNS Response Time       Look at the Monitoring     Bandwidth Chart  to inspect the bandwidth variation  and the number of  TCP UDP flows as well     They might have overcome a QoS threshold  such that all the new application requests are blocked  A hint would  be the increasing number of        RST packets  To be sure  you may take dive into the Analysis   gt  TCP Errors  menu     87  Interpretation Guidelines      89    PV   User Guide Documentation  Release 3 3    Bandwidth from source to destination             begin  2010 08 25 10 30 00402 00 Aggregate Level  15 minutes  Info  Query end  2010 08 25 19 30 00 02 00    10 30 00   19 15 00   e          281 40           NC      22 67                23 84         wpn 438              412            ssh 454         icmp 0 78 Kbis     oppien 45191 bis              495 30 b s    mocp  gateway 2757808    other o       Figure 8 28  Retransmission analysis    Bandwidth from destination to source    10 30 00   1915 00          491 71           hops 9161           ssh 4377 Kbis    NC udp 2259 Kb s    ven 1374 Kbis               415 Kos  emio 176 Kbis     maps 1 60 Kbis     xop cient 085 Kbis  mgzp gatevay 389 42 bis                                      14 04 00   15 04 00       RIT in      RTT out  400 00ms 9 RD indic in    FD indic out            400 00 ms    200 00 ms                          22222222222222222222222  14 04 00   15 04 00      RRout  e RRin    14 04 00   15 04 
80.  the same page  either directly or indi   rectly  We d like it to be the first chronologically but that s not necessarily the case due to mirroring     4 2 2 From packets to HTTP messages    The sniffer receives fragments of HTTP messages  It starts to reconstruct a new HTTP message as soon as it  receives the start of a header  Some fragments of the message may be missing  though  in which case it may be  incapable of       associating a body fragment to the proper HTTP message  thus leading to erroneous payloads and dubious  chronology       saving part of content in HTTP save files  without notice        reporting the timestamp of message end     36 Chapter 4  Metrics Computation    PV   User Guide Documentation  Release 3 3    4 2 3 From individual messages to transactions    HTTP offers no better way to associate response with corresponding query than to rely on ordering  first response  of the socket with first query  and so on     So  for every socket  the sniffer stores all queries not already paired with a response  Notice that on a socket  a  proxy may mix queries of different users  and that two interconnected proxies may even mix queries to distinct  servers     Notice also how damaging a single dropped packet may be if it hides a query or a full response to the sniffer  since  all pairing following this gap will be questionable     Also  servers may not respond  leading to a timeout of the pending queries  which will be inserted in database  without any response 
81.  the server  depending on who is to blame  to gather further data on this event     8 5 3 TCP Events    This page does not focus explicitly on TCP errors but aims at giving various overall statistics about each TCP con   versation  in order first to give an accurate view of the actual traffic in term of payload and number of connections   and second to notice unexpected patterns     This page can also serve as a way to find which conversations are important relevant and thus which zone    application could be split to help distinguish more closely between significant flows     For each TCP conversation the following fields are displayed      payload    number of packets    number of handshakes    number of timeouts     number of RSTs from client       number of RSTs from server    8 5  TCP Errors   Events 91    PV   User Guide Documentation  Release 3 3       number of        from client       number of FINs from server    8 6 Packet level analysis    8 6 1 Objectives    Once you have identified the origin of an issue  you may want to analyze it further by looking at the packets  themselves  You have two ways to realize this        Manual packet capture through Pulsar s t codump command     Automated Packet Capture                           e Triggered Packet Capture from the data of a result row     8 6 2 Manual packet capture  By connecting through Pulsar  you can start a manual capture of any traffic viewed on the interface of your device   To do so  you need to go through
82.  the transaction  It can be a command 14      decimal or hexadecimal form  or a  command code inside strings     Operators             Example of valid inputs     SMB2_com_logoff     2      0        Example of invalid inputs  random text    13 2 28 SMB status    The status of the SMB transaction  It can be a status 1d 1n decimal or hexadecimal form  or a status code inside  quotes  The special values              warning  and  error  are also accepted and mean  respectively  a match on every  success  warning and error status  The special value    common    matches a set of common statuses     Operators             Example of valid inputs     SMB  status  no such file   error  0xc000000f      Example of invalid inputs  random text    13 2 29 SMB sub command    The SMB sub command associated with the command used      the transaction  It can be a sub command id in  decimal or hexadecimal form  or a sub command code inside strings     Operators             Example of valid inputs     SMB_TRANS2_open2     16      0        Example of invalid inputs  random text    13 2 30 SQL command    A single SQL command  inside quotes   Operators             Example of valid inputs    CREATE INDEX         INSERT          Example of invalid inputs    SELECT    FROM users      INSERT    13 2  CustomFilters 151    PV   User Guide Documentation  Release 3 3    13 2 31 SQL system    The name of the RDBMS dialect used in the connection  inside quotes   Operators             Example of valid inputs 
83.  through the TAP  A connection via  TAP induces additional costs     If you choose to capture network traffic through a SPAN  you should pay a specific attention not to copy twice the  same traffic to the listening interface of the probe  which would degrade the statistics provided by the probe      5 2 How to capture traffic     Performance Vision can rely on two mechanisms to capture network traffic  Port Mirroring  commonly called  SPAN   amp  TAP  Terminal Access Point      5 2 1 Port mirroring    Port mirroring  also known as SPAN or roving analysis  18 a method of monitoring network traffic which forwards  a copy of each incoming and or outgoing packet from one  or several  port s   or VLAN  of a switch to another  port where the analysis device is connected  Port mirroring can be managed locally or remotely  To configure the  port mirroring  an administrator selects one or several ports from which all packets will be copied  source ports   and another port or ports where the copy of the packets will be sent  destination port   The administrator can  include either all packets in the port mirroring or only the transmitted received packets  In case both transmitted  and received packets are included  a packet going from a Ist monitored port to another monitored port will be  copied twice to the destination port  This will have an impact on the measures and performance provided by the  analysis device  e g  retransmission rates  response times        Performance Vision ca
84.  two groups have different access permissions to the application pages  the administrators group provides  its members a full access to the    Configuration    pages  Users group members will be able to read reports but will  not have access to the configuration page     7 3  SPV Functional Configuration 67    PV   User Guide Documentation  Release 3 3           M X       cO    G  n  ral Onglets                  Applications Vie priv  e S  curit   Avance         40 Bloquer les       Certaines pages Web sont propos  es dans plusieurs langues   Choisissez les langues d affichage de ces pages dans votre ordre  44 Activer jav de preference  N  Langues par ordre de pr  f  rence     Polices et coul Francais France  fr fr    Anglais  en    Anglais Etats Unis  en us        Charger les    Langues  Choix de la laf                  Figure 7 3  Configuration of the French language in Firefox    In order to create a new user account you must be logged into the appliance as a member of the Administrator  group  As mentioned in the above paragraph  the default admin group has the right to create  modify and access  the configuration  You can add a new user account by clicking on the Users tab found on the configuration menu  on the left hand side  Then click on the Add button and fill in the  User information   username  password  and  group   Make sure the Act ive button is checked  otherwise the user won t be able to login  Thanks to this option  you will be able to disable or enable an a
85.  xm               Bee oF   Al              Figure 3 5  Client Server treatment    For example  the clt srv graphs shown above will be generated taking into account the communications     from clients in A to servers in B    from servers in B to clients in A  In short  the traffic displayed in client server conversations will take into consideration the data transfer in both    directions     Note  The appliances can only distinguish reliably clients from servers when the IP protocol in use is TCP  when  the connection establishment was successfully received by the probe  and when the connection state is sufficiently    active to not be in timeout  In all other cases  the probe assumes that the lower port is used on the server s side     Where are both being used     Src Dst will be used for all views of oriented traffic  1 e   where the reports need to show the amount of data from  one zone to another zone  Hereunder  in the first and second lines of the table  you can see that the data exchange  between the two hosts has been split into two conversations from A to B and from B to A              Source IP Destination Zone Destination IP Application Traffic      Payload   Packets    192 168 80 22 VLAN Sales  fallback  192 168 20 208    Smtp ssl 3 5MiB 3 0MiB 8389  192 168 20 208 VLAN Labo  fallback  192 168 80 22    Smtp ssl 1 2       799 8KiB 7907  192 168 20 237 VLAN R amp D 192 168 10 9    ssh 1 1MiB 771 3KiB 5294    192 168 80 22 VLAN_Sales  fallback  192 168 20 217    Smt
86. 0 254 16 Unreachable    192 168 0 253 16  192 168 0 254 16          B    10 1 2 254 24     The workstation 10 1 2 23 tries to connect  10 1223 to 192 168 1 15 on HTTP             10 1 2 23    The server refuses the connection  on port 4000 and sends back an ICMP port  Unreachable Error         ICMP Port  Unreachable       192 168 0 7    Where is the challenge with ICMP     You may be tempted to say  if it is that simple  why do we need SecurActive SPV on top of any sniffer       the  information sits in the payload  But in every network  you will find some          errors    they may be due to a  user trying to connect to a bad destination  or trying to reach a server on the wrong port  The key is in having a  global view of how many errors you have normally and currently and from where to where  The key to leveraging  ICMP information is in having a relevant view of it and understanding what it means     How can ICMP help on network diagnostic and security monitoring     From the explanation here above  we can keep in mind that by analysing ICMP errors we can identify machines  that try to connect networks or machines  that are routable from the LAN s machine or ones that try to connect  on actual servers but for services which ports are not open  Here are some examples of phenomena that can be  identified that way     Misconfigured workstation    A workstation repeats a large volume of missed attempts to connect to a limited number of servers  it may be that  this machine d
87. 00    Packets    Server IP  ication Traffic   Packets   Conn  established   Num  timeout   Client RST 7 Server RST  172 16 1 10 m PROXY 6 2MiB 10939 234 47 120 0  172 16 1 12    http private 1 0MiB 1722 25 9 74 1  proxyauto contact c    m PROXY 19 3MiB 22795 220 32 73 0  proxyauto contact c    BH PROXY 9 0MiB 15181 184 44 67 0  172 16 1 10 m PROXY 9 3MiB 14615 244 42 61 0  172 16 1 10 m PROXY 4 7MiB 8376 208 36 55 0  172 16 1 10 m PROXY 11 6MiB 15668 138 26 44 0  172 16 1 10 m PROXY 6 6     13134 348 58 43 0  172 16 1 10 m PROXY 2 6MiB 4361 99 21 43 0  172 16 1 10 m PROXY 3 0MiB 4368 81 16 38 0       Figure 8 31  Number of RST packets sent from the TCP servers    100 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3  Slow application  Hypothesis  One or several end users complain about a slow access to a specific application   a fileserver   Prerequesites    Zones have been configured to reflect the customer s network topology  The application Samba  CIFS has been    identified  The traffic to the fileserver is mirrored to one of the listening interfaces of the probe  Where to start  a  global view of the application performance     1st example       DIT          315 11           SRT  avg  470 52 ms               avg  6821        14 04 00   15 04 00    Transactions  sum  1 452            Breakdown by server Breakdown by zone  client     Info Begin  2011 04 04 14 00 00 02 00 Aggregate Level  15 minutes Info Begin  2011 04 04 14 00 00 02 00 Aggre
88. 0020039   RPC NT INVALID VERS  OPTION  0xc002003a   RPC NT NO MORE MEMBERS  0xc002003b   RPC NT NOT ALL OBJS UNEXPORTED  0xc002003c   RPC NT INTERFACE NOT FOUND  0xc002003d   RPC NT ENTRY ALREADY EXISTS  0xc002003e   RPC NT ENTRY NOT FOUND  0xc002003f   RPC NT NAME SERVICE UNAVAILABLE  0xc0020040   RPC NT INVALID NAF ID  0xc0020041   RPC NT CANNOT SUPPORT  0xc0020042   RPC NT NO CONTEXT AVAILABLE  0xc0020043   RPC NT INTERNAL ERROR  0xc0020044   RPC NT ZERO DIVIDE  0xc0020045   RPC NT ADDRESS ERROR  0xc0020046   RPC NT FP DIV ZERO  0xc0020047   RPC NT FP UNDERFLOW  0xc0020048   RPC NT FP OVERFLOW  0xc0020049   RPC NT CALL IN PROGRESS        002004     RPC NT NO MORE BINDINGS  0xc002004b   RPC NT GROUP MEMBER  NOT FOUND  0xc002004c   EPT NT CANT CREATE  0xc002004d   RPC NT INVALID OBJECT  0xc002004f   RPC NT NO INTERFACES  0xc0020050   RPC NT CALL CANCELLED        0020051   RPC NT BINDING INCOMPLETE  0xc0020052   RPC NT COMM  FAILURE  0xc0020053          NT UNSUPPORTED AUTHN LEVEL  0xc0020054   RPC NT NO PRINC NAME  0xc0020055   RPC NT NOT RPC ERROR  0xc0020057   RPC NT SEC PKG ERROR  0xc0020058   RPC NT NOT CANCELLED       174 Chapter 13  Appendix    0xc0020062  0xc0020063        0020064        0030001        0030002        0030003        0030004        0030005        0030006        0030007        0030008        0030009        003000    0xc003000b  0xc003000c  0xc0030059  0xc003005a  0xc003005b  0xc003005c  0xc003005d  0xc003005e        0030051        0030060        0030061  
89. 00205   SMB STATUS INSUFF SERVER  RESOURCES  0xc0000206   NT STATUS INVALID BUFFER  SIZE  0xc0000207   NT STATUS INVALID ADDRESS COMPONENT  0xc0000208   NT STATUS INVALID ADDRESS WILDCARD  0xc0000209   NT STATUS TOO MANY ADDRESSES  0xc000020a   NT STATUS ADDRESS ALREADY EXISTS  0xc000020b   NT STATUS ADDRESS CLOSED  0xc000020c   NT STATUS CONNECTION DISCONNECTED  0xc000020d   NT STATUS CONNECTION RESET  0xc000020e   NT STATUS TOO MANY NODES  0xc000020f   NT STATUS TRANSACTION ABORTED  0xc0000210   NT STATUS TRANSACTION TIMED OUT  0xc0000211   NT STATUS TRANSACTION NO RELEASE  0xc0000212   NT STATUS TRANSACTION NO MATCH  0xc0000213   NT STATUS TRANSACTION RESPONDED  0xc0000214   NT STATUS TRANSACTION INVALID ID  0xc0000215   NT STATUS TRANSACTION INVALID TYPE  0xc0000216   NT STATUS NOT SERVER  SESSION  0xc0000217   NT STATUS NOT CLIENT SESSION  0xc0000218   NT STATUS CANNOT LOAD REGISTRY FILE  0xc0000219   NT STATUS DEBUG ATTACH FAILED  0xc000021a   NT STATUS SYSTEM PROCESS TERMINATED  0xc000021b   NT STATUS DATA NOT ACCEPTED  0xc000021c   NT STATUS NO BROWSER  SERVERS FOUND  0xc000021d   NT STATUS VDM HARD ERROR  0xc000021e   NT STATUS DRIVER  CANCEL TIMEOUT  0xc000021f   NT STATUS REPLY MESSAGE  MISMATCH  0xc0000220   NT STATUS MAPPED ALIGNMENT  0xc0000221   NT STATUS IMAGE CHECKSUM MISMATCH  0xc0000222   NT STATUS LOST WRITEBEHIND DATA  0xc0000223   NT STATUS CLIENT SERVER PARAMETERS INVALID  0xc0000224   5     STATUS PASSWORD MUST CHANGE  0xc0000225   NT STATUS NOT FOUND 
90. 02f1   NT STATUS NO IP ADDRESSES        00002  2   NT STATUS WRONG CREDENTIAL HANDLE        0000243   NT STATUS CRYPTO SYSTEM  INVALID  0    00002 4   NT STATUS MAX REFERRALS EXCEEDED        00002 5   NT STATUS MUST BE KDC  0xc00002f6   NT STATUS STRONG  CRYPTO NOT SUPPORTED        00002  7   NT STATUS TOO MANY PRINCIPALS        0000218   NT STATUS NO PA DATA  0xc00002f9   NT STATUS PKINIT NAME MISMATCH  0xc00002fa   NT STATUS SMARTCARD LOGON REQUIRED  0xc00002fb   NT STATUS KDC INVALID REQUEST  0xc00002fc   NT STATUS KDC UNABLE TO REFER  0xc00002fd   NT STATUS KDC UNKNOWN ETYPE  0xc00002fe   NT STATUS SHUTDOWN IN PROGRESS  0xc00002ff   NT STATUS SERVER  SHUTDOWN IN PROGRESS  0xc0000300   NT STATUS NOT SUPPORTED ON SBS  0xc0000301   NT STATUS WMI GUID DISCONNECTED  0xc0000302   NT STATUS WMI ALREADY DISABLED  0xc0000303   NT STATUS WMI ALREADY ENABLED  0xc0000304   NT STATUS MFT TOO FRAGMENTED  0xc0000305   NT STATUS COPY PROTECTION FAILURE  0xc0000306   NT STATUS CSS AUTHENTICATION FAILURE  0xc0000307   NT STATUS CSS KEY NOT PRESENT  0xc0000308   NT STATUS CSS KEY NOT ESTABLISHED  0xc0000309   NT STATUS CSS SCRAMBLED SECTOR  0xc000030a   NT STATUS CSS REGION MISMATCH  0xc000030b   NT STATUS CSS RESETS EXHAUSTED  0xc0000320   NT STATUS PKINIT FAILURE  0xc0000321   NT STATUS SMARTCARD SUBSYSTEM FAILURE  0xc0000322   NT STATUS NO KERB KEY  0xc0000350   NT STATUS HOST DOWN  0xc0000351   NT STATUS UNSUPPORTED PREAUTH  0xc0000352   NT STATUS EFS ALG BLOB TOO BIG  0xc0000353   NT S
91. 064   NT STATUS NO SUCH  USER  0xc0000065   NT STATUS GROUP EXISTS  0xc0000066   NT STATUS NO SUCH  GROUP  0xc0000067   NT STATUS MEMBER      GROUP  0xc0000068   NT STATUS MEMBER  NOT IN  GROUP  0xc0000069   NT STATUS LAST ADMIN  0xc000006a   SMB STATUS WRONG PASSWORD  0xc000006b   NT STATUS ILL FORMED PASSWORD  0xc000006c   NT STATUS PASSWORD RESTRICTION  0xc000006d   SMB STATUS LOGON FAILURE  0xc000006e   NT STATUS ACCOUNT RESTRICTION  0xc000006f   SMB STATUS INVALID LOGON HOURS  0xc0000070   SMB STATUS INVALID WORKSTATION  0xc0000071   SMB STATUS PASSWORD EXPIRED  0xc0000072   SMB STATUS ACCOUNT DISABLED  0xc0000074   NT STATUS TOO MANY LUIDS REQUESTED  0xc0000075   NT STATUS LUIDS EXHAUSTED  0xc0000076   NT STATUS INVALID SUB  AUTHORITY  0xc0000077   NT STATUS INVALID ACL  0xc0000078   NT STATUS INVALID SID  0xc0000079   NT STATUS INVALID SECURITY DESCR  0xc000007a   NT STATUS PROCEDURE NOT FOUND                162 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity        0xc000007b  0xc000007c        0000074  0xc000007e  0xc000007f        0000080        0000081        0000082        0000093        0000084        0000095        0000086        0000087        0000088        0000089        000008          0000085        000009          0000084        000008          0000081        0000090        0000091        0000092        0000093        0000094        0000095        0000096        0000097
92. 0KiB 2 533ms 332ms 200ms       172162134 OBytes            T T T T T T T 1  200 400 600 800 10001 2001 4001 600    Bzr                     Figure 8 33  Peak in server response time  Application EURT    8 7  Interpretation Guidelines 101    PV   User Guide Documentation  Release 3 3    By clicking on that zone  we can see this client zone application dashboard     From this  you can conclude that only one client  2 user  was impacted  This issue was definitely due to a slow  response of the server  it may be due to an application issue or a request which is specifically hard to respond to     2nd example    d Application dash board     Applications behavior ana lysis    art after     2010 06 07 08 52 Start before  7 2010 06 08 11 34  HH MM  mm dd HH  MM    lication Samba CIFS Search    Application performance    Query begin  2010 06 07 08 00 00402 00A ggregate Level  7200  Info  Query end  2010 06 08 10  L    00 00402 00          18 00 Jun 08    06 00   eakdown by server Breakdown by zone  client     Breakdown by server Breakdown by zone  client              Figure 8 34  Peak in server response time  Application dashboard    Application Dashboard for a relevant period in the past  48 hours for example      This dashboard shows in the upper part the evolution of the End User Response Time  EURT  through time for  this fileserver       We can easily observe that the quality of experience of users accessing to this application got much worse  yesterday afternoon       We can easi
93. 0xc0000172  0xc0000173  0xc0000174  0xc0000175  0xc0000176  0xc0000177  0xc0000178  0xc000017a  0xc000017b  0xc000017c  0xc00001 7d  0xc000017e        0000171        0000180        0000181  0xc0000182  0xc0000183  0xc0000184  0xc0000185        0000186        0000187        0000188        0000189  0xc000018a  0xc000018b  0xc000018c        0000184  0xc000018e  Oxc000018f  0xc0000190  0xc0000191       13 6  CIFS Status Categories    NT STATUS SECRET TOO LONG   NT  STATUS INTERNAL DB ERROR   NT STATUS FULLSCREEN MODE   NT STATUS TOO MANY CONTEXT IDS   NT STATUS LOGON TYPE NOT GRANTED  NT  STATUS  NOT REGISTRY  FILE   NT STATUS NT CROSS ENCRYPTION REQUIRED  NT STATUS DOMAIN            CONFIG ERROR  NT  STATUS      MISSING MEMBER   NT  STATUS ILL FORMED SERVICE ENTRY  NT STATUS ILLEGAL CHARACTER   NT  STATUS UNMAPPABLE CHARACTER   NT STATUS UNDEFINED CHARACTER   NT STATUS FLOPPY VOLUME   NT  STATUS FLOPPY ID MARK NOT FOUND  NT STATUS FLOPPY WRONG CYLINDER   NT STATUS FLOPPY UNKNOWN ERROR   NT  STATUS FLOPPY BAD REGISTERS   NT  STATUS  DISK RECALIBRATE FAILED   NT  STATUS  DISK OPERATION FAILED   NT  STATUS  DISK RESET FAILED   NT STATUS SHARED IRQ BUSY   NT STATUS FT ORPHANING   NT STATUS BIOS FAILED TO CONNECT INTERRUPT  NT  STATUS PARTITION FAILURE   NT  STATUS INVALID BLOCK LENGTH   NT  STATUS  DEVICE NOT PARTITIONED   NT STATUS UNABLE TO LOCK MEDIA   NT  STATUS UNABLE TO UNLOAD MEDIA   NT STATUS EOM OVERFLOW   NT STATUS NO MEDIA   NT STATUS NO SUCH MEMBER   NT  STATUS INVALID M
94. 1 09 07 08 15   2011 09 07 18 15     Callee Packet loss          0     Caller Packet loss  avg  0  010     09 00 10 00 11 00 12 00 13 00 14 00 15 00 16 00 17 00 18 00  2011 09 07 08 15   2011 09 07 18 15    10 Ongoing Calls  avg  3          VoIP Bandwidth  amp  Call Volume    This view shows a chart of       bandwidth used for voice and signalization for the first one        Figure 8 5  VoIP Bandwidth Chart      the evolution of the volume of calls through time  Calls are distributed between successful and unsuc   cessful calls  Successful calls are conversations where some voice was exchanged  unsuccessful calls are  conversations without any voice exchanged        Figure 8 6  VoIP Calls Volume    VoIP Conversations  amp  Details    The two last views show each call individually with some usage metrics for VoIP Conversations  The VoIP Details  view 18 the same table but with performance metrics     8 4 Application dashboards    Dashboard are a report fitting on a single screen that put together all relevant information to understand how the  application is doing  They are present in APS from version 1 7     86 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3             Sync    Begin Time          Duration     Caller Caller Zone Calice Callee Zone Application   MOS   Packet loss     Traffic    0 2011 04 07 15 44 51      FBLANCHARD Private  fallback  83208      0 00 KiB       2011004 0715 44 50 ia system na 000850888 84        sip 000   555Byt
95. 1 Integration with other Tools    13 1 1 How to integrate your APS with Cacti    Importing PV template in your Cacti    We recommend following these easy steps in order to ease the integration of PV hosts into the open source Cacti  network monitoring system     Download configuration files    First  you must download a set of files from our web site    Unzip this archive somewhere before proceeding     These files are two fold  three of them  being host templates  can be uploaded from Cacti GUI  The others  begin  SNMP query templates  must be copied in Cacti s resource directory     Upload host templates    Log in your Cacti GUI with the admin user and go to the  mport Templates page  There you can upload the file  named cacti  host template sniffer xml          home rixed src main sact junkie config cacti cacti hc  Browse               Select your RRA settings below  Recommended   OUse custom RRA settings from the template          Hourly  1 Minute Average     Daily  5 Minute          Figure 13 1  Import Export    Which should bring you to a success page such as     Repeat this operation for the two other host templates cacti host template pv central xml and  cacti host template pv probe xml     Copy data queries    This step is not enough  though  since these templates use custom SNMP data queries  If you go to Data Queries  you will notice a set of new entries     1 http   download securactive net pv misc nagios cacti config zip    131    PV   User Guide Documentation  R
96. 14 0 KiB 3ms  2011 09 07 10 01 25 2011 09 07 10 56 59 WORKGROUP 97 8 7 KiB  2011 09 07 10 01 16 2011 09 07 10 59 14  safebrowsing clients google com 62 13 8 KiB 54 ms  2011 09 07 10 05 34 2011 09 07 10 56 10 proxysecuractive lan 61 7 3 KiB  2011 09 07 10 04 57 2011 09 07 10 51 37  git rd securactive lan 56 6 4 KiB  2011 09 07 10 02 26 2011 09 07 10 56 03 sdouche babbage  presence  tcp local 55 5 5 KiB    PP    PPPPPPP       Figure 5 4  DNS specialied view    5 3 3 Limitations  If the rate of incoming packets exceeds the rate at which the sniffer can parse the traffic for too long then some  packets may be dropped by the Linux kernel  These packets won t get accounted for in the GUI     As a realtime protocol analyzer  the sniffer is also limited in what protocols it supports and how deep it inspects  packets  Here is a quick overview of the most blatant limitations       Ethernet parser supports Linux cooked capture extension  used when capturing on              interfaces  and  802 19 vlan tags  All other Ethernet extensions are ignored     ARP parser knows only Ethernet and IP addresses     DNS parser support MDNS  NBNS and LLMNR in the extend where these protocols mimic legacy DNS   with the exception that it can unscramble NetBios encoded names         FTP connection tracking merely look for PASSV or PORT commands in the TCP stream without much care  for the actual protocol       TCP options are ignored     Postgresql parser supports only protocol version 3 0 and Mysql pa
97. 2           Tempor arily  apache              1 d     MSS 1460 SACK          1 TSV 21757332 15  _lipt del            s Thu n 1970 00 00 10 iid pathe   2 05  Cooki je        5                ajas 12880802 08880671                    1   cP   7 upc ur TT            nbwpmdzgwhxr sNBszvonPkrejaPe crc                 d EgOBbbPSNdzcvdzAPCSgLr DO                       comm afe amp akey aqqDUaT4 aHnuGVLf4pGNU3HCAzwXWB8STOL S amp hkey 5  ost  22 linkedin  cHrTP 1 1 302 Moved Temporarily  se Apache  er  Bet     cookies  mobi E 1322      0545713  Domain linkedin com  Expires Mon  18 Sep 2079 15 56 32 G  T  Path    Location  http   inkedin  com   splash  redirect     1     http3AX2FN2FWwW  Tini kedin   coms2F          axu                  HexDump       arrays  6           DO  01  20  2 50e aa 11 0e  30 16 d 0 02      0040 fd    84 00 00 00 00 01 03 03 01        Fle   C Users Bors ppData Locel empliraffic     Packets  48                   14 Marked  0 Load ome  0 00 004       Figure 8 19  Viewing query and response    Note  Why SPV does not use directly a Zone or an Application to capture PCAP files      We want to capture the flow for troubleshooting since the very first packet  But with the information of this only  one packet SPV cannot know what is the Zone or Application of the flow     Note  PCAP files are a sample of the conversation  If you request on a one hour interval and get a PCAP file  the  PCAP will not contain one hour of data but only the data which match the above condit
98. 295   NT STATUS WMI GUID NOT FOUND        0000296   NT STATUS WMI INSTANCE NOT FOUND  0xc0000297   NT STATUS WMI ITEMID NOT FOUND  0xc0000298   NT STATUS WMI TRY AGAIN  0xc0000299   NT STATUS SHARED POLICY  0xc000029a   NT STATUS POLICY OBJECT NOT FOUND  0xc000029b   NT STATUS POLICY ONLY IN DS  0xc000029c   NT STATUS VOLUME NOT UPGRADED  0xc000029d   NT STATUS REMOTE STORAGE NOT ACTIVE  0xc000029e   NT STATUS REMOTE STORAGE MEDIA ERROR  0xc000029f   NT STATUS NO TRACKING SERVICE        00002  0   NT STATUS SERVER  SID MISMATCH  0xc00002al   NT STATUS DS NO ATTRIBUTE      VALUE  0xc00002a2   NT STATUS DS INVALID ATTRIBUTE SYNTAX        00002  3   NT STATUS DS ATTRIBUTE TYPE UNDEFINED  0xc00002a4   NT STATUS DS ATTRIBUTE OR  VALUE EXISTS  0xc00002a5   NT STATUS DS BUSY  0xc00002a6   NT STATUS DS UNAVAILABLE        00002  7   NT STATUS DS NO RIDS ALLOCATED  0xc00002a8   NT STATUS DS NO MORE RIDS        00002  9   NT STATUS DS INCORRECT ROLE OWNER  0xc00002aa   NT STATUS DS RIDMGR INIT ERROR  0xc00002ab   NT STATUS DS OBJ CLASS VIOLATION  0xc00002ac   NT STATUS DS CANT ON NON LEAF       170 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity              00002            00002            00002            0000250        00002  1        00002  2  0xc00002b3  0xc00002b4        0000255        0000256        00002  7  Oxc00002b8        0000269        00002  1        00002  2  0xc00002c3  0xc00002c4   
99. 4 3121841 e1888  ethi changing MTU from 1500 to 1800  Debian GNU Linux 5 8 spv ttyl     login    47 1288721 e1888  ethi NIC Link is Up 1888 Mbps  Control  None    47 1240791  ADDRCONFCNETDEV UP   ethi  link is not ready 2    47 1272681 ADDRCONFC NETDEV CHANGE   ethi  link becomes read    47 2757421  device ethi entered promiscuous mode    Debian GNU Linux 5 8  lt    ttyl    spy login  _       Figure 6 10  Console login prompt    The summary view provided by Vsphere displays the parameters such as IP addresses     Performance Vision            General Resources  Guest OS  Debian GNU Linux 5  64 bit  Consumed Host CPU  169 MHz       Version  8 Consumed Host Memory  696 00 MB  CPU  1 vCPU Active Guest Memory  215 00 MB  Memory  1024 MB Refresh Storage Usage  Memory Overhead  53 20 MB Provisioned Storage     17 04 GB  vMware Tools     Running  Current  Not shared Storage  17 04 GB  IP Addresses  10 1 0 95 View all Used Storage  17 04 GB   Storage Drive Type Capacity   DNS Name  spv    datastorel  1  Non SSD 460 75 GB 34  State  Powered On             Host  localhost  securalis lan  Active Tasks  Network Type  vSphere      Protection         Y 9       Network Standard port group             Mirror Standard port group    Commands L         Shut Down Guest  ll  Suspend        Restart Guest  ip Edit Settings    89 Open Console                Figure 6 11  Summary View    Note  The virtual machine has a second 150 GB hard disk that you can resize depending on your needs  but then  you 
100. 6  CIFS Status Categories    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity   6    NT STATUS ACCESS DISABLED BY POLICY OTHER  NT STATUS FAILED DRIVER  ENTRY   NT STATUS DEVICE ENUMERATION ERROR  NT STATUS MOUNT POINT        RESOLVED  NT STATUS INVALID DEVICE  OBJECT PARAMETER  NT  STATUS  MCA  OCCURED   NT STATUS DRIVER BLOCKED CRITICAL  NT STATUS DRIVER  BLOCKED   NT STATUS DRIVER  DATABASE ERROR   NT STATUS SYSTEM  HIVE  TOO LARGE   NT STATUS INVALID IMPORT OF NON DLL  NT STATUS SMARTCARD WRONG  PIN   NT STATUS SMARTCARD CARD BLOCKED  NT STATUS SMARTCARD CARD NOT AUTHENTICATED  NT STATUS SMARTCARD NO CARD   NT STATUS SMARTCARD NO KEY  CONTAINER  NT STATUS SMARTCARD NO CERTIFICATE  NT STATUS SMARTCARD NO KEYSET   NT STATUS SMARTCARD IO ERROR   NT STATUS DOWNGRADE DETECTED   NT STATUS SMARTCARD CERT REVOKED  NT  STATUS  ISSUING       UNTRUSTED   NT STATUS REVOCATION OFFLINE C   NT STATUS PKINIT CLIENT FAILURE   NT STATUS SMARTCARD CERT EXPIRED  NT STATUS DRIVER  FAILED PRIOR  UNLOAD  NT STATUS  WOW  ASSERTION          NT INVALID STRING  BINDING   RPC NT WRONG KIND OF BINDING   RPC  NT INVALID BINDING   RPC NT PROTSEQ NOT SUPPORTED          NT INVALID        PROTSEQ   RPC  NT INVALID STRING  UUID   RPC  NT INVALID ENDPOINT FORMAT   RPC  NT INVALID NET  ADDR          NT  NO ENDPOINT FOUND          NT INVALID TIMEOUT   RPC NT OBJECT NOT FOUND   RPC NT ALREADY REGISTERED   RPC NT TYPE ALREADY REGISTERED   RPC NT ALR
101. 6 EXCEPTION CONTINUE  NT STATUS WX86 EXCEPTION LASTCHANCE  NT STATUS WX86 EXCEPTION CHAIN   NT  STATUS IMAGE MACHINE TYPE MISMATCH EXE  NT  STATUS  NO YIELD PERFORMED   NT STATUS TIMER RESUME IGNORED   NT  STATUS ARBITRATION  UNHANDLED  NT STATUS CARDBUS NOT SUPPORTED  NT STATUS WX86 CREATEWXSOTIB   NT STATUS MP PROCESSOR MISMATCH  NT  STATUS  HIBERNATED   NT  STATUS RESUME HIBERNATION    13 6  CIFS Status Categories        lt                                      159    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity         0x40000294  0x40000370  0x40020056  0x400200af  0  80000001  0  80000002  0  80000003  0  80000004  0  80000005  0  80000006  0  80000007  0x8000000a  0x8000000b  0x8000000c  0x8000000d  0x8000000e  0x8000000f  0  80000010  0  80000011  0  80000012  0  80000013  0  80000014  0  80000015  0  80000016  0  80000017  0  80000018  0x8000001a  0x8000001b  0x8000001c  0x8000001d  0x8000001e  0x8000001f  0  80000020  0  80000021  0  80000022  0x80000023  0x80000024  0x80000025  0x80000026  0x80000027  0  80000028  0  80000029  0x8000002d  0x80000288  0x80000289  0xc0000001  0xc0000002  0xc0000003  0xc0000004  0xc0000005  0xc0000006  0xc0000007  0xc0000008  0xc0000009  0xc000000a       160    NT STATUS WAKE SYSTEM   NT STATUS DS SHUTTING DOWN   RPC NT UUID LOCAL ONLY   RPC NT SEND INCOMPLETE   NT STATUS GUARD PAGE VIOLATION  NT  STATUS  DATATYPE MISALIGNMENT  NT STATUS BREAKPOINT   NT STATUS SINGLE  S
102. A                     was a problem executing this data query  You can run this data query in debug mode to get more information     5 Select a graph type  SPV   BCN   Latency         Cancel   Create       Figure 13 8  Create disk space graphs    If you already have some defined  you will also find a graph template for every BCA and 3 possible graphs for  every BCN  for latency  retransmission and traffic      Data Query  SPV   BCA   Name    Data Query  SPV   BCN   Name    L    Select a graph type                     Figure 13 9  Create BCA and BCN graphs    Once you have checked all graphs you are interested in then click on the Create button and if all goes well you  should be welcomed with a message such as          Created graph  CactiTest   Denied Parsers     Created graph  CactiTest   Avg Response Time    Created graph  CactiTest   Load Average     Created graph  CactiTest   Memory Usage      Created graph  CactiTest   Packets         1      Created graph  CactiTest   Packets   ethi 1     Created graph  CactiTest   Packets   eth1 2     Created graph  CactiTest   Packets   eth1 3      Created graph  CactiTest   Packets   eth1 4     Created graph  CactiTest   Cells   voip      Created graph  CactiTest   Cells   udp     Created graph  CactiTest   Cells   tcp     Created graph  CactiTest   Cells   icmp     Created graph  CactiTest   Cells   dns     Created graph  CactiTest   Cells   url     Created graph  CactiTest   Cells   other ip     Created graph  CactiTest   Cells   n
103. Broadcast  Local  APIPA RFC3927  Clients  LAN  Building 1  Building 2  Financial  IT  LAN Guests  LAN gwa  Management  Sales  VPN  WIFI  WIFI Guest  Servers  Antivirus  Backup  Citri  Database  DMZ  DMZ External  DMZ Internal      DNS  Domain Controller    Multicast  Private fallbad  Public    Remote       Figure 3 1  Zone tree as displayed in SPV select boxes  showing the default configuration     3 2 2 Selections    Zone names  although not used in the aforementioned process  play an important role in the GUI  As you can see  on the example  zone names are organised in a tree of sub names delimited with slashes      not unlike a standard  file system     For instance   LAN Servers Web is made of three components  meant to be read as the host Web  amidst the  Servers inthe LAN  Here   LAN is said to be the parent zone of  LAN Servers and   LAN Fallback  and    LAN  Servers is said to be the parent zone of  LAN Servers Mail and  LAN Servers Web     In all select boxes of the GUI  selecting a parent zone will select all conversations that fall in this zone or in any  of its child zone     For instance  in the above example  selecting  LAN Servers will select all conversations in   LAN Servers Mail  LAN Servers Web and  LAN Servers Fallback     28 Chapter 3  Main terms and concepts    PV   User Guide Documentation  Release 3 3    3 2 3 Fallbacks    By convention  a fallback is a zone with a larger filter but lower priority than a set of more specific rules   For instance  in th
104. Client and Server Zone  zone in which the clients and servers are located  see Types of Conversations for  details on client server identification      Protocol Stack  allow to select only those flows identified by the sniffer as featuring this protocol stack  use  with caution      Poller  to filter on a single poller     Device Identifier  to filter on a single network adapter       VLAN  to select flows from a given Ethernet VLAN tag or range     Ethernet Protocol  to filter on a given Ethernet protocol     Client and Server Ethernet Address  MAC addresses  or ranges  of the clients and servers of this application       Web Application Pattern  allow to select those HTTP messages concerning only a given URL pattern     Web Application Pattern    The web application pattern in an application rule is used to identify specifically HTTP applications  They are  defined as patterns matched against the URLs contained in HTTP requests  The patterns should contain at least a  domain name  optionally including wild card characters like     or if you check    regex mode     you can set POSIX  regular expressions     Notice that in a typical conversation  several HTTP messages referring to several URLs will be present  The  application rule will only be checked against the first encountered URL per socket  This is not a problem if all  URLs in a given socket follow the same pattern  which is usually the case provided your pattern is not too picky      7 3 4 Business Critical Applicati
105. EADY  LISTENING   RPC  NT  NO PROTSEQS REGISTERED          NT  NOT  LISTENING   RPC NT UNKNOWN  MGR  TYPE   RPC NT UNKNOWN IF   RPC NT NO BINDINGS   RPC  NT       PROTSEQS          NT  CANT  CREATE ENDPOINT   RPC NT OUT OF RESOURCES          NT  SERVER  UNAVAILABLE   RPC NT SERVER  TOO BUSY   RPC  NT INVALID NETWORK  OPTIONS          NT  NO CALL ACTIVE          NT  CALL FAILED   RPC  NT  CALL FAILED DNE       173    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page        0020014   RPC NT PROTOCOL ERROR  0xc002001f   RPC NT UNSUPPORTED TRANS SYN  0xc0020021   RPC NT UNSUPPORTED TYPE  0xc0020022   RPC NT INVALID TAG  0xc0020023   RPC NT INVALID BOUND  0xc0020024   RPC NT NO ENTRY NAME  0xc0020025   RPC NT INVALID NAME SYNTAX  0xc0020026   RPC NT UNSUPPORTED NAME SYNTAX  0xc0020028   RPC NT UUID NO ADDRESS  0xc0020029   RPC NT DUPLICATE ENDPOINT  0xc002002a   RPC NT UNKNOWN AUTHN TYPE  0xc002002b   RPC NT MAX CALLS TOO SMALL  0xc002002c   RPC NT STRING TOO LONG  0xc002002d   RPC NT PROTSEQ NOT FOUND  0xc002002e   RPC NT PROCNUM OUT OF RANGE  0xc002002f   RPC NT BINDING HAS NO AUTH  0xc0020030   RPC NT UNKNOWN AUTHN SERVICE  0xc0020031   RPC NT UNKNOWN AUTHN  LEVEL  0xc0020032   RPC NT INVALID          IDENTITY  0xc0020033   RPC NT UNKNOWN AUTHZ SERVICE  0xc0020034   EPT NT INVALID ENTRY  0xc0020035   EPT NT CANT PERFORM OP  0xc0020036   EPT NT NOT REGISTERED  0xc0020037   RPC NT NOTHING TO EXPORT  0xc0020038   RPC NT INCOMPLETE NAME  0xc
106. EMBER   NT STATUS KEY DELETED   NT STATUS NO LOG SPACE   NT STATUS TOO MANY SIDS   NT STATUS      CROSS ENCRYPTION REQUIRED  NT  STATUS KEY HAS CHILDREN   NT  STATUS  CHILD MUST      VOLATILE   NT STATUS DEVICE CONFIGURATION ERROR  NT STATUS DRIVER  INTERNAL ERROR   SMB  STATUS INVALID DEVICE STATE   NT  STATUS IO DEVICE ERROR   NT STATUS DEVICE PROTOCOL ERROR   NT STATUS BACKUP CONTROLLER   NT STATUS LOG  FILE FULL   NT STATUS TOO LATE   NT STATUS NO TRUST LSA SECRET   NT STATUS NO TRUST SAM  ACCOUNT   NT STATUS TRUSTED DOMAIN  FAILURE   NT STATUS TRUSTED RELATIONSHIP FAILURE  NT STATUS EVENTLOG FILE CORRUPT   NT STATUS EVENTLOG CANT START   NT  STATUS TRUST FAILURE   NT  STATUS MUTANT LIMIT EXCEEDED       167    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page  0xc0000192   NT STATUS NETLOGON NOT STARTED  0xc0000193   SMB STATUS ACCOUNT EXPIRED  0xc0000194   NT STATUS POSSIBLE DEADLOCK  0xc0000195   NT STATUS NETWORK  CREDENTIAL CONFLICT  0xc0000196   NT STATUS REMOTE SESSION LIMIT  0xc0000197   NT STATUS EVENTLOG FILE CHANGED  0xc0000198   NT STATUS NOLOGON INTERDOMAIN TRUST ACCOUNT  0xc0000199   NT STATUS NOLOGON WORKSTATION TRUST ACCOUNT  0xc000019a   NT STATUS NOLOGON SERVER  TRUST ACCOUNT  0xc000019b   NT STATUS DOMAIN TRUST INCONSISTENT  0xc000019c   NT STATUS FS DRIVER  REQUIRED        0000202   NT STATUS NO USER  SESSION  KEY  0xc0000203   NT STATUS USER  SESSION DELETED  0xc0000204   NT STATUS RESOURCE LANG NOT FOUND  0xc00
107. Http   gt  match  e check_snmp_securactive pl  H 10 0 0 1  a http  i  r  check bca  pattern match http  case insensitive https   gt  not match Http   gt  match  e check_snmp_securactive pl  H 10 0 0 1  a     googlelhttp      check bca  regex match google or http  case sensitive  e check_snmp_securactive pl  H 10 0 0 1  a  http   check bca  regex match  http   case sensitive http   gt  match https   gt  not match Http   gt  not match  e check_snmp_securactive pl  H 10 0 0 1  n  check all ben  e check_snmp_securactive pl  H 10 0 0 1  n    fallback     check bcn  regex math    fallback     case sensitive     check_snmp_securactive pl  H 10 0 0 1  a     http      i  n  internet     atob    check bca  regex math     http      case insensitive check bcn  regex math    internet     case insensitive     66  99    and check only zone          to zone    b    way    Nagios configuration file example    This is only an example of nagios configuration file     define command     command name check securactive  command line SUSER2S check_snmp_securactive pl  H SHOSTADDRESSS     define command     command name check securactive bca  command line SUSER2S check_snmp_securactive pl  H  HOSTADDRESSS   a         15 5      25    define command     command name check securactive bcn  command line SUSER2S check_snmp_securactive pl  H  HOSTADDRESSS   n         15 5      25    define host      host name beta  alias beta  address 192 168 30 30  use generic host         define service     name bca_ssh
108. I       GUI  Advanced filters on client server pages    e  GUI  IP subnet filter in    matrix    page    e  GUI  Improved time frame selection with    last five used  history         Pulsar  Pulsar now displays license information on the pol ler command     1 16 2 Changes       GUI               screen reorganisation  We now have Tops for clients  servers  applications and ports        GUI  ICMP messages regarding different connections are no longer merged     1 15  What s New in 2 7 7    PV   User Guide Documentation  Release 3 3    1 16 3 Major bug fixes       Metrics  TCP keepalives no longer interrupt a data flow      Pulsar  Fix Pulsar process command        GUI  Fix filters on unilateral flows or retransmission        Reports  Fix missing columns in some reports     1 17 What s New in 2 5    1 17 1 Installation notes     Service Pack update must be installed before migrating from 2 x to 2 5  If the Service Pack is not installed   the 2 5 upgrade will not start       Migration must be done from a 2 x version  If you currently have 1    version  please update first to version  2 0 or 2 3  Then  install the Service Pack  then install the 2 5 update     1 17 2 New Features    Autopcap for Business Critical Applications  available in Network conversation  DNS and VoIP depending  on configuration  It works for both local and distributed environments     New Metric  DTT Client added to the several screens where the DTT Server was already present        New Protocols  LLMNR  Li
109. ID PARAMETER 1   NT  STATUS INVALID PARAMETER 2   NT  STATUS INVALID PARAMETER 3   NT  STATUS INVALID PARAMETER 4   NT STATUS INVALID PARAMETER 5   NT STATUS INVALID PARAMETER 6   NT  STATUS INVALID PARAMETER 7   NT  STATUS INVALID PARAMETER      NT  STATUS INVALID PARAMETER 9   NT  STATUS INVALID PARAMETER 10   NT  STATUS INVALID PARAMETER 11   NT  STATUS INVALID PARAMETER 12        STATUS REDIRECTOR  NOT STARTED  NT  STATUS  REDIRECTOR  STARTED   NT STATUS STACK OVERFLOW   NT STATUS NO SUCH PACKAGE   NT STATUS BAD FUNCTION TABLE   NT STATUS VARIABLE NOT FOUND   SMB  STATUS DIRECTORY NOT EMPTY  NT  STATUS FILE CORRUPT ERROR   NT STATUS NOT A DIRECTORY   NT STATUS BAD LOGON SESSION STATE  NT STATUS LOGON  SESSION  COLLISION  NT STATUS NAME TOO LONG   NT STATUS FILES OPEN   NT STATUS CONNECTION IN USE   NT STATUS MESSAGE NOT FOUND   SMB STATUS PROCESS IS TERMINATING  NT STATUS INVALID LOGON TYPE   NT STATUS NO GUID TRANSLATION   NT STATUS CANNOT IMPERSONATE   NT STATUS IMAGE ALREADY LOADED  NT STATUS ABIOS NOT PRESENT   NT STATUS ABIOS LID NOT EXIST   NT STATUS ABIOS LID ALREADY OWNED  NT STATUS ABIOS NOT LID OWNER   NT STATUS ABIOS INVALID COMMAND  NT STATUS ABIOS INVALID LID   NT STATUS ABIOS SELECTOR NOT AVAILABLE  NT STATUS ABIOS INVALID SELECTOR  NT STATUS NO LDT   NT  STATUS INVALID LDT  SIZE   NT  STATUS INVALID LDT OFFSET   NT  STATUS INVALID LDT DESCRIPTOR  NT  STATUS INVALID IMAGE NE FORMAT  NT  STATUS RXACT INVALID STATE   NT  STATUS            COMMIT FAILURE   NT S
110. IT License      jquery ui statusbar   The MIT License    mColorPicker   The MIT License      jsonrpclib   Apache    Salt   Apache   Ixml   BSD   GPL   PSF   CWI   enum   Choice of GPL or Python license  psycopg2   GPL with exceptions or ZPL  dnspython   ISC   paramiko   LGPL   PostgreSQL   PostgreSQL Licence  setuptools   PSF   FormEncode   PSF   pycrypto   Public domain   docutils   public domain  Python  2 Clause BSD  GPL 3  see COPYING  txt   Python   Python Software Foundation licence  pychartdir   SecurActive license    Pillow   Standard PIL License    Components licensed under the    Repoze    license     156    Chameleon  pyramid  pyramid_mako  pyramid_tm  repoze lru  repoze profile  repoze who  superlance    supervisor    Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    translationstring    venusian    Components licensed under the    BSD    license     Fanstatic   Jinja2   MarkupSafe   Pygments   Sphinx  collective recipe template  configobj   fanstatic   js amcharts   jS Jquery   Js Jquery  kinetic   Js jquery  timepicker addon  js Jqueryul   mechanize   mock   netaddr   pyprof2calltree  pyramid_debugtoolbar  reportlab    sqlparse    Components licensed under the    MIT    license     13 5     Mailer   Mako  MiniMock  Paste  PasteDeploy  SQLAIchemy  Tempita  WebOb  WebTest  beautifulsoup4  cmdln    ecdsa    pyparsing    Licenses of open source libraries    157    PV   User Guide Documentation  Release 3 3      pytz        Six    e wsgi intercept
111. Identifier  127   DiffServ Code Point  DSCP   127  Distributed Architecture  45  DNS  109  122   DNS perfoarmance  22   DTT  97  121    E    Email  76   End User Response Time  128  EURT  88  96   Export  23          Fallback  27  128    INDEX    Flow  128    G    Graphical Interface  9    H    HTTP analysis  14  HTTP hit  128  HTTP page  128  HTTPS  79    ICMP  23  107  Initial Sequence Number  122  128  IP merging  30    J    Jitter  85  128    K    KiB  27    L    Language  67  License  111  117  License Check  119  Login  11    M    Matrix  16   Maximum Transfert Unit  MTU   128  Media Access Control  MAC  address  128  metric  34    MiB  27  Mirroring  40  43  MOS  83  85   N   Nagios  134  Netflow  50   O    Observation period  128  Open Source  123  Operating System  OS   128    177    PV   User Guide Documentation  Release 3 3    P    Packet Analysis  92  Packet Loss  85  PCAP  92   PDF  23  74  Performance Chart  12  Poller  128  Promiscuous mode  49  Protocol  41   Protocol Stack  128  Pulsar  63  66    H    Report  74  Reset  106  Restore  64  Retransmission  106  128  Retransmission Delay  RD   128  Retransmission Duplicate ACK  128  Retransmission Rate  RR   128  Retransmission Total  129  RFC   RFC 1034  109   RFC 1035  109   RFC 3261  83   RFC 3435  83   RFC 3550  83   RFC 3551  83   RFC 3605  83  Round Trip Time  RTT   129  RST  106  RTCP  83  RTP  83  RTT  96    5    Server  31   Server Response Time  5       129  Session  123  129   Shell  63   SIP  83   SNM
112. L NI     VAPPLIANCE  51 VOUS NACCEPTEZ PAS LES TERMES DE CE CONTRAT DE LICENCE     D APPLIANCE  VOUS NE SEREZ PAS ALTORISE A UTILISER L APPLLANCE A QUELQUE FIN               5017  DE PLUS  EN INSTALLANT OU EN UTILISANT DES MISES A JOUR OU DES     MISES A NIVEAU DE SECURACTIVE  VOUS ACCEPTEZ EXPRESSEMENT DE VOUS SOUMETTRE            TERMES DE TOUTES LICENCES SUPPLEMENTAIRES ACCOMPAGNANT DE TELLES MISES A JOUR    Qu MISES A NIVEAU  51 VOUS NACCEPTEZ PAS LES STIPULATIONS DES LICENCES     SUPPLEMENTAIRES ET OU DU CONTRAT DE MAINTENANCE ACCOMPAGNANT CES MISES        NIVEAU  VOUS NE SEREZ PAS AUTORISE A INSTALLER QU A UTILISER CES MISES A JOUR     OU ces MISES A NIVEAU  UNE VERSION IMPRIMABLE DE CE CONTRAT EST DISPONIBLE SUR     Le SITE EXTRANET DE SECURACTIVE  VOUS POUVEZ LIMPRIMER SI VOUS DESIREZ     ARCHIVER CE conma     1  DEFINITIONS          Annexe d  signe les informations qui Vous sont fournies par SecurActive          temps    autre  L   Annexe  qu fait parte du Contrat de Licence d Acplance      ar  cse certanes nformatons concernant votre utisaton des Produts     Gonc  d  s en Licence  et notamment Votre identifiant  Votre mot de passe et ou    Votre d   d activation            Applance  d  sgne le produit de SecurActve d  crit en Annexe  qu comprend  tle Mat  riel ansi que le ou les Produits  Conc  d   s  en Licence et les   logaeis sers qu y sont indus  sot Appkance vrtuele d  frie c apr  s                            E ent Coen    Figure 6 5  Read  then click on    Acc
113. N   NT  STATUS PNP RESTART ENUMERATION   NT  STATUS JOURNAL ENTRY DELETED   NT STATUS DS CANT MOD PRIMARYGROUPID   NT  STATUS  SYSTEM IMAGE BAD SIGNATURE   NT  STATUS        REBOOT REQUIRED   NT  STATUS POWER STATE INVALID   NT STATUS DS INVALID GROUP TYPE   NT STATUS DS NO NEST GLOBALGROUP      MIXEDDOMAIN  NT STATUS DS NO NEST LOCALGROUP IN  MIXEDDOMAIN  NT STATUS DS GLOBAL CANT HAVE LOCAL MEMBER   NT STATUS DS GLOBAL CANT HAVE UNIVERSAL MEMBER  NT STATUS DS UNIVERSAL CANT HAVE LOCAL MEMBER  NT STATUS DS GLOBAL CANT HAVE CROSSDOMAIN MEMBER  NT STATUS DS LOCAL CANT HAVE CROSSDOMAIN LOCAL MEMBER  NT  STATUS DS HAVE PRIMARY MEMBERS   NT STATUS WMI NOT SUPPORTED   NT STATUS INSUFFICIENT POWER   NT STATUS SAM NEED BOOTKEY PASSWORD   NT STATUS  SAM NEED BOOTKEY FLOPPY   NT STATUS DS CANT START   NT STATUS  DS INIT FAILURE   NT  STATUS  SAM INIT FAILURE   NT STATUS DS GC REQUIRED   NT STATUS DS LOCAL MEMBER OF LOCAL ONLY   NT STATUS DS NO FPO IN UNIVERSAL GROUPS   NT STATUS DS MACHINE ACCOUNT QUOTA EXCEEDED  NT  STATUS MULTIPLE FAULT VIOLATION   NT STATUS CURRENT DOMAIN NOT ALLOWED   NT STATUS CANNOT MAKE       171    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page  0xc00002eb   NT STATUS SYSTEM SHUTDOWN  0xc00002ec   NT STATUS DS INIT FAILURE CONSOLE  0xc00002ed   NT STATUS DS SAM INIT FAILURE CONSOLE  0xc00002ee   NT STATUS UNFINISHED CONTEXT DELETED  0xc00002ef   NT STATUS NO TGT REPLY  0xc00002f0   NT STATUS OBJECTID NOT FOUND  0xc000
114. NK  FAILED  0xc000013f   NT STATUS LINK  TIMEOUT  0xc0000140   NT STATUS INVALID CONNECTION  0xc0000141   NT STATUS INVALID ADDRESS  0xc0000142   NT STATUS DLL INIT FAILED  0xc0000143   NT STATUS  MISSING SYSTEMFILE  0xc0000144   NT STATUS UNHANDLED EXCEPTION  0xc0000145   NT STATUS APP INIT FAILURE  0xc0000146   NT STATUS PAGEFILE CREATE FAILED  0xc0000147   NT STATUS NO PAGEFILE  0xc0000148   NT STATUS INVALID LEVEL  0xc0000149   NT STATUS WRONG PASSWORD CORE  0xc000014a   NT STATUS ILLEGAL FLOAT CONTEXT  0xc000014b   NT STATUS PIPE BROKEN  0xc000014c   NT STATUS REGISTRY CORRUPT  0xc000014d   NT STATUS REGISTRY IO FAILED  0xc000014e   NT STATUS NO EVENT PAIR  0xc000014f   NT STATUS UNRECOGNIZED VOLUME  0xc0000150   NT STATUS SERIAL NO DEVICE INITED  0xc0000151   NT STATUS NO SUCH  ALIAS  0xc0000152   NT STATUS MEMBER  NOT IN ALIAS  0xc0000153   NT STATUS MEMBER IN ALIAS  0xc0000154   NT STATUS ALIAS EXISTS  0xc0000155   NT STATUS LOGON NOT GRANTED  0xc0000156   NT STATUS TOO MANY SECRETS       166 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity        0xc0000157  0xc0000158  0xc0000159  0xc000015a  0xc000015b        000015          000015          000015          0000151        0000160        0000161        0000162        0000163        0000164        0000165        0000166        0000167        0000168        0000 169  0xc000016a  Oxc000016b        000016          0000164  0xc000016e  
115. Not classified      NC tcp Not classified tcp flows IP protocol  tcp        NC udp Not classified udp flows IP protocol  udp   Bl Puru   C Proxy 3128 Active API Server Port Port  3128 2    Pattern  www linkedin com 5 Pattern  www facebook  5    c Social Network        Figure 7 8  Application list screen    Application http x    Name http     Color        1 7  36 oO    Description World Wide Web HTTP       Figure 7 9  Application configuration screen    7 3  SPV Functional Configuration 71    PV   User Guide Documentation  Release 3 3      Name  it corresponds to the designation of each Application  which will be used in displays  This is a  mandatory field       Color  it is the color which will be used to display this specific Application in graphs  This is a mandatory  field       Description  it is a description field  which should be used to track information related to this Application       BCA HTTP PCAP flags  to mark this application as Business Critical  as requiring HTTP analysis and or  automatic traffic capture     Then  using the Add rule button  you can attach as many rules to this application  A flow that will match         of these rules will be associated with this application  A rule can test any combination of         IP Protocol  to select a given IP protocol  such as    TCP    or                 Application Port Range  single port or port range       Client and Server IP Address  IP addresses  or ranges  of the clients and servers of this application     
116. P  76   Source  31   SRT  97  121   Subnet  129   Support  66    T    TAP  40           122  123   TCP events  22   TCP Handshake  129  Tcpdump  92  122  Timeout  129   TLS  79   Top reports  21  Triggered PCAP  94    178    U    Upgrade  117  User  67    V    VMWare  47  51  123  Voice Quality  33  VoIP  83   VPN  66    W    Web Application Pattern  129    Z    Zone  27  68  129    Index    
117. PostgreSQL 543 SELECT       Figure 2 19  Links from detailed metrics back to flows     24    Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3    2 15 PDF   CSV Export    On any web page of the web interface  except for the Configuration section   you will have the ability to export  data either in PDF or CSV formats  As long as no query has been performed  the export buttons remain deactivated   Once a query has been run  the buttons are activated and you can export the data in the format you prefer     In PDF  you will have a PDF document presenting the same data  tables or graphics  as the ones you got on your  browser page     In CSV  you get a text file with the corresponding data values  You can then use this CSV file on any of your own  data processing  In case you have several graphics or tables on a page  you will have to choose the one you want  to export the associated values     Note  Please note that you cannot export the Matrix views into CSV files  the hierarchical nature of the Matrix  does not fit into the flat structure of the CSV format     2 16 Filters    For the full technical documentation  please see the appendix Custom Filters     In each report page  you can filter the query on different fields  AII filters will be combined with the AND operator   When you set a filter and send a request  then this filter is saved for the current session     For a more complex search  you can use the custom filters input  In this 
118. S TOO MANY COMMANDS        00000  2   NT STATUS ADAPTER HARDWARE ERROR  0xc00000c3   NT STATUS INVALID NETWORK  RESPONSE        00000  4   SMB STATUS UNEXPECTED NETWORK ERROR  0xc00000c5   NT STATUS BAD REMOTE ADAPTER       0xc00000c6   SMB STATUS PRINT QUEUE FULL Y  0xc00000c7   SMB STATUS NO SPOOL SPACE Y  0xc00000c8   SMB STATUS PRINT CANCELLED Y  0xc00000c9   SMB STATUS NETWORK NAME DELETED Y  0xc00000ca   SMB STATUS NETWORK ACCESS DENIED Y  0xc00000cb   SMB STATUS BAD DEVICE TYPE    0xc00000cc   SMB STATUS BAD NETWORK NAME Y  0xc00000cd   NT STATUS TOO MANY NAMES  0xc00000ce   SMB STATUS TOO MANY SESSIONS Y  0xc00000cf   NT STATUS SHARING PAUSED        0000040   SMB STATUS REQUEST NOT ACCEPTED Y  0xc00000d1   NT STATUS REDIRECTOR PAUSED  0xc00000d2   NT STATUS NET WRITE FAULT  0xc00000d3   NT STATUS PROFILING AT LIMIT  0xc00000d4   SMB STATUS NOT SAME DEVICE Y  0xc00000d5   SMB STATUS FILE RENAMED    0xc00000d6   NT STATUS VIRTUAL CIRCUIT CLOSED  0xc00000d7   NT STATUS NO SECURITY ON OBJECT        0000048   NT STATUS CANT WAIT  0xc00000d9   SMB STATUS PIPE EMPTY Y  0xc00000da   NT STATUS CANT ACCESS DOMAIN INFO  0xc00000db   NT STATUS CANT TERMINATE SELF        00000       NT STATUS INVALID SERVER  STATE  0xc00000dd   NT STATUS INVALID DOMAIN STATE  0xc00000de   NT STATUS INVALID DOMAIN ROLE        000004     NT STATUS NO SUCH DOMAIN  0xc00000e0   NT STATUS DOMAIN EXISTS  0xc00000e1   NT STATUS DOMAIN LIMIT EXCEEDED  0xc00000e2   NT STATUS OPLOCK NOT GRANTED  0xc00000e3 
119. SED   NT STATUS GRACEFUL DISCONNECT   NT STATUS ADDRESS ALREADY ASSOCIATED  NT STATUS ADDRESS NOT ASSOCIATED  NT STATUS CONNECTION INVALID   NT STATUS CONNECTION ACTIVE   NT STATUS NETWORK UNREACHABLE   NT STATUS HOST UNREACHABLE   NT STATUS PROTOCOL UNREACHABLE  NT  STATUS PORT UNREACHABLE   NT STATUS REQUEST ABORTED   NT STATUS CONNECTION ABORTED   NT STATUS BAD COMPRESSION BUFFER  NT  STATUS USER MAPPED FILE   NT STATUS AUDIT FAILED   NT STATUS TIMER RESOLUTION NOT SET  NT STATUS CONNECTION COUNT LIMIT  NT STATUS LOGIN TIME RESTRICTION   NT STATUS LOGIN  WKSTA  RESTRICTION  NT  STATUS IMAGE MP UP MISMATCH   NT STATUS INSUFFICIENT LOGON INFO  NT STATUS BAD DLL ENTRYPOINT   NT STATUS BAD SERVICE ENTRYPOINT  NT STATUS LPC REPLY LOST   NT STATUS IP ADDRESS CONFLICTI   NT STATUS IP ADDRESS CONFLICT2   NT  STATUS  REGISTRY QUOTA  LIMIT   SMB STATUS PATH NOT COVERED   NT STATUS NO CALLBACK ACTIVE   NT STATUS LICENSE QUOTA EXCEEDED  NT STATUS PWD TOO SHORT   NT STATUS PWD TOO RECENT   NT STATUS PWD HISTORY CONFLICT   NT STATUS PLUGPLAY NO DEVICE   NT STATUS UNSUPPORTED COMPRESSION  NT STATUS INVALID HW PROFILE   NT STATUS INVALID PLUGPLAY DEVICE PATH  NT STATUS DRIVER ORDINAL NOT FOUND  NT STATUS DRIVER ENTRYPOINT NOT FOUND  NT STATUS RESOURCE NOT OWNED   NT STATUS TOO MANY LINKS   NT STATUS QUOTA LIST INCONSISTENT  NT  STATUS FILE IS  OFFLINE   NT  STATUS EVALUATION EXPIRATION   NT  STATUS ILLEGAL  DLL RELOCATION  NT STATUS LICENSE VIOLATION   NT STATUS DLL INIT FAILED LOGOFF    
120. STATUS BUFFER  OVERFLOW    e STATUS WRONG PASSWORD    e STATUS NETWORK  ACCESS  DENIED    e STATUS TOO MANY SESSIONS   To filter results by this category  use the following custom filter   clfs status    common     The drilldown workflow of the CIFS metric starts with an overview of the different commands and a chart of per   formances over time  then continues with the Top pages  Top IP  Top File  Top Tree  Top User  The troubleshooting  pages are Queries and Raw Data     Note  In the Top Files page  the CIFS queries without any file path are removed from the results     CIFS   E Overview   bs Performance               IP client   E Top IP server        Top Files      Top Trees   E Top Users  Queries     Raw Data       Figure 2 11  The CIFS Menu  from Overview to Raw Data     2 8 1 Graph    The performance graph shows lots of metrics over time  You can compare applicative performance such as DTT  and SRT with the number of queries  the payloads in each direction and finally the applicative packets     2 8 2 Queries    The Queries page shows all CIFS transactions in detail  It can display the CIFS transaction information like  User  Domain  File Path  Command  Status with their relative performance metrics SRT  DTT and their associated  deviation     2 8  CIFS Analysis 19    PV   User Guide Documentation  Release 3 3      Response DTT   Query          sRT             30ms    20ms    10ms    0    09 00 09 10 09 20 09 30 09 40       Errors    Warnings e   ok  15 000  10 000  09
121. STATUS NOTIFY CLEANUP   5     STATUS NOTIFY          DIR   NT STATUS NO QUOTAS FOR ACCOUNT  NT STATUS PRIMARY TRANSPORT CONNECT FAILED  NT  STATUS  PAGE FAULT TRANSITION   NT  STATUS  PAGE FAULT DEMAND ZERO  NT STATUS PAGE FAULT COPY ON WRITE  NT  STATUS  PAGE FAULT GUARD PAGE   NT  STATUS PAGE FAULT PAGING  FILE   NT STATUS CACHE PAGE LOCKED   NT STATUS CRASH DUMP   NT STATUS BUFFER ALL ZEROS   NT STATUS REPARSE OBJECT   NT STATUS RESOURCE REQUIREMENTS CHANGED  NT STATUS TRANSLATION  COMPLETE   NT STATUS DS MEMBERSHIP EVALUATED LOCALLY  NT STATUS NOTHING TO TERMINATE  NT STATUS PROCESS NOT IN JOB   NT STATUS PROCESS IN JOB   NT STATUS WAIT FOR  OPLOCK   SMB  STATUS INVALID SMB   SMB  STATUS SMB BAD TID        STATUS SMB BAD FID   SMB STATUS OS2 INVALID ACCESS        STATUS SMB BAD COMMAND   SMB  STATUS SMB BAD UID       Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page    NTSTATUS severity    0x00710001  0x007c0001  0x00830001  0x00ad0001  0x00ae0001      00    0002  0  00 0002  0x00fc0002  0x010a0001  0x01130001  0x03e20001  0  40000000  0  40000001  0x40000002  0x40000003  0x40000004  0x40000005  0x40000006  0x40000007  0x40000008  0  40000009      4000000    0x4000000b  0x4000000c  0x4000000d  0x4000000e  0x4000000f  0x40000010  0x4000001 1  0x40000012  0x40000013  0x40000014  0x40000015  0  40000016  0  40000017  0  40000018  0  40000019  0x4000001a  0x4000001b  0x4000001c  0x4000001d  0x4000001e  0x4000001
122. Step by Step     Performance Vision    Usememe   admin    Password  sees      P Log in      Figure 2 1  Login parameters in PV    If the IP address of the probe has been configured as 10 0 0 1  then just open the URL nttp   10 0 0 1  with your Web browser  or https   10 0 0 1 to use the HTTPS protocol      You can verify that you are actually connected to a Performance Vision appliance  by checking that the certificate  serial number is 00  90 26 d5 46 2a 5e 66 ec     To log in  please use  admin as user and admin as password     You are now logged in and ready to use the Graphical User Interface  For best performances  Mozilla Firefox is  recommended     2 2 Network Performance    Performance Vision provides a series of views to show how your network is behaving     2 2 1 Business Critical Networks    Provided you have configured some critical networks  setting thresholds on volume and quality indicators between  2 zones   you will get a summary screen of the performance of your most critical network links on this screen   This is an auto refresh screen  whose data can be integrated in your SNMP based monitoring suite  if you enabled  the SNMP daemon via Pulsar      11    PV   User Guide Documentation  Release 3 3    By hovering a specific time and link  you can view the origin of a degradation  latency  retransmission  excessive  bandwidth consumption and in which direction it occurred      E ES nutes  i      um                Zn       Mns        3806  778 1 MiB       Figur
123. TATUS ACCESS DENIED Y   0xc0000023   NT STATUS BUFFER TOO SMALL   0xc0000024   SMB STATUS OBJECT TYPE MISMATCH Y   0xc0000025   NT STATUS NONCONTINUABLE EXCEPTION   0xc0000026   NT STATUS INVALID DISPOSITION   0xc0000027   NT STATUS UNWIND   0xc0000028   NT STATUS BAD STACK   0xc0000029   NT STATUS INVALID UNWIND TARGET   0xc000002a   NT STATUS NOT LOCKED   0xc000002b   NT STATUS PARITY ERROR   0xc000002c   NT STATUS UNABLE TO DECOMMIT VM   0xc000002d   NT STATUS NOT COMMITTED   0xc000002e   NT STATUS INVALID PORT ATTRIBUTES         000002     NT STATUS PORT MESSAGE TOO LONG   0xc0000030   NT STATUS INVALID PARAMETER MIX   0xc0000031   NT STATUS INVALID QUOTA LOWER   0xc0000032   SMB STATUS DISK CORRUPT ERROR            0000033   NT STATUS OBJECT NAME INVALID   0xc0000034   SMB STATUS OBJECT NAME NOT FOUND Y   0xc0000035   SMB STATUS OBJECT NAME COLLISION Y   0xc0000037   SMB STATUS PORT DISCONNECTED Y   0xc0000038   NT STATUS DEVICE ALREADY ATTACHED   0xc0000039   SMB STATUS OBJECT PATH INVALID Y   0xc000003a   SMB STATUS OBJECT PATH NOT FOUND Y   0xc000003b   SMB STATUS OBJECT PATH SYNTAX BAD      0xc000003c   NT STATUS DATA OVERRUN   0xc000003d   NT STATUS DATA LATE ERROR   0xc000003e   SMB STATUS DATA ERROR            000003     SMB STATUS        ERROR      0xc0000040   SMB STATUS SECTION TOO BIG Y         0000041   SMB STATUS PORT CONNECTION REFUSED Y   0xc0000042   SMB STATUS INVALID PORT HANDLE Y  Co    13 6  CIFS Status Categories    161    PV   User Guide Documentati
124. TATUS MAPPED FILE SIZE ZERO  SMB  STATUS TOO MANY OPENED FILES    13 6  CIFS Status Categories       165    PV   User Guide Documentation  Release 3 3    Table 13 10     continued from previous page  0xc0000120   NT STATUS CANCELLED  0xc0000121   5     STATUS CANNOT DELETE  0xc0000122   NT STATUS INVALID COMPUTER  NAME  0xc0000123   5     STATUS FILE DELETED  0xc0000124   NT STATUS SPECIAL ACCOUNT  0xc0000125   NT STATUS SPECIAL GROUP  0xc0000126   NT STATUS SPECIAL USER  0xc0000127   NT STATUS MEMBERS PRIMARY GROUP  0xc0000128   SMB STATUS FILE CLOSED  0xc0000129   NT STATUS TOO MANY THREADS  0xc000012a   NT STATUS THREAD NOT IN PROCESS  0xc000012b   NT STATUS TOKEN ALREADY IN USE  0xc000012c   NT STATUS PAGEFILE QUOTA EXCEEDED  0xc000012d   NT STATUS COMMITMENT LIMIT  0xc000012e   NT STATUS INVALID IMAGE LE FORMAT  0xc000012f   NT STATUS INVALID IMAGE NOT MZ  0xc0000130   NT STATUS INVALID IMAGE PROTECT  0xc0000131   NT STATUS INVALID IMAGE WIN 16  0xc0000132   NT STATUS LOGON SERVER  CONFLICT  0xc0000133   NT STATUS TIME DIFFERENCE AT DC  0xc0000134   NT STATUS SYNCHRONIZATION REQUIRED  0xc0000135   NT STATUS DLL NOT FOUND  0xc0000136   NT STATUS OPEN FAILED  0xc0000137   NT STATUS IO PRIVILEGE FAILED  0xc0000138   NT STATUS ORDINAL NOT FOUND  0xc0000139   NT STATUS ENTRYPOINT NOT FOUND  0xc000013a   NT STATUS CONTROL C EXIT  0xc000013b   NT STATUS LOCAL DISCONNECT  0xc000013c   NT STATUS REMOTE DISCONNECT  0xc000013d   NT STATUS REMOTE RESOURCES  0xc000013e   NT STATUS LI
125. TATUS PORT NOT SET  0xc0000354   NT STATUS DEBUGGER INACTIVE  0xc0000355   NT STATUS DS VERSION CHECK FAILURE  0xc0000356   NT STATUS AUDITING DISABLED  0xc0000357   NT STATUS PRENTA4 MACHINE ACCOUNT  0xc0000358   NT STATUS 05      CANT HAVE UNIVERSAL MEMBER  0xc0000359   NT STATUS INVALID IMAGE WIN  32  0xc000035a   NT STATUS INVALID IMAGE WIN  64  0xc000035b   NT STATUS BAD BINDINGS  0xc000035c   NT STATUS NETWORK  SESSION EXPIRED  0xc000035d   NT STATUS APPHELP BLOCK  0xc000035e   NT STATUS ALL SIDS FILTERED  0xc000035f   NT STATUS NOT SAFE MODE DRIVER  0xc0000361   NT STATUS ACCESS DISABLED BY POLICY DEFAULT        0000362   NT STATUS ACCESS DISABLED BY POLICY PATH  0xc0000363   NT STATUS ACCESS DISABLED BY POLICY PUBLISHER       172 Chapter 13  Appendix    Status    0xc0000364        0000365        0000366        0000368        0000369  0xc000036a  0xc000036b  0xc000036c  0xc000036d        000036          0000361        0000380        0000381  0xc0000382  0xc0000383  0xc0000384  0xc0000385  0xc0000386  0xc0000387  0xc0000388  0xc0000389        000038    0xc000038b        000038          000038          000038          0009898  0xc0020001  0xc0020002  0xc0020003  0xc0020004  0xc0020005  0xc0020006  0xc0020007  0xc0020008  0xc0020009  0xc002000a  0xc002000b  0xc002000c  0xc002000d  0xc002000e  0xc002000f  0xc0020010        0020011        0020012  0xc0020013  0xc0020014  0xc0020015  0xc0020016  0xc0020017  0xc0020018  0xc0020019  0xc002001a  0xc002001b  0xc002001c       13 
126. TEP   SMB STATUS BUFFER OVERFLOW   SMB STATUS NO MORE FILES   NT STATUS WAKE SYSTEM DEBUGGER  NT STATUS HANDLES CLOSED   NT STATUS NO INHERITANCE   NT STATUS GUID SUBSTITUTION MADE  NT  STATUS  PARTIAL COPY   5     STATUS DEVICE PAPER  EMPTY   NT STATUS DEVICE POWERED OFF   NT  STATUS DEVICE OFF LINE   NT STATUS DEVICE BUSY   NT STATUS NO MORE EAS   NT  STATUS INVALID      NAME   NT STATUS EA LIST INCONSISTENT   NT  STATUS INVALID      FLAG   NT STATUS VERIFY REQUIRED   NT STATUS EXTRANEOUS INFORMATION  NT STATUS RXACT COMMIT NECESSARY  NT STATUS NO MORE ENTRIES   NT STATUS FILEMARK DETECTED   NT STATUS MEDIA CHANGED   NT STATUS BUS RESET   NT  STATUS END OF MEDIA   NT STATUS BEGINNING  OF MEDIA   NT STATUS MEDIA CHECK   NT  STATUS SETMARK DETECTED   NT  STATUS  NO DATA  DETECTED   NT STATUS REDIRECTOR HAS OPEN HANDLES  NT STATUS SERVER HAS OPEN HANDLES  NT STATUS ALREADY DISCONNECTED  NT STATUS LONGJUMP   NT STATUS CLEANER  CARTRIDGE INSTALLED  NT STATUS PLUGPLAY QUERY VETOED  NT STATUS UNWIND CONSOLIDATE  STATUS STOPPED ON SYMLINK   NT STATUS DEVICE REQUIRES CLEANING  NT STATUS DEVICE DOOR OPEN   SMB STATUS UNSUCCESSFUL   SMB  STATUS NOT IMPLEMENTED   SMB  STATUS INVALID INFO CLASS   NT STATUS INFO LENGTH  MISMATCH  NT STATUS ACCESS VIOLATION   NT  STATUS IN  PAGE ERROR   NT  STATUS  PAGEFILE QUOTA        STATUS INVALID HANDLE   NT STATUS BAD INITIAL STACK   NT  STATUS BAD INITIAL PC    OK  OK  OK  OK  WARNING  WARNING  WARNING  WARNING    WARNING  WARNING  WARNING  WARNING
127. TP status number  Success will correspond  to all HTTP    successful    codes   Operators            Example of valid inputs  404  Success      Example of invalid inputs  GET    13 2 22 MAC address       MAC address of the form XX        XX  XX        XX  where XX is a hexadecimal number   Operators             Example of valid inputs  01 23 45 67 89 ab  FF ab 45 7b D6 55       Example of invalid inputs  AA  AA  AA  AA    13 2 23 OS name    The name of an operating system  like     Linux    or  windows   Note that the value must be enclosed between  single or double quotes     Operators             Example of valid inputs   linux      windows         Example of invalid inputs  unknown os    13 2 24 Port number    The value represents a TCP or UDP port number as a numeric value  It can also be given as a port range as in  45 80   Operators       lt    lt        gt    gt     e Example of valid inputs  75 110  80    e Example of invalid inputs  85 12    150 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    13 2 25 Protocol name    This value represents the name of a protocol  like t cp  or icmp   Operators            Example of valid inputs  icmp  mtp  tcp      Example of invalid inputs  FOO    13 2 26 Rate    A numeric value as a percentage  The value can be lower than 1   as in 0 024    Operators       lt    lt      gt   gt       Example of valid inputs  0 25   45  99        Example of invalid inputs  45 5    13 2 27 SMB command    The SMB command used     
128. To do that  we have a look at the Performance conversations  between the VLAN_Sales and the Private zone  From this  we can draw the following conclusions       Not only 192 168 20 212 and 192 168 20 205  but also 192 168 20 220 and  192 168 20 50 are impacted         The Samba           access to the fileserver  is not the only application impacted  but SMTP  HTTP and the  Web Intranet SecurActive     Actions to be taken after that analysis    Check the windowing configuration on the operating system of these hosts  if high value  this is normal      Check the level of usage of the host  CPU  RAM usage     Alternative scenarios        f we had seen some retransmission  check whether they are all on the same edge switch and check the  interface configuration and media errors     Slow server    Hypothesis     Users complain about having to try several times to connect to a web based application named    Salesforce     The  administrator suspects the application server hosting    Salesforce    is slow     How to analyze the problem     First  check to see if all applications on the application server hosting    Salesforce    are slow or if it is just the single  web based application    Salesforce    slow  If all applications are slow  then indeed  the application server may in  fact be a slow server  If just the one web based application    Salesforce    is slow  while the other applications   CRM  are responding quickly  the problem may be the application    Salesforce    and
129. Total Hit Count  sum  306      Response Content Length Avg  avg  1 2 KiB 9 Query Content Length Avg  avg  4 4          HTTP Status Chart    Begin 2013 03 17 00 00  End 2013 0317 12 00    t     Q        Client Zone Server Zone     ClentiP   ServerIP  All v All          Client      server IP  VLAN          Custom Filters  BETA              N  M Begin  2013 03 17 00 00  2222 End  2013 03 17 12 00     Server Error  5         Aggregate Level  15 minutes       Unknown     Informational  1             Client Error  4xx    Redirection  3xx        01 00 02 00 03 00 04 00 05 00 06 00 07 00           Unknown  sum  30     Informational  1xx   sum  0    9 Server Error  5x   sum  0    Client Error  4xx   sum  0   Redirection       Success  2xx     08 00 09 00 10 00 11 00    beato  cn       3xx   sum  118    Success  2xx   sum  128       15    PV   User Guide Documentation  Release 3 3    You can view the captured HTTP transactions in detail by using the    Pages    and    Hits    pages  The first one lists  all the HTML pages  while the second one gives you the details of every transaction  including image  javascript   css and other resources used to construct a page      Poller             When clicking a page  you get a timechart of all the transactions that occurred to build the page  From this view   you can inspect how the various servers involved were responding to the client   s browser  This allows you to get  a visual overview of how the page was constructed over time     2013 03
130. Virtual  Tutorial    datastore1  1   Disk provisioning  Thick Provision Lazy Zeroed  Network Mapping   bridged  to       Network     48 Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3    6  Click on    Finish     the Virtual Appliance gets installed  You will get notified when the installation is com   plete     7  Once the Virtual Appliance is installed  you have to start it by clicking on    Power on the Virtual Machine   or on the green triangle     5 6 4 Access the virtual console    Display the Console tab and access      CLI interface named  Pulsar      Performance Vision    Getting Stored Ses  Resource Aoraton                    Console    21 11 21  D ADIR        iW Tink becomes           335434  warning     proftpd    uses 32  bit capabilities  leg      3627871 e1088  ethi  e1 4 8 _set_tso  TSO is Disabled   3121841 e1888  ethi changing MTU from 1588 to 1888    GNU Linux 5 8  lt    ttyl       login    47 1288721 e1888  ethi NIC Link is Up 1888 Mbps  Control  None  47 1248791  ADDRCONFCNETDEV UP             link is not ready  47 1272681 ADDRCONF NETDEV CHANGE   ethi  link becomes read  47 2757421  device ethi entered promiscuous mode    Debian GNU Linux 5 8  lt    ttyl    spy login  _       The probe is launched  When the network interfaces turn into promiscuous mode  click on the Console view and  then    Enter    to display the login prompt  Please note  clicking on the black screen deactivates your mouse  To  reactivate it  you can use the key co
131. a valid SMTP host  and  in option a  ogin and password if you use an authenticated SMTP server  You also can modify  with the same  command  the From header of the emails generated by the probe     After that you can either reboot the probe or use smtp stop followed by smtp start commands to activate  the new configuration     76 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    7 3 7 Degradation    This configuration page allows to change how the aggregator system will merge the data  This merging is done  per metric  You can also tell to the aggregator system to not degrade a metric at all  For each item there is an  embeded help  here some additional information     IP degradation is done in two passes  the first one is zoned  you are supposed to set your Internet zone or  equivalent  Then a second step of IP degradation is available for all IPs                    08 00 08 01 Internet 10 MB 100 ms  08 05 08 06 Internet 3MB 200 ms  08 10 08 11 Internet 183 28 100 2 6 MB 150 ms  08 10 08 11 Internet 3MB 200 ms  08 12 08 14 Lan Server 192 168 100 8 5 MB 10 ms      Data Aggregation   3          08 00 08 11 00 Internet 16 MB 166 ms  08 10 08 11 00 Internet 6 MB 150 ms  08 12 08 14 Lan Server 192 168 100 8 5 MB 10ms      Data Merging         08 00 08 11 00 Internet   22 MB 158 ms    08 12 08 14 Lan Server 192 168 100 8 5 MB 10 ms    Figure 7 15  IP aggregation  then degradation    7 3 8 SNMP    Optionally  SNMP requests are answered on default SNMP port  
132. age     N tier application performance issue    Hypothesis     Users are complaining about slow response time from an in house web application  This application being an  N tier architecture  its performance as seen by a client is tied to several parameters       DNS latency to resolve web server name from the client host  see DNS Response Time     Connection time to server    Data Transfer Time between these hosts    DNS latency to resolve other server names accessed from the web server  database servers for instance  cf   DNS Response Time     8 7  Interpretation Guidelines    105    PV   User Guide Documentation  Release 3 3    Connection and data transfer times between these hosts    Server response time of these servers    Identification of the culprit     First we need to find out if the experienced slowdown is due to the web front end itself  To this end  check every  component of the EURT     If SRT is fast but RTT and or DTT  see also Connection Time  then we are facing a network slowdown   Refer to previous sections of this guide to further track down the problem     If SRT 18 preponderant compared to DTT and RTT then the application itself is to blame  Proceed to find  out what is affecting performance     Then check EURT between web server and each other involved servers  databases        If some of these EURT appear to be degraded then check recursively these other hosts  If not then check the web  server load average     8 7 3 Additional metrics    TCP anomalies
133. all Network  Application and VoIP performance related aspects  and allows to     9 2    Provide clear information on the mapping of traffic    Continuously analyze network and application usage    Improve configuration and optimization of IT infrastructure    Proactively manage network capacity to avoid congestions    Identify opportunities to make infrastructure savings    Measure the Quality of Experience of end users vs  SLA    Diagnose performance degradations and accelerate resolutions    Identify slowdowns  their origin  network  server  application     and their impact    Manage performance of complex application chains    Analyze the impact of application deployments on network resources and end user performance     Perform deep transaction analysis at application level for major name services  web  database and file shar   ing protocols     Get a full view of performances in both hardware and virtual based environments     Deployment Mode        72 29  SINGLE MULTIPLE    PROBE    PROBES         Figure 9 1  Deployment Mode    9 2 1 Single Probe  Stand alone Appliance    Performance Vision in a stand alone mode is composed of a single unit which analyzes the traffic  stores the  statistics and presents the data through an interface     113    PV   User Guide Documentation  Release 3 3    9 2 2 Multiple Probes  Distributed Architecture  Performance Vision in a distributed mode will capture and analyze traffic in several physical locations through  distinct appliances ca
134. ame user admi n     When logged in you should see the following prompt  version number can vary      Welcome to Pulsar   the SPV shell   v1 14 0               1     0 display Pulsar commands     ype  help COMMAND to display the command help details        poseidon      Figure 7 1  Pulsar prompt on the poseidon probe    Note  Pulsar uses 3 colors while displaying informations       Green outputs are informations     Yellow outputs are warnings       Red outputs are errors     63    PV   User Guide Documentation  Release 3 3    If needed you can set the keyboard mapping with the kb   mapping   command  Typing kb displays the list of  available mappings     Pulsar allows you to change the administration password through passwd command  This should be your first  command  Typing passwd in the pulsar shell launches the standard UNIX password change process     Warning  At this point  there is no way to retrieve the password  If you totally lost the password  the    Securactive support team can generate a new one  See Support access through VPN  You can also restore the  probe  see Restore probe state        7 2 2 Configure the probe    Use the config command to setup up the probe     pulsar  config  Service    dns   hostname   network   ntp   smtp   Support         11  default   x  x  Your choice     YO OF WN rm    Typing enter will launch the whole interactive configuration process     Warning  This command is mandatory as it will configure key elements needed for proper operatio
135. and time  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa     Continued on next page    140       Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 2     continued from previous page    Operand Type    dtt              GIE                      ders        cuc                sry     12102   dup ack  Counc  Cup  Ck  Count   dup ack countc  end   eth proto  SUIT  fin count   LIT   COUNT                            ip   ip dst  ip netflow  15 506   mac   mac dst   mac Sic   mtu           IDGU Srv   OS   CS                      payload  payload clt  payload count  payviload count cit  paylodd count srv  payload ret  payload ret clt  payload ret srv  payload srv  pkLt count                           pkt  count   sry  poller name                  proto  protostack   rd                         rda indic             10 018  rd anlicasrv  rd rate  rd rate clt  rd rate srv  rd SEV    Oriented DTT  Data transfer time from client    Data transfer time from server   Total duplicate acks   Duplicate acks from client to server  Duplicate acks from server to client   Number of session finished   Ethernet Type Protocol   End user response time   Total number of FIN packets   Number of FIN sent by client IP   Number FIN sent by server IP   Either source or destination IP or subnet   IP address to which network communication is sent  IP of the netflow capture   IP address from which network communication originates  Client or server MAC address   Destina
136. any user regardless of their understanding of the underlying infrastructure  IP addresses  and subnet  or ports used by each application      An application is a set of network services which together correspond to a business application  For example  an  application named ERP could be configured to match network traffic on port TCP 80 on a server Zone containing  the specific server 192 168 20 4 32     3 3 1 Application definition  An application can be defined using a set of filters a flow must match to enter the application  These filters can  use various elements of a flow  from its IP addresses to its ports  poller  protocols  and so on     Notice that depending on what flow is considered  some of the information may not be available  For instance   the attribution of an application for a NetFlow cannot use anything beside bare IP addresses  protocol and ports   As a consequence  an application defined on a given VLAN  MAC address or protocol stack will never accept a  NetFlow          rules are checked one after the other and the first matching rule gives the flow its application  in a process  similar to the one used for zone attribution     The priority of these rules can be changed to alter the order in which these checks are performed     For more information about the configuration of applications  refer to the Configuration section     3 3 2 Examples    An application which is run on a server which has an IP of 192 168 1 4 with MSSQL will be defined as  follows   
137. at a glance  what version fits best your needs depending on your  specific traffic     PV   User Guide Documentation  Release 3 3    Information  Pollers Status    Database Summary          Database Workload m  Applicative Logs       Figure 9 5  Database Workload in the Configuration area    9 voir                    1  a Feb 11 13 00 Feb 12 1                 sa    Non te            other 11       z 2m 1l         2    Jil       mma      13 00 Feb 06 13 00 Feb 07 13 09 Feb 08 13 00 Feb 09 13 00 Feb 10    Figure 9 6  Chart of the number of flows analyzed          ur   m              a Feb 14 13 00 Feb 15    13 0       ons            13 0    Feb 13    9 8 Limits    Each Performance Vision version supports a given number of flow analyses  One flow analysis is either a set of  exchanges between one client and one server for one application or a layer 7 transaction     If the data processed by the central collector reaches the license limit  the system will still continue to work  smoothly  An email alert will be sent to the administrator to make him aware that the limit has been reached  AII  data above the limit will be ignored by sampling and will not be processed  In such case  the result 18 that only a  part of the total traffic will be analyzed     Whatever the Performance Vision version  2015 licenses  there is a protection at 500 000 flows analyses to main   tain the stability and efficiency of the system       flow analyses made over this limit will be ignored and will not
138. ata Aggregation 33    PV   User Guide Documentation  Release 3 3    times are averaged per packet   so only one line of data is retained for each conversation group  This line still  contains a relevant summary of your network and application performance  but it s storage takes up a lot less disk  space     Example  A user checks out a Web page once at 16   38       Info Query begin  2010 07 30 16 38 00402 00 Aggregate Levet 120s  Query end  2010 07 30 16 40 00 02 00 lumber of col res    Sync    Begin Time End Time Client Zone Client        Server Zone Server      Application Traffic Packets Handshake Transactions   EURT  7  07  1921 2 Internet 88 1911227        2     amp     2010 07 30 16 38 47 2010 07 30 16 39 11 Private    lected results  1       Figure 3 9  Flow example at 16 38 to 16 40      and again at 16  41     Query begin  2010 07 30 16 40 00 02 00 Aggregate Levet 120s  Query end  2010 07 30 16 42 00 02 00 Number of collected results  1   Sync    Begin Time End Time Client Zone Client      Server Zone Server IP  Application Traffic   Packets Handshake Transactions   EURT  8    2010 07 30 16 41 34 2010 07 30 16 4156 Private 192 168 102 Internet 88 191 122 7 m htp 55 9KiB       Figure 3 10  Flow example at 16 40 to 16  42             is the aggregated line for both events if you query between 16 38 and 16  42     Info Query begin  2010 07 30 16 38 00 02 00 Aggregate Levet 1205  Query end  2010 07 30 16 42 00 02 00 Number of collected results  1    Sync    Begin Time E
139. ate  RR Server  going from the clients to the application  server  However  none of the packets from the server to the clients needed to be retransmitted  RR Client is  around 0   This indicates that the application server 18 in fact dropping the packets and is therefore a slow server     Assuming that the route taken form the client to the server is the same route taken from the server to the client as  is industry standard practice      Lastly  check the TCP errors of the clients and the Application server  If the server reset count or number of  timeouted sessions 18 high  this 15 a further indication of a slow server  Go to Analysis   gt  TCP errors  Select the  application server    Salesforce    from the drop down box labeled    Server Zone  and click Search     RD in   RD out   Dup ack   Conn  attempts   Conn  established   Sess  end   Client FIN   Server FIN   Client RST   Server RST    Num  timeout  334ms 333  5 48 330 165   263ms 346ms 58 330  215ms 273ms 37 328  338ms 365  5 37 18            165 463 165    133 330 1  164 446 164    118 328  9 25 9 0 7    5 15 15 20 16   301ms 2 10 5 12 5 2  1 5   310ms 1 5   0 10 5   300ms 1 5   4 7       Figure 8 39  Slow server  TCP Errors    Here we see that there are a lot of server resets and timeouts  Given all the above information  we can conclude that    the application server is operating slowly  At this point  the server administrator should perform direct diagnosis  on the application server to verify CPU  RAM and HD us
140. ate  select  Private and any of its subzones     26 Chapter 2  Use The PV Graphical Interface    CHAPTER  THREE    MAIN TERMS AND CONCEPTS    3 1 General Conventions    3 1 1 Byte metric unit         byte metric values are given in Byte as KiB  MiB  GiB  etc  As recommended by the INTERNATIONAL  ELECTROTECHNICAL COMMISSION  IEC  in 2000 when using power of 2 10 multiple  This means that the  values in MiB and KiB are in binary and equal to 1024 raised to the power of 2 and 1024 raised to the power of  1  respectively  This notation was designed to distinguish 10 3 bytes  referred as KB  and 1024 bytes  referred  as KiB      In other words  you would say     in decimal notation  1000   1k  kilo  and 1000 2   1M  mega       in binary  1024   1Ki  kibi  and 1024 2   1Mi             For more information about binary prefix  please refer to Wikipedia page   http   en wikipedia org wiki Binary  prefix      3 2 Zones    3 2 1 Principles    A zone 18 an arbitrary container in which groups of peers can be kept and organized according to their network  address     Each peer being attributed a zone  a conversation between two peers comes with two zones  a client and a server  zone     A zone consists merely of a name  a priority and a set of optional filters  Each conversation is tagged with a client  and server zone  using the client and server IP and MAC addresses  according to this process  every rule is tried  in order of priority  and the first zone that has filters that comply wit
141. ation page  Applications represent the business applications running  on your network and make the reports provided easily understandable to everyone in your organization     To access the configuration of Applications  click on the Configuration button  on the top right of the user  interface     To create an application  go the to Application submenu  in the left menu     This panel displays the existing Applications  by default or user defined   To create an Application  click on  Create new application  you will see the configuration screen     An Application can be defined using the following elements       Comma Separated Values    70 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    Applications editor       Create new application    Review and test application matching rules 46 Select unused applications    Filter    escript x  Name Description Flags Rules        File Sharing 445 Microsoft DS3 Port  445 3  Pattern  mail google com 5   ES Google Mail mail google com 193  80         Procotols  IPv4   HTTP  Pattern    google com  443 tcp  Procotols  IPv4 TCP HTTP  Pattern    google com 2   CJ Proxy 8080 HTTP Alternate        Port  8008 2           8080 2        google  TTW Client zone   Private  Pattern       google   fricom  85   m    http World Wide Web HTTP 14             3   Bl imaps imap4 protocol over TLS SSL                  993 2      ssh SSH Remote Login Protocol       Port 22 2   E3 Kerberos tcp 88 Server zone   Private  88 tcp 103   mc 
142. cal  address   Poller name  distributed probe    Protocols stack   Server response time   Number of SRT computed in a time interval  Tagged Link  802 1Q    Server or Client Zone   Zone of the client IP   Zone of the server IP    Decimal or hexa   Byte quantity   Byte quantity   Byte quantity   SMB status   SMB sub command  Wildcard or regex  Decimal or hexa   String   Decimal or hexa   Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  MAC address   MAC address   MAC address  String   Wildcard or regex  Duration   Decimal or hexa   Decimal or hexa   Zone name   Zone name   Zone name    Operand Type    app   bandw  banaw olt  bandw srv      Application name    Total traffic  Traffic from client to server  Traffic from server to client    Byte quantity  Byte quantity  Byte quantity    Date and time  Date and time  Decimal or hexa     capture begin Capture begin time  capture end Capture end time   device     diffserv Client or Server Diffserv                        Client Diffserv   A1ftsery  sry Server Diffserv   eth proto Ethernet Type Protocol  icmp code ICMP code                        Source IP of the ICMP error                 Destination IP og      ICMP error           ICMP error port   zone clt   Source zone of the ICMP error  zone srv   Destination zone of the ICMP error  ICMP type   Either client or server IP or subnet  IP which send the packet   IP of the netflow capture   IP which replied to a connection demand  Client or Server MAC addres
143. cceptable timing     d DNS Messages 7 DNS network protocol performance and deep analysis    Begin   2011 04 13 07 58 End 2 2011 04 13 13 58 More      Requester Zone     VLAN Sales M Server Zone 2 All         Request Name 2  salesforce com    Search    Add this page to    report  amp     Info Begin  2011 04 13 07 45 004 02 00 Aggregate Level  15 minutes  End  2011 04 13 14 00 00   02 00 Number of collected results  14  Requester Zone Server      Server Zone Packets   Traffic Request Name DNS rt   Request Type Response code  VLAN Sales  fallback  192 168 20 254 VLAN Sales  fallback  2 477Bytes omtr2 partners  salesforce com 160ms  Proxy 192 168 200 254 VLAN Sales  fallback  10 2 6KiB login salesforce com 147ms  Proxy 192 168 20 254 VLAN Sales  fallback  e 123ms  Proxy 192 168 20 254 VLAN Sales  fallback   VLAN Sales  fallback  192 168 20 254 VLAN Sales  fallback   VLAN Sales  fallback  192 168 20 254 VLAN Sales  fallback   192 168 20 254  192 168 20 254  192 168 20 254  192 168 20 254  192 168 20 254         192 168 20 254 575  192 168 20 254 5 Sims  VLAN Sales  fallback  192 168 20 254 VLAN Sales  fallback  4 994Bytes emea salesforce co m 30ms    121ms  119ms  116  5  115ms  11105  110  5  100ms        gt  gt  gt  gt  gt  gt  gt  gt  gt  gt  gt  gt  gt  gt   z  m       Figure 8 40  DNS Response Time for a specific requester zone  here  VLAN Sales     Traffic issue    If we establish the top hosts making DNS requests  it will be possible to pinpoint misconfigured clients  not  
144. ccount without deleting it     Example  Adding a new member to Administrators group  In the example below  we have created a user account  in the Administrators group with the user name John and       2 as the password     22 User Edit    User Name  login   John  Group  Administrators hd  Change password  eoo   Password confirmation  604486  Active           Figure 7 4  Edit User    The user name is case sensitive  and it is required to be non empty and to contain only letters  numbers  or _   underscores      You can modify a user account by clicking on the Users    tab found on the configuration menu on the left hand  side  and then clicking on the user name of the desired user account in the user list  You will be able to modify  any field on a created user  Please note that the password field will appear empty on edition to avoid giving out  information and will not be modified upon edition if it is left empty  In order to save any modifications  click on  the Apply button     You can delete a user account by clicking on the    Users    tab found in the configuration menu on the left hand  side  and then clicking on the check box next to the user name of the account you wish to delete  Then  clicking  on    Delete    button will delete all selected Users     68 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    25 Users list         Add anew user    Remove selected users       Delete  M    Delete   User name   Group   Active   Edit       John Admini
145. ch a matrix  where the zone  ocal was chosen both for source and destination  We  can see the zone and all 116 child zones       the contextual matrix  which displays a zone among its ancestor zone  This 18 convenient to check which  part of the network is related to a specific zone     An example of a contextual matrix that allows us to check how the  ocal zone fits into the whole configuration     mm Internet   Private  Dest Internet Private    Local Remote       3 GiB 2 3 GiB 4 8 GiB  4 0 GiE 2 1 GiB 4 1 GiB    Source Total 26          Internet 21 0 GiB  18 7 GiB          Private Local 2 0 GiB        B me       Remote 10 5 GiB  9 6 GiB       Figure 2 15  The contextual Matrix    The navigation within these matrices are thus different  The detailed matrix allows to select the zone to display   ignoring all other ones   while the contextual zone allows to select which zone to focus among its ancestor zone     You can filter the flows taken into account by defining      the observation period    the source zone    the destination zone      the application    and other common filter such as VLAN  poller and so on     Another matrix example     All  Internet Private    Server            IPv6 RFC Remote  Routable Unicast RFC 3587    Client Total 2 0 MiB  MiB 5           Internet 15 4 GiB      GiE 5 3 iE    Private Local Servers DNS 4 3 GiB  2 06 3iB    32 0 GiB  iB   11 2 GIE        gt           Remote 13 8 GiB    3 GiB   3 5 GiB    Figure 2 16  The detailed Matrix in the Client
146. ck links in the Business Critical Application Dashboard view     Thus  from each Business Critical Application  with a single click on the appropriate icon  you can     Directly access to the corresponding Application Dashboard       Add a filter on this specific Critical Application  in case you have defined a lot of Critical Applications and  you want to see only one for a moment        Edit Application characteristics       Directly access to the details of Conversations for this Application     Note  If you click on the icons that are next to the name of the application at the beginning of each line  the quick  links will take into account the complete period of time currently displayed  If you click on the icons associated    to a specific period of time  the quick links will used this specific period time when redirecting you to a detailed  screen       You will always see up to date information with the auto refresh feature of the BCA dashboard  The in   formation will be automatically refreshed based on the data aggregation level  see aggregation period    For example if the    Aggregate level  is    2 minutes   the BCA will be updated every two minutes  if the     Aggregate level  is  15 minutes   the BCA will be updated every fifteen minutes     8 2 Business Critical Networks Dashboard    To customize this view for your own needs  just go to the Configuration menu and choose the entry labeled  Business Critical Network  see the Business Critical Applications      Th
147. cle 10g and 11g with JDBC drivers        16 Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3             inspect page    Summary  URL   Begin   End   Method  Status   Flags   VLAN    Poller    Client    Client side MAC        Client IP   User Agent  Data   Server  Server side MAC  Server IP   HTTP Server  Mime type   Data    http    fr wikipedia org w index php tties Sp CI AIcial SABan     Go to this URL   2013 03 17 21 19 06 735   2013 03 17 21 19 06 752   GET    200        AJAX   250   Poller UNKNOWN on device 100    SSE  port 49495   Mozilla S 0  Windows NT 6 1  WOW64  AppleWebKit S35 2  KHTML       570 8  headers    0 B  payload   1 pkt                         91 198 174 225  port 80    Apache   text javascript  charseteutf 8   612 B  headers    164 B  payload   3 pkt     Display  Unparsed   Parsed    Query  view raw content   View body   Display     GET  w index php title Sp amp C3sA9cials3ABannerListLoader amp cache   cn  j s amp Languagesfr  proj ect  wikipediakcountrysFR HTTP 1 1    Host    Connection     X Requested With     User Agent    Accept     Referer    Accept  Encoding   Accept Language   Accept Charset     fr wikipedia org  keep alive    XM HttpRequest    Mozilla S 0  Windows NT 6 1  WOW64  AppleWebKit 535 2  KHTML  like Gecko  Chrome 15 0 874 121 Safari 535 2    application json  text javascript       q 0 01  http    fr wikipedia org wiki Pont d Arcole  gzip deflate sdch   fr FR  fr  q  0 8  en US  q  0 6  en  q  0  4 
148. d have to format it  via Pulsar s format  data  disk command      When your probe is setup  you have to reboot the Virtual Appliance     6 3 3 Insert a license key  Except the empirical virtual appliances of test provided from our Web site  the virtual appliances are delivered    without license key  You normally receive this key by e mail at the product s delivery  If it is not the case  please  contact our sales department  sales securactive net     For more information about licensing and how to install the license  please see Licensing and Upgrades     6 3 4 Access the probe interface    To login to the web interface  please see Access Through a Web browser     56 Chapter 6  Virtual Appliance Step by Step    PV   User Guide Documentation  Release 3 3    Then you should check you re license is well configured  to do that see Licensing and Upgrades     6 3 5 Traffic capture    First of all      The port mirroring should be activated on yours switches  or TAP eventually      Connect the mirror destination port to the ESX server port dedicated to the traffic capture  We will now set the network in Promiscuous mode     In The following example  we are using an ESX server with 8 physical ports  It is necessary to add a virtual  network for traffic monitoring  How to do it     1  Connect to Vsphere Client  2  Then on your ESX server icon  go to the  Configuration  tab    3  Click on the  Networking  Menu on the left column                101 01  GB Performance Vision            
149. d in detail in the        1034   http   tools ietf org html rfc1034 html         RFC 1035  http   tools ietf org html rfcl035 html   is key to  the good performance of TCP IP networks  It works in a hierarchical way  This means that if one of the DNS  servers is misconfigured or compromised  all the network  which relies on it  is also impacted  Although the    8 7  Interpretation Guidelines 109    PV   User Guide Documentation  Release 3 3    DNS protocol is quite simple  it generates a significant number of issues  configuration issues  which affect the  performance of the network as well as security issues  which jeopardize the network integrity  The purpose of  this section is to cover the main configuration issues you may encounter with DNS when it comes to network  performance     Hypothesis     You noticed a general slowdown for a specific host  zone  or the entire LAN  You didn t find out the issue with the  previous methods  Maybe this problem has nothing to do with the business applications or you network equipment     Diagnosis     The DNS server s  need to have a very high availability to resolve all the names into IP addresses that are necessary  to good function of applications on the network  An overloaded DNS server will take some time to respond to a  name request and will slow down all applications  that have no DNS data in their cache  An analysis of the DNS  flows on the network will reveal some malfunctions like     Latency issues    If we can observe tha
150. d packets    By only listening to the IN traffic  or only the OUT traffic  on the Ethernet ports concerned  we will ensure the flow  transmission to be in a unique way for the sessions between the client and server  thus avoiding the duplication of  packets     Switch       C                            Datas IN RQ         IE hz E Datas IN  A AD AD ub iade     B              Clients                 E    Figure 5 8  Example without duplicated packets    Note  In the event of a    to 1 port mirroring session  the total bandwidth of the    source    Ethernet ports of the  mirror should not exceed the maximum bandwidth of the    destination    Ethernet ports of the mirror     5 4 4 Removal of duplicated packets    The SecurActive system checks and controls the duplicated packets phenomenon on all listening ports  It also  ensures all duplicated packets are removed  However  in some cases  some duplicated packets could be mixed up  with retransmitted packets     Itis therefore crucial to minimize the duplicated packet rate  or at least to arrange the mirroring such that duplicates  follow the original as closely as possible   In order to reach a low rate of duplicated packets  the appliance provides  information on the duplicated packet rate though the Pulsar command     Welcome to Pulsar   the SPV shell   v1 13 0    Type   help  to display Pulsar commands   Type    help COMMAND  to display the command help details     vwsonde73  analyzer mirror  5 12     vsonde73        Figure 5 9
151. d using a formula that integrates 3 factors       Network latency  RTT recommended value    100ms   e Jitter  recommended value   lt 30ms        Packet loss rate  recommended value   lt 5     8 3 4 Prerequisites    To provide MOS values for VoIP traffic  it is necessary to capture the three flows  signalization  5     or MGCP    media  RTP  and control protocol  RTCP   If one of these flows is not present in the traffic capture brought  to the listening interface s   the MOS value will not be calculated  Other quality of service metrics will remain  available     Metrics obtained by analysis of the protocol    SIP MGCP  Sign  RIT  network latency between each    phone   value in  amp  out interval between a re   quest and the first response  definitive or tem   porary  from the signalization server   Sign  SRT  signalization server response time   Sign  RD  retransmission delay for the signal   ization traffic    Sign  RR  retransmission rate for the signaliza   tion traffic    Code  indicates how the VoIP call ended   e g   error or not  please note that the code depends    on the protocol used     Jitter  standard deviation of latency for the me   dia traffic going from one IP phone to the other   Packet loss  percentage of packets lost in the  conversation at the point of capture of the probe   based on RTP sequence numbers     RIT  network latency between the two IP  phones     based on the timestamps provided by  both IP phones        Note  RTT and MOS values depend to s
152. ded to a report  you can modify the filters with the Edit button  For each page  you may add  an optional description to explain its purpose     Note  Before release 2 9  an additional time delta was added under certain circumstances  As of 2 9 it s not  longer the case  all dates are relative to the day the report is being sent      Actions on reports    A report template can be deleted with the button Delete  You can clone a report template  all its parameters and  included views will be duplicated  A new report template 15 created with  copy  added to the report name     Preview will start the generation of the report right now and you will be able to see the PDF file with your  favorite PDF viewer once it has been generated  Notice that the generated report will query the same time intervals  than the next scheduled report  This can lead to some blank pages if the data for these intervals were not collected  yet     Edit allows you to change the parameters of the report template  name of the report  the list of recipients and the  scheduling settings         Send now will start the generation of the report right now and the report will be sent by mail once it has been  generated  Again  the report will query the same time interval than the next scheduled report     Sending Email    So that your reports could be sent properly to the recipients email addresses  you need to configure the SMTP  server within Pulsar  You can do that with the config smtp command  Then just add 
153. different servers to that  client zone        EURT per client  so that you can identify whether all clients are impacted by a slowdown  or which indi   vidual client generates more volume or has worse application performance      The breakdown by client 1s interesting to know whether all the zone was impacted or just some individual users  and on which component of the EURT  network latency  server response time or data transfer time and for which  number of transaction and amount of traffic      Server   application dashboard    You can access this dashboard either through the menu or by clicking on a specific server in the Application  Dashboard   This dashboard contains three bits of information       EURT graph through time for this server and this application    84  Application dashboards         111 1 89    PV   User Guide Documentation  Release 3 3           Temm ete es ae em       204 Meee ime         Query vnd 3900 08 13 18 48 66 602  0                          c adm  a 2     Hl m  Breakdown by servers Breakdown by clients   par shens Ir      1           bean met ar     1  2 9                             12943            3  lt  1990      aem      np                 NES                       1       ae                   Figure 8 12  Client zone   application dashboard  Breakdown by clients    5ync    Chent                                      EURI   RII SRI DII   2 172 16 8 30 15 1MiB 2077 8 65 29ms 906ms 7 66          172 16 8 31 11 2MiB 1723 5 65 22ms 356ms 5 35    
154. distributed between DCa and DCb  then a distributed implementation is  required    Two Distributed is If the traffic between servers is captured  it may double counted   traffic   data centers adequate  from clients to servers should not be double counted     Active     Active    N data centers   Distributed is Traffic between servers will be captured twice and double counted    through WAN    adequate       Datacenters   Distributed may   The traffic going from the remote sites to the datacenters will be double   and M remote   not be adequate    counted  The cost of deploying physical units may be superior to the   sites benefit          This corresponds to a rare case   this case is not handled by the non distributed implementation of Performacne Vision  nor by most  competitors  The bypass option would be to use TAPs to re aggregate both flows before it reaches the interface of the poller    3 This is already the case in a non distributed implementation  The only new element is the fact that data will be more readable if all pollers  have the same capture points     55  Distributed Architecture AT    PV   User Guide Documentation  Release 3 3    5 6 Virtual Performance Vision    Note  For more details about step by step virtual appliance installation cf Virtual Appliance Step by Step     If you are installing the virtual image of Performance Vision then you have a to take into account a few additional  facts     5 6 1 How to get the image    This section is based on versi
155. drive                                   Figure 6 3  Click on    Next       e Deploy OVF Template    EN    OVF Template Details  Verify OVF template               OVF Template Details    Product Performance Vicon  verson                Vendor  Searactive    Dowioadsze              Sae on dsk  387 9 MB  thn provisioned   265 0 GB  thick provisoned     Description  Attention   La configuraton mat  riel est au minimum  Selon vos  besors  veuler ajouter des ressources   m  more  processeur et  de l espace de stockage     La VM Performance Vision        congue pour fonctonner sur  VMWare ESX 4 ou 5  mais fonctionne parfaitement avec Orade  VrtualBox               Figure 6 4  Click on    Next       e Deploy OVF Template           End User License Agreement  Accept the end user            agreements           JUser License                       CRAT De LICENCE APPLIANCE SECURACTIE      avarar DUTILISER UAPPLIANCE  VEUILLEZ LIRE ATTENTIVEMENT LES STIPULATIONS ou  PRESENT CONTRAT DE LICENCE D APPLIANCE QUI CONSTITUE UN ENGAGEMENT JURIDIQUE  ENTRE SECURACTIVE ET VOUS  EN CHOISISSANT L OPTION  TACCEPTE    OU EN     UTILISANT LE LOGICIEL OU UAPPLIANCE  VOUS RECONNAISSEZ QUE VOUS AVEZ LU ET     COMPRIS LE CONTRAT DE LICENCE D APPLIANCE ET VOUS ACCEPTEZ EXPRESSEMENT DE VOUS     SOUMETTRE AUX STIPULATIONS DE CE CONTRAT  51 VOUS NACCEPTEZ PAS LES     STIPULATIONS DE CE CONTRAT DE LICENCE D APPLIANCE  SELECTIONNEZ L OPTION  JE  NACCEPTE PAS     NACTIVEZ PAS LAPPLIANCE ET NUTILISEZ NILE LOGICIE
156. e  to another     10 3 How        SRT be greater than DTT      Every DTT is preceded by a SRT but both are not computed simultaneously   e DTTs are not stored until the data transfer is complete      SRTs are stored as soon as the first packet of the response is seen     Thus it is frequent to have more SRTs than DTTs when browsing recent data     121    PV   User Guide Documentation  Release 3 3    10 4 How can we have 0 packets and no traffic at all on a conver   sation     This is a common case when the observation period encompass the end of a timeouted conversation  No packets  have been sent during the observation period and the elapsed time since last packet have reached the timeout limit     10 5 What is this timeout column  in Analysis TCP Error      As there are no timeout in standard protocol  as TCP  UDP      this is an application level notion that the packet  sniffer must guess  We consider the conversation as timeouted after 2 minutes without packets exchanged     10 6 Why are some DNS request names missing     Although DNS protocol states that the question section must be present in the requests  not all DNS messages are  name resolution requests  Some DNS server may use message types unknown of the traffic analyzer that do not  embed anything meaningful in the question section of the message  For instance  the NBNS server statistic report  is such a message that makes no use of the question section     Note that you can search for empty DNS names using the re
157. e  using HTTPS  and a terser way to pass credentials   wget   no check certificate      https   admin admin SPV   skin  simplehtml nevrax network ipstats_ds     13 3 4 Programming Example    You can also create a program to retrieve result pages from SPV  Here is a simple example in python2     import urllib  import urllib2    def get spv data url  user  passw         create authentication  auth   urllib2 HTTPPasswordMgrWithDefaultRealm      13 3  SPV For Developpers 153    PV   User Guide Documentation  Release 3 3    auth add password None  url  user  passw   urllib2 install_opener  urllib2 build_opener  urllib2 HTTPBasicAuthHandler  auth          request   req   urllib2 Request  url   f   urllib2 urlopen  req   return f read      def create url domain  page  filters          pdf True      filter args      filter  s    k   v for k  v in filters iteritems     filter args   urllib urlencode filter args   if as pdf   skin        skin  pdf      else   skin        skin  simplehtml        return  http    s   s s 2 s amp auth force http  5  domain  skin  page  filter args        set up the query    domain    myspv domain   page    nevrax network bw chart page html   tilters    capture begin      2013 0l 531 14350      capture end                 222297     serviceid                    user                     passw    admin    url   create url domain  page  filters  as pdf True   result    get spv data url  user  passw   open  output pdf    w   write result     13 4 Protocol Stack
158. e 2 2  Business Critical Networks    You can access this view in the graphical interface in Dashboards   Critical Networks     2 2 2 Performance over time chart    This view will show the main network performance metrics through time for a given selection  from one zone  to another  for example   round trip time  retransmission delay  connection time  retransmission rate  volume of  packets  This shows the evolution of the network performance  as in any view in Performance Vision  you can  drill down to the conversation level by clicking through the graphs        Begin 2012 03 21 13 24 End 2012 03 21 1924    Client Zona  Server Zone    2012 03 21 13 15  3              Figure 2 3  Performance over time chart    You can access this view in the graphical interface in Monitoring   Network Performance Chart     2 3 Application Performance    Performance Vision provides a series of views to show how your applications are behaving     2 3 1 Business Critical Application Dashboard    Provided you have configured some critical applications  setting thresholds on quality for a given application    you will get a summary screen of the performance of your most critical applications on this screen  This is an  auto refresh screen  whose data can be integrated in your SNMP based monitoring suite     By hovering a specific time and link  you can view the origin of a degradation  round trip time  server response  time  data transfer time  quantity of transactions               Figure 2 4  Bu
159. e Business Critical Network Dashboard  BCN  is aimed at presenting in a single screen the status of your  organization s most critical network    links     You can customize the business critical network dashboard to view  the status of the most strategic links corresponding to your business                                                                               NEN         gt        Figure 8 3  Business Critical Network Dashboard    From the Business Critical Network Dashboard  you can drill down from the general view to more detailed infor   mation for analysis and problem resolution     Capture time  2011 03 28 09 58 00    Private   Internet zz                Latency  2205  Bl Retrans  rate  0 02 3           rate  2 25      81            Internet   Private                Latency    ims  Bl Retrans  rate  0 09            rate  33 42    6 7Mig            Bandwidth       Figure 8 4  Detailed values for a point of time    82 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    By pointing with the mouse  you can view the threshold values for each direction at each point of time  indicating  status OK  Warning or Alert as well as the value for each direction   You can also access to the bandwidth  graphs and the conversations table for each link  If you click on the icons that are next to the name of the link at  the beginning of each line  the quick links will take into account the complete period of time currently displayed   If you click
160. e above example  the  LAN Servers Fallback zone collects all IP addresses in the  192 168 1 0 24 subnet after some more precise zones tried to match with subsets of this subnet     Notice that the priority of the fallback must be lower than the priority of these smaller zones  otherwise  they  would be shadowed by the fallback     Notice also that if the example configuration was instead      LAN Servers Mail   192 168 1 25 localhost     LAN Servers Web   192 168 1 80 localhost   LAN Servers 192 168 1 1 192 168 1 100 localhost       i e   with  LAN Servers instead of  LAN Servers Fallback  then selecting the  LAN Servers zone  in the GUI would actually select  LAN Servers Mail and  LAN Servers Web in addition to the fallback   In other words  there would be no way to select in the GUI only the peers that are in the servers IP range but that  are neither the mail nor the web server  Using the Fallback naming convention allow one to select either a  specific server   LAN Servers Mail   LAN Servers Web   all servers    LAN Servers  or only the  other servers than mail and web   LAN Servers Fallback      3 3 Application    The main objective of application is to easily categorize network usage  Through this concept  which is a key  notion of Performance Vision  the administrator can group similar network usages into categories that will make  sense for his network context  Additionally  by configuring Applications  reports on network traffic are made  clearer and are readable by 
161. e begin  capture end   CL                 delta session  device  diffserv  diffserv oclt  diffserv srv  dtt  dtt  dtt  dtt    iC TE                         dtt count srv          81     dup ack count    dup                    dup ack count  end   eth proto    eure   fin  count                                                     1     DI EE  ip netflow  ip srv   mac  mac   mac   mtu   mtu   OS             OS  SEV  payload  payload   payload   payload   payload   payload   payload   payload ret srv  payload sryv  pkt oount  pkc countjclt  pkc coultasrv    CLE  Siv  clt  Srv             count  Count OA t  Counts         ret  ret clt    Zero Window Size in both direction  Zero Window Size from client   Zero Window Size from server  Total traffic   Traffic from client to server   Traffic from server to client  Number of SYN packets   Capture begin time   Capture end time   Connection time   Number of successful handshakes  Difference between created session and finished sessions  Client or Server Diffserv   Client Diffserv   Server Diffserv   Sum of both DTT client and server  Data transfer time from client    Data transfer time from server   Total duplicate acks   Duplicate acks from client to server  Duplicate acks from server to client   Number of session finished   Ethernet Type Protocol   End user response time   Total number of FIN packets   Number of FIN sent by client IP   Number FIN sent by server IP   Either client or server IP or subnet   IP which demand a connection to
162. e content type of the referred page does no prevent it  ie  is  not typically reserved to non root transactions  such as image  css  and other typically embedded content      You can choose between these two behavior with the http detach referred parameter     Second behavior  keep referred transactions attached  is better when iframes are involved but it is believed that  the first  and default  one should generally leads to better results  other than iframes  the only observed case  where a referenced transaction was obviously not a page root was an ajax POSTing to the same URL as referrer  continuously  thus detaching it s predecessor      If When we eventually receive the response of a transaction  and thus  hopefully  its content type  we revise  our judgment on the attachment  if the transaction seems to have not been triggered by AJA X  and its content   type is indicative of a standalone document  pdf  ps or html with status 200   then we detach it  turning it  into a root   Otherwise  if the content type is not indicative of a typically embedded content  image  css   etc  then we check the delay between the page root and this transaction and if found greater than a parameter   http page construction max delayo then its detached as well     To speed up information retrieval some global per page values are precomputed in the sniffer  every trans   actions attached to a page contribute its counters into the page  as soon as it was received less than  http page contribut
163. e is available  you can download it by clicking  on the icon  Once the file has been downloaded  you can view the packets with any protocol decoder  capable of  reading PCAP files        Conn  established   Transactions   EURT   RTT        RTT out   SRT     DTT cit    DTT srv    CT   CRT RR in RR out                        0 48   ims 1m15s 5  lt  1         1ms            1 66 5535 210ms ims 55 15 ims ims 187ms 95ms 5548     1 20 2325 8       ims 21 18 794ms 135 74ms 76ms 151ms      0 40   97      1755 3848 15s 11 4s      2 1 36s 179ms 1ms 34s S 2ms 188ms     10 00  365      4 3 913      126      ims 743      43ms 123      145     1 2 891ms 63ms ims 628      198      Sims 215 125     10 31 778ms 71      Ims 621ms  64ms 20ms 57     1635 254396 091  436ms 4     549ms 50  5   105 472ms   1 26ms 41ms 1075 336      4   6 9 961ms 222ms ims 450      ims 288     220      570      790      4       Figure 8 15  PCAP column in Performance conversations                192 168 20 254 Private  fallback  45 7 4KiB mail google com 6ms A NoError E  192 168 10 254 R amp D 44 5 7      pypimirrors rd securactive lan A NoError   192 168 10 254 R amp D 44 5 9KiB pypimirrors rd securactive lan securact  s AAAA NXDomain  192 168 10 254 R amp D 44 5 2        pypimirrors rd securactive lan             NoError   192 168 10 254 R amp D 44 5 8KiB pypimirrors rd securactive lan aps secu s AAAA NXDomain  192 168 10 254 R amp D 44 6 1 KiB pypimirrors rd securactive lan labo sec  ims AAAA NXDomain  192 168 10
164. e version allows you to have some basic overview of the network level aspects on your traffic   Obviously  advanced features  application level  reporting  import export features are not available  but     it s free for one year     Evaluation is a free evaluation version that allows you to test all features for 15 days  After that period of  time  it will automatically switch to the Free version     The Audit version is dedicated to our partners  With this version  valid during 15 or 30 days  they can  provide value added services to customers like performance assessments or in depth usage audits     Express is an entry level version designed for small networks management and for small network assess   ment or audits  For a very affordable price  it enables administrators to control network  application and  VoIP usage  amp  performance  even if some of the advanced features are not available     Full version enables administrators to monitor all network  application and VoIP aspects of large datacenters   including redundant ones and dealing with multiple locations through a distributed architecture  Depending  on the amount of traffic to be analyzed  the Full comes in three different versions         Small     20 000 flow analysis       Medium     100 000 flow analysis       Large     500 000 flow analysis     Hardware Versions 115    PV   User Guide Documentation  Release 3 3    9 6 Performance Vision Versions    Please find below the detailed specifications of the differ
165. eam by email or any file sharing platform  file size can be huge      probe  diag  Creating a diagnostic package  could be long     Download the diagnostic file with a FTP client  DIAG E2A346A2 55F7 5834 40AE BIEC5967FB61 2014061    7 2 10 What information to give to the support team    Use the info command  This command summarizes all the basic information needed for support assistance  such  as state of the probe  ip address of support tunnel and other useful information     probes info    UU TID E2A346A2   55F7    5834 A0AE BIEC5967FB61  Platform vmware   Role Collector   Release 3 0 9 5rl internal   License Valid license  2015 01 02 00 00 00     usage 42    Datadisk present  True    srv usage 27            D69200 1J9   245525525540   122 165 00 225  14 20 25 2 2999259 225991     Admin interface  Support interface    Sniffer state RUNNING  Distribute state RUNNING  Storage state RUNNING  IHM State RUNNING  Database up  Irue    7 2 11 How to configure User Interface language      User interface is available in English and French languages  The language is detected automatically based on the  default language of the browser used to access the probe  So  to get the User interface to use the desired language   the administrator should check and configure the default language of its browser     7 3 SPV Functional Configuration    7 3 1 User Management    There are two groups of users in the  Users Configuration  interface     The Administrators group    The Users group    These
166. easons         to keep the storage to a reasonable size  only the type of query  e g   SELECT  UPDATE     is kept in aggregate levels above 2 minutes  You can configure this behavior in the    Data    Merging  configuration page     2 7 1 Graph    The main SQL graph allows you to view the performance of your SQL queries over time     You can graph the performance of a specific query or a specific server using the filters                             07 50     Queries    07 50 08 00 08 10 08 20 08 30 08 40 08 50 09 00 09 10      Response Payload       100 000    2   2 Top Views    9 Query OTT   srt                a  08 00 08 10 08 20 08 30 08 40      Query Payload    08 00 08 10 08 20 08 30 08 40     Query Packets       eil igi le                               IP IPS  07 50 08 00 08 10 08 20 08 30 08 40 08 50 09 00 09 10            M N  09 00 09 10    09 00 09 10    You can request the top most solicited server  according to the number of queries or total payload  for example      You can request the list of queries that occur most often  or which take the longest time to get a response     2 7  SQL Analysis    17    PV   User Guide Documentation  Release 3 3          Sync Seve Sev Queries w sEmon Query Payload Response                Query Packets Response Packets SRT Query DTT Response OTT  Aa    12    14934      1 5 MB 90 823 458 678 m i    ime              3   ms H            172        3 926 37 M 304199 273910 ims ms                       1 50 340      7uB 197 604 162448 m
167. ed environments    114 Chapter 9  Licensing and Upgrades    2     9 4    PV   User Guide Documentation  Release 3 3    Virtual Appliances  for VMWare environments   Full  Small Medium or Large   all features  Evaluation  for testing   Audit  for auditing services   Express  Small or Large   entry level    Poller  remote probe for distributed environments    Hardware Versions    The hardware appliances comes only in Full or Poller versions     Full enables administrators to monitor all network  application and VoIP aspects of large datacenters  including  redundant ones and dealing with multiple locations through a distributed architecture  Depending on the amount  of traffic to be analyzed  here are the flow analyses recommendations for the different versions of the hardware  appliances      PV 500    40 000 flow analysis   PV 1000    80 000 flow analysis   PV 2000    200 000 flow analysis   PV 4000    300 000 flow analysis   PV 8000    400 000 flow analysis     Please  see Licensing Model chapter for more details     Poller is a specific version for distributed environments that acts as a remote analysis point  One or several  pollers can be installed on different locations  It works in conjunction with a central collector which must be a  Performance Vision Full as only this version supports distributed environments     9 5    VMWare Versions    The Performance Vision virtual appliances comes in several versions in order to fit different customer s needs     9 4     The Fre
168. efore degradation    Once data has been aggregated  if you query the same period of back in time  you will have     Client Zone   Client IP Server Zone Server IP Application Traffic  Internet Merged Private  fallback  192 168 50 34    http 5 5KiB  Figure 3 3  TCP conversation after degradation    For the Client IP  merged means that the two conversations to the different Internet clients have been merged into  one single entry  This is only done when the Zone is Internet and matches the same server   application couple   So  you still know that this server was accessed from the  nternet zone with the ht tp application on the port 80     3 5 Conversation    3 5 1 Objective  amp  Definition    The objective of a conversation is to group a set of data exchanges between two hosts for a single application into  one basic entity to be able to generate a more user friendly report on network traffic     A flow is a group of data exchanges between two hosts for one application over the aggregation period  A  conversation is a group of flows over the observation period  The observation period is defined by a start time and  an end time provided by the user  A conversation is defined by the following criteria       The device identifier that received the packets      The VLAN tag that might be present in the packets    30 Chapter 3  Main terms and concepts    PV   User Guide Documentation  Release 3 3       Source or client IP address  please refer to the chapter Types of Conversations 
169. egex match   8      showall  Print all  instead of only matching pattern    onlvraulty  Print only faulty services   not OK BCA or BCN                          Name of         htpp  ssh        Ihis is treated as a regexp    n http will match BCA http  http intranet  https   If NAME is     will check all                        bonsNAME  Name of BCN   All    Private Private fallback            This is treated as a regexp    n fallback will match all BNC containing  fallback    If NAME is      will check all bcn                      Check Only BCN Status A   gt  B                    Check Only BCN Status      gt                                    Do not use regexp to match NAME       landscape  Print tables in landscape mode  default is portrait mode   t    timeout INTEGER  timeout for SNMP in seconds  Default  5    V                    prints version number    Examples    e check_snmp_securactive pl  H 10 0 0 1  check all bca and bcn of probe 10 0 0 1 it will return global status  e check_snmp_securactive pl  H 10 0 0 1  C public  2    check      bca and ben it will return global status public community  default  and v2c snmp protocol   default     e check snmp securactive pl  H 10 0 0 1  a http    136 Chapter 13  Appendix          PV   User Guide Documentation  Release 3 3    check         regex match http  case sensitive https   gt  match Http   gt  not match     check snmp securactive pl  H 10 0 0 1  a http  i  check bca  regex match http  case insensitive https   gt  match 
170. elease 3 3                                   console graphs          Console   gt  Import Templates Logged in as admin  Logout                 DCITOITC ONNENNNNNNMNNMNMNMMNMNMNNMNMNMMgMggsggscctsdscssd       New Graphs  Cacti has imported the following items   Graph  Management CDEF  Graph Trees  success  Total All Data Sources  update   Data Sources  success  Multiply by 1024  update  D  success          1000 and saturated  new      success   c d  1000 and saturated  new   Collection  success  Turn Bytes into Bits  update   Methods  success  Total All Data Sources  Multiply by 1024  update  Dat       scm GPRINT Preset  Data Input  Methods  success  Normal  update      success  Load Average  update     Graph Templates          Input Method  Host Templates    Data T    success  Get SNMP Data  update   ata Templates    success  Linux   Get Memory Usage  update   17115513 21148  success  Get SNMP Data  Indexed   update        dns Data Template   Export  success  ucd net   CPU Usage   System  update    Templates  success  ucd net   CPU Usage   User  update     success  ucd net   CPU Usage   Nice  update    Settings  success  ucd net   Load Average   1 Minute  update    success  ucd net   Load Average   5 Minute  update    Plugin  success  ucd net   Load Average   15 Minute  update    Management  success  Linux   Memory   Free  update      success  Linux   Memory   Free Swap  update    success  ucd net   Memory   Buffers  update    success  ucd net   Memory   Free  update        S
171. emplates  A summary is displayed   scheduling frequency  generation time  first recipient emails   At this stage it is empty and does not contain any  view  this is why you have Containing 0 views indicated  After having added some views to the report   here will be indicated the number of views contained in the report     7 3  SPV Functional Configuration 75    PV   User Guide Documentation  Release 3 3    Add views to report    To add a view to a report template  just go to the screen with the desired view  Select a time period and run  the search  Once search is completed  the link Add this page to a report becomes active  When you  click on it  a drop box with the list of available template reports is displayed  You can chose the template report  to which you want to add the current view and click on the button Add  If you need  you can click on Show  report list it will open the configuration area with the list of available report templates        n You can add the current page with the selected criteria to a report   Show report list    Add to report  Report of the proxy           Figure 7 14  Add a view to a report template    Please note that while the time 15 fixed  the date will remain relative to the moment the report is sent  If the view  you re adding starts yesterday at 20 00 and ends today at 8 00  and the report is scheduled to be sent next  Friday  then the effective capture time bracket will be from Thursday at 20 00 to Friday at 8 00     Once the page is ad
172. ent Performance Vision versions     Reporting   PDF Export   CSV Export   SNMP   Config  Import Export    Access to Support Option    Figure 9 4  Performance Vision Versions    9 6 1 Licensing Model    The licensing model is based on the capacity on the central database  Whatever the number of pollers  only one  local poller  or several remote ones  what is taken into account for the sizing  is the amount of data processed by  the central collector     There is only one criteria  the central database capacity in terms of numbers of flow analysis  Four versions exist  in the Performance Vision product range  they offer the following capacity levels     Hardware      PV 500     40 000 flow analysis  recommendation       PV 1000     80 000 flow analysis  recommendation      PV 2000     200 000 flow analysis  recommendation      PV 4000     300 000 flow analysis  recommendation      PV 8000     400 000 flow analysis  recommendation      Virtual Express  e Small   lt  20 000 flow analysis     Large     500 000 flow analysis     Virtual Full    e Small   lt  20 000 flow analysis     Medium     100 000 flow analysis     Large     500 000 flow analysis     9 7 How can I determine the model that is right for me     The simplest way is to deploy the Evaluation version  You will then find a dedicated screen called Database  Workload located in the Configuration area  It displays the number of different flow analyses integrated in the  database over the time  So it is easy to determine  
173. ept    and    Next       e Deploy OVF Template    Nm    Storage   Where do you want to store the vetual machne fies     Select a destration storage for the            machine fies        TProvisioned   Thin Pro  25178                        Supporte          Datastore NiS Nors          8 Loci datasto Non SD                            65 1            Figure 6 6  Name the Virtual Machine appropriately and click on    Next        8 Deploy OVF Template           Disk Format  In which format do you want to store the vrtual dks     Datastore        Avalable space  08     2592       Thick Provision Lazy Zeroed  C Thick Provison Eager Zeroed      Thin Provison          id       Figure 6 7  Disk configuration    a Deploy OVF Template            Ready to Complete   Are          the options you want to use                            emplate Det When you dick Finish  the deployment task wil be started        License Agreement Deployment settings   ame and Local OVF file  C  Users binther Downloads  Perfomnancevisonave  Download sae  3667 MB  Sze ondisk 37 98  Name  Performance Vision  Disk provisionng        Mapping   Admin  to Mirror    power on after deployment             Figure 6 8  Click on    Finish          6 3  Installation    PV   User Guide Documentation  Release 3 3    Performance Vision    Getting Started   Summary   Resource Allocat Performance   Events      aJr  a rj    N OAN    bD  0257006 i 1 3   ethHW   34 3827871    1      0  ethi    1  00   _set_tso  TSO is Disabled  3
174. er Breakdown by zone  client   T T 1  10         1908  bl       10008  Mert Wer Wr 8 rT        or                   Figure 2 5  Application Performance Dashboard    This view is available for any TCP application in Dashboards   Application Dashboard     2 3 3 Application Performance Chart    A more detailed view of the application performance is available here  it will show an even more complete set  of metrics  RTT client  amp  server  Server Response Time  Data Transfer Time client  amp  server  retransmission rate   volume of packets     Using filters  you can focus on a specific perimeter and view the evolution of the application performance through  time  This view is specifically interesting to link the evolution of data transfer times to retransmission rates and  data volumes     This view is available for any TCP application in Monitoring   Application Performance Chart     2 4 Bandwidth    You can graph the evolution of bandwidth through time     From there  you can drill down to detailed conversations to display the main contributors of a peak of traffic  for  example     2 4  Bandwidth 13    PV   User Guide Documentation  Release 3 3    Sales           Begin  2012 03 21 13 15  Info End  2012 03 21 19 15                Figure 2 7  Bandwidth Graph    This view can be accessed through Monitoring   Bandwidth chart     2 5 Conversations  Flow Details  amp  Raw Data    A conversation represents the exchanges between two IP addresses  So why do we need Flow Details pages 
175. erformed on the corresponding value  When    7 3  SPV Functional Configuration 69    PV   User Guide Documentation  Release 3 3    Fallback 1 rules      Internet 1 rules      IPv6 RFC 1 rules       Routable Unicast RFC 3587 1 rules    6to4 RFC 3056 1 rules    Doc RFC 3849 1 rules    Teredo RFC 4380 1 rules     Routable Unicast RFC 3587 fallback  Zone fallback     IPv4 into v6 1 rules   20  IPv4 1 rules   100  IPv6 1 rules   100     Private 1 rules   Broadcast      Local 1 rules   APIPA RFC3927 3 rules     Clients 1 rules   v LAN 1 rules   Building 1 1 rules     Building 2 1 rules     Financial 1 rules        Figure 7 7  Overview of the zone tree editor    several fields are set  all must match simultaneously for a conversation to be associated with this zone  in other  word  the filters are logically anded together      Here are some examples of valid subnets      192 165 100 0 24     192 0169 100 12732      CUTTEEIIO92416840 0 7295  and valid MAC addresses     52245 a0700200701  9 32 43   0 00 00 01 20    Finally  the numeric priority field allows to alter the default priority  0   greater priorities being tested before lower  priorities  Note that priorities can be negative values as well as positive values     Zones management using an external file    Alternatively  one can export the zone configuration onto a CSV   file that can be edited using any spreadsheet  program  and imported again     7 3 3 Application configuration  You can configure Applications in the configur
176. ers  Protocol Stack List        Licenses Of open source libraries                                       CIFS Status Categories    125  125  125  125  125  126  126  126    127    131  131  138  152  154  155  158    177                    ONE    RELEASE NOTES    1 1 What s new in          Full Operating System Upgrade    The data disk has new partitions with a full new OS  Debian 8 0     Updated VMware tools    Updated SSL libraries    Fixed occasional Linux kernel bugs seen on some environments  Other Features  amp  Improvements    A new Top Database page in the SQL menu  e Support of MPLS    Improved custom filters with now more than 500 research fields    Pulsar Shell configuration now works with transactions    Business Critical Applications  BCA  can be sorted by status  to get most degraded applications first     More flexibility with LDAP authentication      Appliance monitoring data available in the configuration menu    1 2 What s New in 3 2       CIFS  SMB Performance Analysis  CIFS Analysis       Supports SMB 1 0  2 0 and 3 0  without encryption     Decode file path  SRT  DTT  meta data commands  etc     New Pages  CIFS     Overview   Performance   Top IP Client   Top IP Server   Top Files   Top  Trees   Top Users   Queries   Raw Data    CIFS custom filters  Custom Filters     L3   L7 links between Flows  amp  Transactions    Switch from Flows to Transactions and switch from Transactions to Flows    Inline help and Protocol documentation    Other Features  amp  Imp
177. es     Reports  Queried time interval in reports has been simplified      Reports  Email recipients have become optional as reports are now also stored on the probe and available  through ftp      Reports  Report edition now displays time intervals of each individual pages     e  PCAP  The former limitation on storage size of manual PCAP files  20 GB  has been removed  User can  now freely manage the size of captures depending on available storage capacity        GUI  Time selection improvement     e  GUI  In    Monitoring     information displayed                 screens has been harmonized      Metrics  DTT will time out after 1 second with no data transfer  If no more data is received during this  period  we considered that last packet received was the one to take into account for the DTT     1 13 3 Major Bug Fixes       Metrics  Retransmission rate is now computed regardless of empty packets       Metrics  The de duplication process is no longer fooled by varying ethernet padding       GUI  There were occasionally some empty lines in grouping tables       Reports  Scheduling of report dates when set across two days  ex  from 23 00 to 01 00        Reports  For reports  some client email applications were not displaying the PDF file attached     e  PCAP  better autopcap performances when lots of files are generated     1 14 What s new in 2 8    1 14 1 New Features       Alerts  Business Critical Applications metrics are available through SNMP  The values can be queried  thr
178. es dial  Qo 1  9        83700 0 00   32xib 200 clo    9  2011 04 07 15 44 43 d 00       2011 04 07 15 44  B4739 0 00       44 41 83382 0 00   C      20110407 15 44 31 8378 0 009        2011 04 07 15 44 31 83784 9 00    9  2011 04 07 15 44 25          0 00 x    5  2011 04 07 15 44 11 00354732815 200    QC  20110407 15 44 08 090850840181 0 00    5  2011 04 07 15 44 08 83961 0 00        2011 04 07 15       0 00      5  2011 04 07 15 44 00 B3404 0 00       0  3  30  200     5  2011 04 07 15 43 46 833 0 00            20110407 15 43 45 831 39 0 00      2011 04 07 15 43 45        900     2011 04 07 15 43 43 2 83212 0 01   e 2011 04 07 15 43 39    FKOCH m   B3678 9 01       Figure 8 7  VoIP Calls    Note  Those dashboards are not available in Securactive NPS     It is extremely useful     as a starting point for troubleshooting       as a tool to communicate to management and business users on how the application is actually performing     It is a set of three elements that display key information on the performance of a business application     2011 09 08 13 32   2011 09 08 14 32                              avg  25s    SRT  avg  16s  OFERT  avg  81 2 ms  13 40 1350 14 00 14 10 14 20 14 30  2011 09 08 13 32   2011 09 08 14 32  500    Transactions  sum  7 319  400  300  200  100          13 40 13 50 14 00 14 10 14 20 14 30  1 13 46 _   2 1416 u  Breakdown by server Breakdown by zone  client   Private  fallback    r amp d  T T T T T T T T T  2000ms 6 000ms 10 000ms 14 000ms 500ms 1500
179. esholdBandwrateWarningAtoB  24              R   Gauge SpvBCNThresholdBandwrateWarningBtoA  25             R   Gauge spvBCNThresholdBandwrateAlertAtoB  26      t    R   Gauge SpvBCNThresholdBandwrateAlertBtoA  27          R   Gauge SpvBCNThresholdRttWarningAtoB  28                   Gauge SpvBCNThresholdRttWarningBtoA  29          R   Gauge SpvBCNThresholdRttAlertAtoB 30      qe  R   Gauge spvBCNThresholdRttAlertBtoA 31           R   Gauge SpvBCNThresholdRrWarningAtoB  32                       Gauge SpvBCNThresholdRrWarningBtoA  33           R   Gauge SpvBCNThresholdRrAlertAtoB  34           R   Gauge SpvBCNThresholdRrAlertBtoA 35         Note  Notice that none of these MIB objects is currently settable     7 3 9 TLS Decryption    Some of the protocols inspected by SPV may be encrypted using TLS  namely  HTTP  SKINNY  SIP  Under some  conditions SPV can decrypt these streams and proceed with inspection as normal  In other words it is possible to  visualize HTTPS transactions     To activate this feature you must fulfill all of the following requirements       Have access to the private keys of the targeted servers and upload them into SPV  Please bear in mind that  anyone with your private key can do the same as SPV probe  so make sure you upload it using HTTPS and  secure access to the probe file system       Force the server  or the client  to use these keys to encrypt the handshake  in other words  disable those  encryption algorithms such as Diffie Hellman   For instance  
180. ess of the poller where they were captured     If a capture was done on multiple pollers at a time  then they will have the same name and same filters  They will  be grouped together in the management interface           Figure 8 22  The triggered PCAP management page with the first one created on two pollers     8 7 Interpretation Guidelines    The objective of this section is to help our customers to make the best use of the performance reports provided  by their appliance  You will find enclosed a brief overview of how application performance issues can be solved  with SPV  This first section focuses on synthetic metrics to produce a measure of the quality of experience of  users  QoS   End User Response Time  and give you a simple explanatory framework to understand the cause of  application slowdowns  Round Trip Time  Server Response Time and Data Transfer Time      Note  Some metrics and views described below are only available in Securactive APS     87  Interpretation Guidelines 095    PV   User Guide Documentation  Release 3 3    8 7 1 Objectives    Before you start analyzing performance reports  there is a certain number of elements which you must bear in  mind  Performance metrics should not be considered as absolute values  but in comparison with different  time intervals  servers and user groups  Performance metrics represent time interval  Although most of them  correspond to the measurement of a concrete phenomenon  it is almost impossible to provide a scale of 
181. et with FIN from any of the device that 18  acknowledged by a FIN ACK by the other device and followed by a FIN of this same last device   no  FIN ACK 15 necessary to conclude that the connection is closed      Subnet Set of network addresses that have a common declared IP address routing prefix  A Subnet is defined by  an IP address and a netmask     TCP Handshake 3 Way negociation that is part of TCP for establishing a TCP session  A TCP Handshake is  defined between 2 devices as exchange of 3 TCP packets flagged SYN  SYN ACK  ACK     Timeout Session end by inactivity  Session Timeout will be reported after 120 seconds of complete inactivity   1 e  no packets seen      Web Application Pattern Mean of recognizing an Application based on a pattern in the payload  Currently  these patterns are checked against HTTP URLs only  The pattern syntax allows hostname and optionally a  path separated by    7     ie   www example com my path   or    www example com      Notice that a wildcards  character   1s allowed in domain or path part of the pattern  Only Conversation which are detected to be  based on HTTP will have URL of their GET POST CONNECT request matched against Web application  signature s pattern  A match occurs when the pattern match the complete target URL     Zone    zone corresponds to the location of a sender or emitter  See Zones for more details     129    PV   User Guide Documentation  Release 3 3    130 Chapter 12  Glossary    CHAPTER  THIRTEEN    APPENDIX    13 
182. etransmission payload from server to client  Payload from server to client   Number of IP packets   Number of packets sent from client   Number of packets sent from server   Poller name  distributed probe    server Port   Protocol   Protocols stack   Retransmission delay   Retransmission delay from client to server  Retransmission count  both directions   Total retransmission delay indic  Retransmission delay indic client to server  Retransmission delay indic server to client  Total retransmission rate   Retransmission rate client to server   Total retransmission rate for signalization  Retransmission rate server to client  Signalization retransmission delay   Number of sign  retransmission  both directions   Retransmission delay from server to client  Total retransmission traffic   Retransmission traffic from client to server  Retransmission traffic from server to client  Total Number of RST sent   Number of RST sent by client IP   Number of RST sent by server IP    Decimal or hexa   Decimal or hexa   Decimal or hexa   Ethernet Type  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  Address or netmask  MAC address  MAC address  MAC address  Decimal or hexa   Decimal or hexa   OS name   OS name   OS name   Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   Byte quantity  Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   St
183. etry Count         Import After an initial failure  the number of ping retries Cacti will attempt before failing   Templates SNMP Options  Export SNMP Version    Templates Choose the SNMP version for this device  Version2    SNMP Community               S SNMP read community for this device  public  ettings  SNMP Port  Plugin 161  Management Enter    UDP port number to use for SNMP  default is 161      E   20000  The maximum number of milliseconds Cacti will wait for an SNMP response  does not work with php snmp support    System Utilities   Maximum OID s Per Get Request hh  ser Specified the number of OID s that can be obtained in a single SNMP Get request   Management       Additional Options  Logout User    Our beloved SPV Central Collector  Notes  Enter notes to this host   4                  Create      Figure 13 5  Devices Created    Once created  the device will be already populated with a set of data queries appropriate for this kind of host     Creating graphs for this host    You can now select the Create Graphs for this Host link at the top of the device description page  You will be  offered plenty graph templates to create  many of which are not relevant for the casual user  We recommend you  create one to monitor memory and CPU resource usage        4 a  onsole graphs              conso  Console   gt  Create New Graphs Logged in as admin  Logout        CactiTest  192 168 10 236  SPV   Central Collector    New Graphs              Host  CactiTest  192 168 10 236  
184. exa   Decimal or hexa   Byte quantity   Byte quantity   Byte quantity   Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa        Continued on next page    13 2  CustomFilters    139    PV   User Guide Documentation  Release 3 3    Table 13 1     continued from previous page    Operand Type    poller name  DOFLsrv          protostack  rd   ro olt  rad count  rd andie  fondre   rindi  rd rate  rd rate   rd rate  rd         ret  ret clt  ret srv  roe Count                    ESE COUNT     rtt  Jap  FEL    Coun      LEO  Counc   rtt srv          BSIL COUDL  timeout  vlan  voip  traffic  zone  zone clt  zone srv    Poller name  distributed probe    Server Port   Protocol   Protocols stack   Retransmission delay   Retransmission delay from client to server  Retransmission count  both directions   Total retransmission delay indic  Retransmission delay indic client to server  Retransmission delay indic server to client  Total retransmission rate   Retransmission rate client to server  Retransmission rate server to client  Retransmission delay from server to client  Total retransmission traffic   Retransmission traffic from client to server  Retransmission traffic from server to client  Total Number of RST sent   Number of RST sent by client IP   Number of RST sent by server IP   Sum of RTTin both directions   RTT for data from server to client   Number of RTT for data from server to client  Number of RTT for data from client to server  RTT for data from client to ser
185. f  0x40000020  0x40000021  0x40000022  0x40000023  0x40000024  0x40000025  0x40000026  0x40000027  0x40000028  0x40000029  0x4000002a  0x4000002b       SMB STATUS OS2 NO MORE SIDS   SMB STATUS OS2 INVALID LEVEL   SMB STATUS OS2 NEGATIVE SEEK   SMB STATUS OS2 CANCEL VIOLATION  SMB STATUS OS2 ATOMIC LOCKS NOT SUPPORTED  SMB STATUS SMB USE MPX   SMB STATUS SMB USE STANDARD   SMB STATUS SMB  CONTINUE MPX   SMB STATUS OS2 CANNOT COPY   5     STATUS OS2 EAS DIDNT FIT   SMB STATUS OS2 EA  ACCESS DENIED  NT STATUS OBJECT NAME EXISTS   NT STATUS THREAD WAS SUSPENDED   NT STATUS WORKING SET LIMIT RANGE  NT  STATUS IMAGE NOT AT BASE   NT STATUS RXACT STATE CREATED   NT STATUS SEGMENT NOTIFICATION   NT STATUS LOCAL USER  SESSION KEY  NT STATUS BAD CURRENT DIRECTORY  NT  STATUS  SERIAL MORE WRITES   NT STATUS REGISTRY RECOVERED   NT STATUS FT READ RECOVERY FROM BACKUP  NT  STATUS FT WRITE RECOVERY   NT STATUS SERIAL COUNTER TIMEOUT  NT STATUS NULL LM PASSWORD   NT  STATUS IMAGE MACHINE TYPE MISMATCH  NT  STATUS RECEIVE PARTIAL   NT STATUS RECEIVE EXPEDITED   NT  STATUS RECEIVE PARTIAL EXPEDITED  NT STATUS EVENT DONE   NT STATUS EVENT PENDING   NT STATUS CHECKING FILE SYSTEM   NT  STATUS FATAL APP EXIT   NT STATUS PREDEFINED HANDLE   NT STATUS WAS UNLOCKED   NT STATUS SERVICE NOTIFICATION   NT STATUS WAS LOCKED   NT  STATUS LOG HARD ERROR   NT STATUS ALREADY WIN32   NT STATUS WX86 UNSIMULATE   NT STATUS WX86 CONTINUE   NT STATUS WX 86 SINGLE STEP   NT STATUS WX86 BREAKPOINT   NT STATUS WX8
186. f ICMP Network Unreachable errors coming from one router to many machines  The ICMP  information contained in the payload of each of these errors would probably show they are all trying to reach the  same network through the same router     Port scanning    A machine is trying to complete a network discovery  It is trying to connect to all servers around to see on which  ports they are open     How would we see it     A large number of  CMP Port Unreachable errors coming from one or several routers corresponding to a single  machine  the one which is scanning      Spyware   Worms    An infected machine 15 trying to propagate its spyware  virus or worm throughout the network  obviously it has  no previous knowledge of the network architecture     How would we see it     A large number of ICMP Host Unreachable errors coming from one or several routers corresponding to a limited  number of hosts  trying to reach a large volume of non existing machines on a limited set of ports     Server disconnected reboot    A service on UDP  DNS  Radius     is interrupted because the server program is temporarily stopped or the host  machine is temporarily shutdown  Many requests are then discarded     How would we see it     Many          Port Unreachable messages  preceeded by some unreachable host if the host itself was shut down   are emmited during a short period of time for this service host port     DNS Response Time    Background     The DNS  Domain Name System   which has been define
187. field  you can combine filters with any  logical operators   OR  AND  NOT  and can order subexpressions using parentheses  You can filter on most of the  common available fields     Begin 2013 03 20 14 32 End 2013 03 20 15 32           x  9 a 4    Client Zone c 3 Server                  VLAN Device id Poller Custom Filters  BETA   j                Figure 2 20  Custom Filters Example    Below are some of the available fields  the full list is in Custom Filters     app     capture begin  capture end     device      diffserv  diffserv clt  diffserv srv     domain     ip  ip clt  ip dst  ip src  ip srv      mac  mac clt  mac dst  mac src  mac srv       OS  OS Clt  Os srv     port srv     proto      vlan     zone  zone clt  zone dst  zone src  zone srv    Use  clt and  srv suffixes for Client and Server in the Application Universe which is in client server mode   Use  src and  dst suffixes for Source and Destination in the network Universe which is in source destination  mode     2 15  PDF   CSV Export 25    PV   User Guide Documentation  Release 3 3    Here are some examples of valid expressions    e 11 02  see OF Ipe Sr V  11 20                                  cone in  7Private Servers  or port srv  lt  1024      proto udp and port srv 53  or zone in   Private DNS       domain       www google   fr com           appe http or appe nhttps    Note  zone     Private  selects only the flows with a client or server zone witch is exactly  Private  and no other zones     zone in   Priv
188. for the Apache web server  make use of the  SSLCipherSuite parameter  Here for instance we allow only the cipher suite using RSA key exchange  algorithm     SSLCipherSuite kRSA    Force the servers or clients to forget about previous TLS sessions  or wait long enough  typically some  hours   SPV will make its best to remember new TLS sessions but will dedicate only a limited amount of    memory to do so  Also  memorized sessions are not written to disk and so will not survive restarting the  sniffer     7 3  SPV Functional Configuration 79    80    PV   User Guide Documentation  Release 3 3      Make sure the probe will receive 10096 of the traffic to from targeted servers as decryption can not work  around missing packets       Make sure required resources are available since decryption is CPU intensive     Chapter 7  Configuration    CHAPTER  EIGHT    INTERPRETING THE RESULTS    Note    Note about terms used  starting from version 2 8  The in out notion has been fully replaced by  Server Client  So in our Graphs  any RTT and RR  in out  should be considered as              Server Client  as    in the following rules       RTT in stands for RTT Server      RIT out stands for RTT Client      RR in stands for RR Server      RR out stands for RR Client     8 1 Business Critical Application Dashboard    To customize this view for your own needs  just go to the Configuration menu and choose the application you  want to be a    business    one   see the Business Critical Applicati
189. gate Level  15 minutes  End  2011 04 04 15 15 00   02 00 End  2011 04 04 15 15 004 02 00    Inte           Paris                                  nmm E  Drogenbos fallback  PEIE   Park DE 2  Frankfort mp                                     Turin  fallback  ji    Madrid  fallback  3       Site Central  fallback               1T T T T T T 1  100 200 300 400 500 5600 700    500 1 000 1500 2000 2 500       Figure 8 32  Peak in Server Response Time  application performance    Display the Application Dashboard for a relevant period of time  We can easily observe a peak in SRT from 6 to  18 15  From the breakdown by zone  we can easily conclude that only one zone has been impacted        1010 10 20 10 30 10 40 10 50 11 00    10 08 00   11 08 00   60 00    Transa ictions  sum  496  40 00   20 00   0   10 10 10 20 10 30 10 40 10 50 11 00        mm  EE      10 30     10346    2      1 02       Breakdown by server Breakdown by client    Begin  2011 04 13 10 00 004 02 00 Aggregate Level  15 minutes    Begin  2011 04 13 10 00 00 02 00 Aggregate Level  15 minutes  Info End  2011 04 13 11 00 00 02 00 Info    End  2011 04 13 11 00 00 02 00 Number of collected results  7      on   Client IP   Traffic      Transactions 1 EURT  z RTT   SRT    2 172 16 2 173 13 8MiB 342 15s 175ms 741ms  o 172 16 2 32 973 9KiB 45 608ms 88  5 344ms  2    172162157 535 8KiB 29 413ms 90  5  115  5    172 16 2 144 12 1KiB 2 244ms 118  5 125ms      i     2 172 16 2 137 10 3KiB 2 422ms 328ms  94ms  eo    172 16 2 22 9 
190. gateway   192 168 0 254   which is the router  It is trying to reach a server  which does not sit on the LAN   10 1 0 250  and which cannot be reached  because 192 168 0 254 does not know how to route this  traffic       F            10 1 0 250 The router sends back      ICMP error 10 1 0 250  message  Network Unreachable to 10 1 0 250           vork    ICMP Netw  Unreachable 192 168 0 254    192 168 0 254        x         7              3 The workstation tries to connect to 10 1 0 250 P     on HTTP port 80       192 168 0 7 192 168 0 7    ICMP Host Unreachable    Let s take the simplest example  one machine sitting on a LAN  10 1 2 23   has one default gateway   10 1 2 254 24   which is the router  It is trying to reach a server  which does not sit on the LAN   192 168 1 15   The traffic flows and reaches the last router before the server  192 168 1 254 24    this router cannot reach 192 168 1 15  because it is unplugged  down or it does not exist      ICMP Port Unreachable    Let s take a second example  one machine sitting on a LAN  192 168 0 7   It is trying to reach a server  192 168 0 254  which sits on the LAN on port UDP 4000  on which the server does not respond     8 7  Interpretation Guidelines 107    PV   User Guide Documentation  Release 3 3         The router 192 168 1 254 sends    J back an ICMP Host Unreachable  9 192168115    error to 10 1 2 23   7    192 168 1 254 24 192 168 1 15    192 168 1 254 24               192 168 0 253 16        ICMP Host    192 168 
191. gation granularity depending  on the length of the time period you requested and how far back into the past it goes     Aggregation granularity   Storage duration   Request length for tables   Request length for graphs    2 minutes 48 hours 60 minutes 120 minutes    15 minutes 7 days 8 hours 16 hours  2 hours 2 months 2 days 5 25 days    day   year 359 days 359 days       For example  with graphs  if you want a data granularity of two minutes  you can request a period length up to 120  minutes anywhere during the last two days     With tables  if you want a data granularity of two hours  you can request a period length up to two days anywhere  during the last two months     Note that because the larger aggregate levels summarize more data at once  they take up less disk space  and  can be kept in storage much longer without filling out the hard drive  This strikes a good balance between data  granularity and duration of retention  performance data for the last two days is available with the best granularity   and long lasting global trends can be exposed from as far back as one year  albeit with less detail   all from the  same interface     Aggregated data is computed  in a nutshell  by identifying network conversations where the same server and the  same client talked using the same application  and grouping them together  The metrics for each such group are  summed up in accordance with their mathematical nature  for instance  packet counts are added and response    3 6  D
192. ggregation as much as possible     The sniffer now decodes HTTPS  a new page to set the SSL keys is available in the configuration  77 5  Decryption      What   s New in 2 16    Graphical interface        Result columns can be retracted to give place for the other ones        Normalize all search forms  use same filters on all pages when it makes sense      Add a basic support of Netflow v5   add the filter    external capture  to filter on it   Huge performance improvement on CSV export of the database results     Final Custom filters  filters like svt gt 500ms are now available   see Filters     1 5  Whats New in 2 17 3    PV   User Guide Documentation  Release 3 3    1 7    1 8    1 9    Whats New in 2 15    Transaction HTTP      HTTP transactions are activated for flagged Zones and Applications in the Configuration menu       New chart showing the hits per status       New Hits report page       New        Host and Top Server pages   A new filter input appears in most of forms  custom filters  see Filters     Config sniffer  more settings added     What   s New in 2 14     Sniffer  better sniffing and dumping performance    Sniffer  more accurate SRT DTT in presence of lost TCP segments   Transactions HTTP       More thorough analysis of web applications       New transaction querying mode  used in a new report page       New chart  HTTP performance with Page Load and Hit RT over time   First step of a notification system       Some events are now created by the different
193. gular expression    5 in the name search box     10 7 Some TCP conversations are reported twice  what s wrong     First make sure that the deduplication process is not configured too tightly  If the faulty TCP conversations keep  being reported twice then maybe the duplicated packets are altered in some way that makes them too different  from the originals  For instance  some firewall randomize the ISN  Initial Sequence Number  of TCP connections   for security reason   So if you mirror some traffic before and after passing though such a firewall this traffic will  be reported twice since their sequence number will be different     10 8 Pcap files generated by tcpdump are  mostly  empty    By far the most probable reason for this 18 that you are trying to use a filter on VLAN tagged packets  This won t  work since Tcpdump filters look for fixed locations in the packet and the VLAN tag offsets the actual bytes that are  being matched  Fortunately there is a workaround  by adding the filter v1an all following filters will be offset by  the VLAN tag size  So for instance if you want to filter ip proto  tcp           interface receiving only VLAN  tagged packets then you must use the following filter instead     vlan and  ip proto  tcp     If the network interface receives both tagged and non tagged packet then this somewhat cumbersome filter must  be used           proto  tcp  or  vlan and  ip proto  tcp      10 9 How to do complex searches on domain names     On search boxes ab
194. h this conversation is selected  Thus  it may  be important to consider the priority of a zone in the rare occurrence where the default ordering scheme does not  yield the expected results     For instance  here is a simple configuration  in order of priority       LAN Servers Mail 192 168 1 25 localhost   LAN Servers Web 192 168 1 80 localhost   LAN Servers Fallback   192 168 1 1 192 168 1 100 localhost     LAN Fallback 192 168 1 0 24 localhost   Remote poller2   Internet       27    PV   User Guide Documentation  Release 3 3    Here  we          two servers  for mail and web  that are tested first by IP  if the VLAN is 120 and the poller  if localhost   then all other servers  using an IP range   then the LAN  then the remote site  everything from  poller2  and everything else in Internet     Notice that some fields are unused  MAC  Device   meaning any value will do     Whatever changes are made in the zone tree  a global fallback  here  it   s  Internet  will be created by default  to store any conversation that is not matched by any rule  this remains true even after filters are added for this  zone   Also  this zone is special in that the IP addresses of these conversations will be degraded over time to  reduce storage requirements     Your actual configuration will  of course  be much more complex  Indeed  even the default configuration is larger       Routable Unicast RFC 3587  Routable Unicast RFC 3587 fallbacl  6to4 RFC 3056  Doc RFC 3849  Teredo RFC 4380  Private  
195. han to reveal anything about    the network     License related information such as date of expiry and so on       Averaged metrics such as RTT or DNS response time     BCN and BCA MIBS    Since the 2 9 version  two new modules are available  BCA and BCN  Please update your MIB file if you use a  SPV MIB before 2 9  Here is a tree description of the BCA and BCN MIB     BCA module     t  sactSPVBCAModule  1        spvBCAStateTable  1     t  spvBCAStateEntry  1                 Index  spvBCAName           dee          Gering spvBCAName  1                Enumval SpvBCAStatus  2        Values  Ok 1   Warning 2   Alert 3   NA 4   Nothing 5   NotEnough  6             R      Gauge SpvBCAEURT  3                    Gauge SpvBCASRT  4      qee  R   Gauge SPpVBCASRTCount  3               R   Counter SpvBCASRTCountSum  6         mR  auge SpvBCARTTClient  7               R   Gauge SpvBCARTTServer  8            R     Gauge SpvBCADTTClient  9                       Gauge SpvBCADTTServer  10      t    R   Gauge SpvBCATrafficClient  11      f   emee Gauge SpvBCATrafficServer  12      t       R   Counter BSpVBCATFarfsoClrenrsSumtls     Tee      Counter SpvBCATrafficServerSum 14                      Gauge SpvBCAThresholdMinSRTcount  15           R  Gauge SpvBCAThresholdWarning  16                R   Gauge spvBCAThresholdAlert  17       t  spvNevraxBCATime  2    BCN module  t     sactSPVBCNModule  2        t  spvBCNStateTable  1      d     t  spvBCNStateEntry  1        Index  spvBCNName           
196. hen client server identification is  usually trivial  Unfortunately  most traffic does not fall into this category        n         the client is the peer that actively opens the connection  1 6   sends the initial SYN   But we may  miss the SYN or we may have forgotten it if we have not received traffic for that socket for more than 2  minutes  especially problematic for lengthy connections such as remote control protocols      In either TCP      UDP  we may have indicative port numbers     port number below 1024 on one side and  greater than 1024 on the other is a strong indication of the server location            TCP  we may have seen past SYNs directed at one of the ports  which again gives an indication of that  port being the server       When all else fails  the server is chosen according to a complex heuristic that s mostly equivalent to choosing  at random     4 1 2 Keep Alive    Applicative keep alives are small messages that are sent from either peer to the other when no traffic have used  this socket for some time  They must not be taken into consideration when computing SRT          and so on  The  ica keepalive max size parameter is dedicated to the detection of ICA  citrix  keep alive messages     The standard TCP keep alive packet is normally detected using its size and sequence number  according to the  RFC  In case the previous sequence number is unknown  though  the tcp  keepalive timer may be used as  an alternative  after this inactivity period  any TCP 
197. hich network communication 18 sent    Zone name from which network communication originates    Capture begin time   Capture end time   Average query transfert time    Sum of HTTP hits   Sum of Hits with an error status  4     and 5xx    Average of the hit response time   URL Host    http page count  http page lt  http request length  http request method  http response dtt    Sum of HTTP pages   Average of page load time   Sum of content length generated by HTTP queries   The HTTP method used to query    Average response transfert time     Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Byte quantity  Zone name   Zone name   Zone name    Date and time  Date and time  Decimal or hexa   Duration  Decimal or hexa   Decimal or hexa   Duration   String   Decimal or            Duration   Byte quantity  HTTP Method  Duration    http response length   Sum of content length generated by HTTP responses    Byte quantity  http response server   Software declared as the HTTP server String  http response status   The HTTP response code  1xx to 5xx  ATTP status  http url path URL Path Wildcard or regex  http user_agent User agent String   ip Either client or server IP or subnet Address or netmask  TD cd IP which demand a connection to a server Address or netmask  lp Y IP which replied to a connection demand Add
198. ical IP implementation will delay acknowledging of incoming  data  additional tricks are exploited in order to rule out these software biases      e make use of SYN FIN acknowledgment and some exceptional conditions such as TCP resets  that suffer  no such delays  to estimate a realistic upper bound       exclude unusually high RTT values     96 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3      bound RTT Server Client by SRT CRT if RTT sample set looks suspicious     RTT is meaningful of the bare speed of the physical layer  It is unaffected by packet retransmissions  packet loss  or similar occurrences  RTT may be affected by  from most common to the rarest        Slow network equipment between client and server  such as a router or a switch      Link layer overloaded  ethernet collisions for instance      Malfunction of one of the involved network adapter     These troubles should be further investigated by comparison with other client and or server zones in order to locate  the misbehaving equipment  Notice that a degradation of RTT will almost invariably impact other metrics as well     SRT    SRT stands for Server Response Time     SRT gives an estimation of the elapsed time between the last packet of an applicative request and the first packet  of the server s response     SRT represents the processing time of the server  at the application layer  for a given request  SRT may be affected  by  from the most common the the rarest      
199. icate acknowledgment Packet with null payload  Duplicate ACK are TCP  ACK packets that are identified thanks to their same acknowledgment value and their empty payload     Retransmission Rate  RR  RR stands for Retransmission Rate  RR is defined as the ratio of retransmitted  packets to the total number of packet with a non zero payload in a conversation     128 Chapter 12  Glossary    PV   User Guide Documentation  Release 3 3    Retransmission Total Delay between a packet and the last retransmission  TRD stands for Total Retransmission  Delay  TRD is defined as the time between a packet and its last retransmission     Round Trip Time  RTT  Time between an applicative query and a response at the network level  RTT stands  for Round Trip Time  RTT is defined as the time between a packet with a non null payload and the corre   sponding acknowledgment  a packet with a null payload and the TCP ACK flag      Server Response Time  SRT  Time between a query and an answer at the applicative level  Server Response  Time 18 the elapsed time between a client packet with a non null payload and the corresponding server  response  a packet with a non null payload which number of acknowledgment correspond to the first packet      Session      established communication channel between two devices using TCP  a Session is defined as TCP  communication between 2 devices beginning by a successful Handshake  and ending by a Timeout  or  Packet with the RST flag from any of the devices  or a Pack
200. ide the best analysis   Measurements are more accurate if the probe is located in a central location next to the server and you will get a  wider view on the performance experienced by all the users connecting to this server     INTERLAN  INTERNET     a  4 Co   u    ec EU  7  a 2    2    al    P M    QD Oy iin 7    Local Area Network 1                    Figure 5 1  5     network positioning synoptic    5 1 3 Choosing a traffic capture method    Two main methods may be used to establish a permanent point of traffic capture         or SPAN  A        is     network device which will installed in line on the network and will send a copy of the traffic on one or two  listening ports of the probe  A SPAN  also commonly called port mirroring  is a feature of network switches  that enables a network administrator to send a copy of a given traffic  on one or several interfaces   VLANS to a  mirroring port      The most commonly used method is the SPAN port  port mirroring  mainly because it enables administrators  to monitor potentially any traffic going through the switch  with an existing network device  Collecting traffic  through a SPAN port will likely not generate any additional point of failure on the network and will be regarded  as a minor modification of its existing configuration  Network          are also an option  if no SPAN 18 doable for    39    PV   User Guide Documentation  Release 3 3    example  but the traffic captured will be limited to the network link s  going
201. igretion compatble connections common to twa or more hosts           Commecton Type Port Group Properties                      Connection Settings                Label  Mirror   IE  V AK D                           Vitus Machine Port Group Physical Adapters    Mirror e       no    VLAN ID  AF  4095     Figure 6 16  The following option allows VLAN tags    58 Chapter 6  Virtual Appliance Step by Step    PV   User Guide Documentation  Release 3 3    0   Disables VLAN tagging on port group  4095  Enables VLAN tagging on port group    5  Then click on    Next    and  Finish  to complete the operation           Add Network Wizard 28 42    Ready to Complete  Very that      new end        vSphere standard                ere configured epproonetely     Host networking fl indude the folowing naw and modfed standard switches   Previa     Figure 6 17  Networking Summary    6 3 6 Setup promiscuous parameters     The Esx Server now manages 2 virtual networks     es Resource Allocation Performance Configuration LocalUsers amp Groups Events Permissions                        View    vSphere Standard Switch    Networking Refresh Add Networking    Properties     Virtual Machine Port Group  L3      Network         4 virtual machine s     Physical Adapters         vmnico 100 Ful 0    Io       Performance Vision     Performance Vision 2 9 7 Test TBO  Virtual Tutorial  Supervision  VMkemel Port  L3 Management Network  vmkO   10 1 0 11    9 Sooo       Standard Switch  vSwitch1 Remove    Properties
202. imes and number of packets over time       TOP DNS Servers  DNS traffic and average response time sorted by server       TOP DNS Clients  DNS traffic and average response time sorted by client       DNS Overview     New filters        Synthesis per DNS request types and DNS responses codes     Pulsar    e    vpn    command has been renamed as    support        1 17 4 Major bug fixes      Display of some charts could fail in some cases  long zone names added to long application names     Configuration was not correctly flushed in some cases        t was possible to define two applications on the same port for the same IP or subnet which led to approxi   mate metrics for these applications       Oracle parser could stop working in some cases     Potential deadlock under intensive usage with the implication of several different parsers at once       Fix an issue with Flash player and Internet Explorer that forbids drill down into graphics     1 17  What s New in 2 5 9    PV   User Guide Documentation  Release 3 3    10 Chapter 1  Release notes                    TWO    USE THE PV GRAPHICAL INTERFACE    2 1 Access Through a Web browser    We assume here that the probe has been previously configured through the command line interface and the user  knows the probe s IP address  The probe can be accessed either with SSH or with a Web browser  To connect with  a Web browser  the ports to use are the 80  8080 or 443  For physical  see Configuration  For virtual see Virtual  Appliance 
203. in about a slow access to all applications  both in and out the LAN    Diagnosis    You will find in this section the classical informations to grab in order to diagnose the issue       is the application really slower for this site  You can get this information from the Application Performance  Dashboard     R amp D  Pro  Sales  fallback 8  Internet    Private  fallback     500 1000 1500 2 000 2 500 3 000    Dir                     Figure 8 23  Zone comparison in the Application Performance Dashboard      Does the slowdown occur for a specific application  If so  check S ow application        Does the slowdown occur for a specific server  If so  check Slow server     193 56 4 82   securactive  univ lillel f  217 109 91 178   github com  51 101 233 77 rev gaoland ne    bacchus ierne eu org    50 100 150 200 250 300 350 400 450 500    Dir                     Figure 8 24           comparison between servers in the Application Performance Dashboard    98 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3       Server Performance     Network performance by server               Begin    2011 04 04 13 00 End    2011 04 04 13 30 Mor  yyy mm dd HH MM yyyy mm dd HH MM  Application ssh Protocol  Any    Server Zone  9                Search     Add this page to a report 8  I f Begin  2011 04 04 13 00 00 02 00 Aggregate Level  2 minutes   nto End  2011 04 04 13 30 00  02 00 Number of collected results  17   Sync    Server IP Server Zone Traffic   Conn  estab
204. interval  the  collector will flag the poller as  missing   After these 10 minutes  the collector stops waiting for the missing  poller and restarts its activity  Data integration will be 10 minutes shifted upon missing poller response again  See  example bellow           00   pollerl ok   poller2 ok         data integration    min02   pollerl ok   poller2 fail     gt  wait for poller2  min02     minO4   pollerl ok   poller2 fail     gt  wait for poller2  min02  min04     same  wait more and more poller2 data    minl2   pollerl ok   poller2 fail     gt  integrate data of pollerl for  min02      gt  wait for poller2  min04  min06  min 08        10  minl2     minl4    RA IAN A    pollerl ok  poller2 ok    gt  integrate all data pollerl and poller2    Conclusion                    Data lost  poller2  min02       This may never be developed     46 Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3    5 5 4 How configure a poller          pollers are available via SSH using the Pulsar shell  just like you access to the collector  please refer to Pulsar    A poller shell allows you to configure the poller IP  hostname  etc  But some commands like reset or poller  are not available     The collector s shell allows you to show and to create or delete pollers  To do this  please use the poller  command  help poller for details      5 5 5 Limits    The distributed architecture provided by version 2 5 has some intrinsic limits       There is no feature for deduplication
205. interval over which  all flows are aggregated in the database on their IP src dst  Zone src dst and Application  Individual flows  within the aggregated data cannot be viewed separately  The Aggregation Period defines the data resolution  for an aggregation level     Application Group logical or business related flow to emphase valuable perspective an Application is identified  with a name and a color  and defined by a set of Signature or a set of Port Range  at least one non empty set  of either   a set of client and server zones  A conversation is attributed to an application with the following  rule   PORT RANGE I OR      OR PORT RANGEn OR SIGNATUREI OR     OR SIGNATUREn  AND   SERVER ZONEI         OR SERVER  ZONEn  AND  CLIENT ZONEI         OR CLIENT ZONEn      in case a conversation matches previous rule of several application  the priority will be given to the  application whose definition is the most precise  i e  the thinest port range  signature or server client zone     Application NC NC stands for Non Classified  A NC Application is a special application that will match con   versations that do not match any configured application     Application Port Range Port or range of ports  If not used in conjonction with an IP protocol then apply to both     TCP    or                Collector Central database and Web GUI of Performance Vision  The collector can also host a local poller  and  usually collects statistics from remote pollers     Connection Time  CT  Time taken
206. ion max delay seconds after the root       these transactions will contribute to  the page load time     To be able to dump a root transaction with all these counters we must of course delay the dump of roots as much  as possible  thus raising memory requirements     4 2  HTTP 37    PV   User Guide Documentation  Release 3 3    4 2 5 Protections    To limit memory and CPU usage the sniffer implements these protections     page reconstruction is only active for some IP addresses and TCP ports  client or server   See the HTTP  flag in zone and applications definition       transactions that do not comes from   goes to one of these IP  addresses will not be attached to a root transaction  It will be inserted in database but will be excluded from  page list     the total number of simultaneously tracked and remembered HTTP transactions is limited by  http max tracked  unlimited by default   New transactions above this will be ignored  with catas   trophic consequences on transaction pairing      the total number of simultaneously tracked and remembered HTTP transactions for which we want page  reconstruction is limited by http max tracked for reconstruction  unlimited by default      max size of http save file is limited by http max content size  50k by default      the memory dedicated to the referrer cache is limited by http referrer mem     4 2 6 Limitations    Page load time is the most interesting metric  yet we have seen that many conditions must be met to accurately  recon
207. ions     Limitations    The Automatic Packet Capture feature works under a certain number of conditions to ensure the proper execution  of other services provided by Performance Vision  Among these necessary limitations  you need to observe the  following       The retention of PCAP files is limited by the disk space allocated for captures  in the current version  this  space is limited to 10GB by default  for both manual and automatic captures   When all 10GB are used  no  new PCAP file is saved  You can change this value in    Sniffer Config     page       The maximum retention time for Automatic captures is set to 48 hours  after this delay  Automatic PCAP  will be deleted  This cannot be modified       The sniffer component of Performance Vision 18 set forge 5 000 PCAP files simultaneously  if more than 5  000 conversations are needed  change the parameter in    Sniffer Config     page  otherwise some conversations  will not be recorded at packet level     Please note that the threshold values and voluntary limitations will be reviewed in newer versions in the light of  our experience and the customer feedback we will receive  Please note that if you need an exhaustive trace of a  given set of conversations  you can also use the manual capture feature available through Pulsar     94 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    8 6 4 Triggered Packet Capture    Triggered PCAP are generated from the user interface  either by the resul
208. it                                             ip netflow   Ip  EV   mac   In  c cilt   Hat Vv sry                 MCU Sev   OS                OS SEV   payload  payload clt  payload count  pavload ocoUunteclr  payload count srv  payload ret  payload  ret clc  payload ret srv  payload srv  pkt count  pkt count clt                 SIV  poller name  port                     protostack                                rd indic  Ed zxndic                    rd rate  rd rate   rd rate   rd rate                                             C1t    SrV        Coun     GOUN SEV    Duplicate acks from client to server  Duplicate acks from server to client  Number of session finished   Ethernet Type Protocol   End user response time   Total number of FIN packets   Number of FIN sent by client IP   Number FIN sent by server IP   Either client or server IP or subnet   IP which demand a connection to a server  IP of the netflow capture   IP which replied to a connection demand  Client or Server MAC address   Client MAC  physical  address   Server MAC  physical  address   Client MTU  Maximum Transmission Unit   Server MTU  Maximum Transmission Unit   Client or Server Operating System   Client Operating System   Server Operating System   Total payload   Payload from client to server   Number of IP packets with a payload  Number of packets with payload sent from client  Number of packets with a payload sent from server  Total retransmission payload  Retransmission payload from client to server  R
209. ite portions of packets  Ethernet  source destination  IP Checksum  maybe TOS field   A buggy firmware can result in corruption while  rewriting protocol headers  In this case  the packet will probably be dropped within the network route  Even  if it reaches the destination  the TCP  IP stack won t consider it as a valid packet for the current TCP ses   sions  and the stack will wait the correct packet  It will end in a TCP retransmission  anyway  This problem  will likely occur on the same type of traffic and continuously     ICMP    What is ICMP     ICMP stands for Internet Control Message Protocol and is also a common IP transport protocol  It seems pretty  explicit  although most people reduce ICMP to ping reply commands  a good way to test whether a host can  be reached through a network and how much it takes for a packet to make a round trip through the network     Obviously ping and trace route like tools are very useful for network administrators    but there is much more to  say about ICMP and the help it can provide for network administration  amp  diagnosis  In total  ICMP can be used to  send more than twenty types of control messages  Some are just messages  some others are a way for IP devices  or routers to indicate the occurrence of an error     Error messages    Let s describe the most typical ICMP error messages you can find on networks   ICMP Network Unreachable    Let s take the simplest example  one machine sitting on a LAN  192 168 0 7   has one default 
210. keeping in a local cache the DNS server responses  this approach makes it possible to distinguish between an issue  coming from the user s workstation and one coming from the general function of the network  Please note that  hosts making a very high volume of DNS requests may correspond to a malicious behaviour  for example  some  malwares try to establish connections to Internet by resolving domain names and sometimes the DNS protocol is  used in cover channels to escape information     DNS errors issue    PV   User Guide Documentation  Release 3 3    We can also ask for the top hosts receiving most DNS error messages  non existing hosts  etc    This will also  put the light on misconfigured stations  generating an unnecessary traffic and lowering the overall network perfor   mance     DNS Internal misconfiguration    To do this  we need to identify the AXFR and I XFR transactions towards its autorithy server  If these updates occur  too often  and therefore generate an unnecessary traffic   we can conclude that there is an issue  If the bandwidth  used is too large  it means that our DNS server requests a full zone transfer  AXFR  when an iterative transfer   IXFR  would have been more adequate  If this is the case  then the network administrator can take some easy  steps to improve his network s performance     8 7  Interpretation Guidelines 111    PV   User Guide Documentation  Release 3 3    9 1    CHAPTER  NINE    LICENSING AND UPGRADES    Performance Vision    Covers 
211. kets are set to the last received one     125    PV   User Guide Documentation  Release 3 3    11 5 Upgrading       n some cases  the sniffer may fail to restart after an upgrade and leave some stalled processes if it is  restarted on its own with Pulsar  One of the possible symptoms is that the     11     command in Pulsar  fails to display the poller and license status  Rebooting solves this issue     11 6 Metrics       n versions prior to 2 9  the retransmission rate  RR  was computed as the number of retransmitted TCP  segments divided by the total number of TCP segments  As of version 2 9  it is instead divided by the  number of packets liable be retransmitted  such as the TCP segments carrying a payload        n versions prior to 2 9  keep alive packets occurring after the completion of a data transfer were taken into  account in the computation of the Data Transfert Time  DTT  metric  resulting in abnormally large values   In order to avoid this issue  as of version 2 9  data transfers are considered complete after a 1 second timeout     11 7 Pulsar      Whenresizing the datadisk  console display several occurrences of this error message  parted  sending ioctl  XXXX to a partition   This can safely been ignored     126 Chapter 11  Known issues    CHAPTER  TWELVE    GLOSSARY    Aggregation period Time period over which all data are aggregated into flows  for each set of client  server  and application   The Aggregation Period is defined for an aggregation level as time 
212. kt  count   req class   req name  stege LCY   res class   res name   res rcode  IEGSLVDe      COunt              ip requester  Lowe ey   mac   mec Vo DE  macssry  poller name  Proto   vlan                       zone  zone clt  zone srv    13 2  Custom Filters    Capture begin time   Capture end time   Total traffic   Traffic from client to server   Traffic from server to client   Number of IP packets   Number of packets sent from client   Number of packets sent from server   The DNS class of the request    The name or IP address to resolve    The DNS type of the request    The DNS class of the response    The response to the DNS name resolution request   Code of DNS response    The DNS type of the response    DNS response time    Number of DRT computed in a time interval   Ethernet Type Protocol   Either client or server IP or subnet   Source IP which issued the DNS request for resolution  IP which replied to a connection demand  Client or Server MAC address   Client MAC  physical  address   Server MAC  physical  address   Poller name  distributed probe    Protocol   Tagged Link  802 1Q    Total traffic in both directions   Server or Client Zone   Zone from where the DNS request came from  Zone of the server IP       Date and time  Date and time  Decimal or hexa   Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Decimal or            Decimal or hexa   DNS class  Wildcard or regex  DNS Type   DNS class   String   DNS result   DNS Type  Duration  Decimal or hexa  
213. lished   EURT      X          SRT        RD in   RD out      193 48 186 4 Internet 656 4KiB 1 478ms  30ms 1195 329ms 247ms 241ms      207 97 227 239 Internet 20 0KiB 2 433  5 115ms 268ms 48ms    2 193 56 4 82 Internet 212 5KiB 1 237ms  99ms 137ms  lt lr      77 233 101 51 Internet 7 5KiB 1 93ms  55ms 325 5ms    2 217 109 91 178 Internet 77 8KiB 0 75005 37ms  375  lt  175       Figure 8 25  Server Response Time comparison through Server Performance       Did you upgrade the clients workstations recently  If so  it s a specific systemissue  you may ask the System  Administrator for more details       Did you upgrade your network equipment  If so  the router switch configuration is probably involved       Now we might inspect deeply in the SPV dashboards  Check the Monitoring     Performance Over Time  Chart    13 10 00   14 04 00       RTT in    RTT out  X RD indic in    X RD indic out  e            Figure 8 26  Network Round Trip Time analysis      Do the Retransmission Rate and Retransmission Delay vary  If so  we might face a congestion issue   Take a look at the router s load  etc     1111 22  13 44 00   14 44 00                   RTTin           80 00 ms X RIT out   B   RD indic in   60 00           np indic out  e cT    40 00 ms     1400 00 ms    1200 00 ms    20 00    lt     0       13 50 14 00 14 10 14 20 14 30 14 40    13 44 00   14 44 00    RR out  e           15 0096          Figure 8 27  Retransmission analysis      The general slowdown for a client zone may also be
214. lled  Pollers   They        be either physical or virtual appliances  which send their statistics    to a central Performance Vision unit  called  Collector   All the data is aggregated into a single database and  accessible through a single User Interface     9 2 3 Platforms    Performance Vision probes are available for two different platforms         vmware  cmd    HARDWARE VIRTUAL    APPLIANCES     APPLIANCES      Figure 9 2  Performance Vision Platforms    Hardware Appliances    This product line is based on hardware appliances  specifically tuned for high performance rates  The range of  appliances available makes it possible to provide an adequate solution for all size of situations     Virtual Appliances for VMWare systems    This product line is designed for an implementation in virtualization servers in VMWare systems  The range of  appliances available makes it possible to provide an adequate solution for all size of situations depending on the  resources  CPU  memory and disks  allocated to the virtual instances     9 3 Product Range Summary    Performance Vision           Hardware Virtual    i                  Express Full Poller  500 1000 2000 4000 5181010        Collector   Small    Collector  a Poller   Large            Small    Medium n a  a Large    Figure 9 3  Product Range Summary    Our product range is summarized in the following way   1  Hardware Appliances  1U  amp  2U Servers   e Performance Vision  all features      Poller  remote probe for distribut
215. ly identify that this was due to a degradation of RTT  Round Trip Time   indicator of network  latency  and not to the Server Response Time  SRT  or the Data Transfer Time  DTT      From this graph  we can conclude that the server and the application are likely not to have any relationship with  the slowdown  By looking at the two bar charts which show respectively the breakdown by server and by client  zone  we can draw the following conclusions       This application is distributed by one server only  192 168 20 9     The EURT vary in large proportion between client zones  mainly because of RTT        VLAN Sales has a much worse access to the application than VLAN_R amp D  mainly because of the network  latency     Getting confirmation of our first conclusions  By clicking on the peak of EURT in the upper graph  we can narrow  our observation period to understand better what happened at that point of time     This confirms the following conclusions  RTT went up for the VLAN Sales  only      Understanding what is the perimeter of the slowdown    We now know that only VLAN  Sales was impacted by this slowdown  due to a longer network RTT  We therefore  need to understand whether this was general  1 e  impacted all clients in the zone  or isolated to certain clients     102 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    c   Application dashboard   Applications behavior analysis    Start after  P 2010 06 07 14 00 Start before     2010 06 07
216. mbination    Ctrl   Alt   To configure the probe  please refer to the Pulsar  chapter  After configuration you have to reboot the virtual applicance     5 6 5 License    Except the experimental virtual appliances for testing provided from our Web site  the virtual appliances are  delivered without license key  You normally receive this key by e mail at the product s delivery  If it is not the  case  please contact our sales department  sales  securactive net  sales   securactive net      To install a license package  as well as an upgrade package   proceed as usual  see Licensing and Upgrades      5 6 6 Capturing traffic    Virtual appliances are configured with only two network interfaces        ethO for administration       eth  for sniffing traffic  Any additional virtual adapters you may add will be listened for traffic by the packet sniffer   Actual packet capture depends on the virtual switch you are using     In the realm of VMWare   s bundled Virtual Switch the promiscuous mode  beware that name is misleading   is actualy a port mirroring  Also  depending on the virtual switch configuration  if the packet sniffer sets the  promiscuous bit of the ethl virtual adapter  the mirroring mode will be activated automatically  Refer to the  Virtual Infrastructure Client manual  http   www vmware com  for further details     Under VMware Player you need to configure eth  as a bridged device  and give permission to the virtual appliance  to turn it into promiscuous mode     Othe
217. mption  Retransmission Rate  RR  and Round Trip  Times  RTT      A specific configuration screen allows configuring the specified BCN  To access it  just go to the Configuration  menu and choose the entry labeled Business Critical Networks     List of Business Critical Networks        v Link between zones  Private and Internet       Network zone from  Private 7  Network zone to  Internet  Threshold  Warning Alert  Bandwidth Available  10 0 Mibps  Min  Volume for triggering  0 1 Mibps  Symmetric Link        Delete    Ap        gt  Link between zones  Fileserver and Private        gt  Link between zones  All and Broadcast        gt  Link between zones  Remote and Local        gt  Link between zones  ZoneTest and Internet        gt  Link between zones  Private fallback and All                Figure 7 11  Editing an existing Business Critical Network    7 3  SPV Functional Configuration 73    PV   User Guide Documentation  Release 3 3    From here you can add a new BCN or edit the parameters of an existing BCN  Modifications will also be applied  on already captured traffic     For each Critical Network  you have to configure the following parameters     The source destination network zones       One or several thresholds for both Warning and Alert levels  all these thresholds are computed from  source to destination and not from client to server  We call this an    oriented    metric         Oriented latency  RTT in ms       Oriented retransmission rate  5       Utilization rate
218. n and a keyboard to the probe  for first set up only  and then to provide  electrical power  Once done  just turn power on     For the screen  the connectivity 18 a standard        port  Two are available  one is located on the front side of the  probe  the other is located on the rear side of the probe     For the keyboard  you can plug it to any of the four USB ports  Two of them are located on the front side of the  probe  the two others are located on the rear side of the probe     By default the probes are equipped with four Gigabit Ethernet interfaces labeled 1 to 4  The first one 1s the  administration port used to connect to the probe  Plug the Gb1 network interface to your network to be able to  connect to the probe  The three others interfaces  2 to 4 are dedicated to network traffic sniffing  Connect one  or more of these interfaces to your network according to the network traffic you want to analyze and monitor     7 2 Pulsar    The probes come with a Command Line Interface named Pulsar  This allows the user to check the probe state and  configure it when needed     7 2 1 Connect to the probe    If this is your first encounter with the probe  you will have  for the first time only  to access to the probe physically   just use a screen and keyboard plugged to the probe   Log in with user admin and default password admin   Once the network address of the the probe will have been set up you will be able to access to it directly through  SSH on port 22 also with the s
219. n the NETWORK section     The matrix is presented as follows                                      E Private Local  Clients Servers  Dest  WIFI Backup DMZ VMware ESX Web   WIFI Guest DMZ External  Source Total 843 5 MiB 128 5 MiB 763 0 KiB 274 6 KiB 2 0 MiB  790 2 MiB 6 5 MiB 576 1 KiB 207 3 KiB 1 1 MiB   Private Local Clients WIFI WIFI Guest 842 8 MiB       789 5 MiB       Servers Backup 128 9 MiB mm  86 9 MiB    DMZ DMZ External 394 1         207 3 KiB          VMware ESX 142 1         74 8 KiB    Web 2 7 MiB  2 0 MiB    Figure 2 14  The detailed Matrix    The matrix will show a mapping of all flows as follows     blue cells represent the total for a zone  the sum of all the values in a row or in a column         green to red colored cells represent the traffic from one zone to another zone  The color represents the  relative value regarding the maximum value of the whole matrix  red 18 the largest value displayed      20 Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3    In the matrix above  we can see that there was 142  1   of traffic from machines in the ESX zone to the machines  in zone Wifi Guest  The opposite direction  shown in blue  tells us that the traffic on the machines from the  Wifi Guest zone to those in the ESX zone amounted for 274KiB     There are two types of matrix presentations     the detailed matrix  which displays a zone and all its child zones  show how zone is spread in its subzones     The matrix above 18 su
220. n troubleshooting  this view  can display       TCP conversations where the sessions are not ended correctly  Timeouts  RSTs  etc  This may help you  understand when you can observe disconnections  if the client or server side is responsible for it     IP  Application Traffic Payload   Packets   Conn  attempts   Conn  established   0 Win   RD indic cit   RD indic srv   Dup ack   Sess  end   Num  timeout   Client RST    Server RST     Web test 11MiB 828 6 KiB 5042 228 228 255 36 228 94 334 2  39 m https 320 5KiB 192 1 KB 1885 126 246 126 247  90    https 1 4 MiB 1 2 MiB 4190 76 12 8 64 12 66  32    https 13MiB 1 0 MiB 4217 53 1 53 53  B NCtcp 210 1KiB 160 7      832 30 30 24 16 30 10 24 6  m https 2904 KiB 257 9 KB 606 22 22 21 1 22 19 21  m NCtcp 1249      99 8KiB 424 12 12 12 3      2 12 7 12  m https 299     23 3KiB 96 6 10 1 8 10  m https 445 2        407 9      699 14 14 9  m uctep 24MiB 2 2 MB 2819     https 25 1 KiB 18 9 KB 101 7 7 7  m http 724 7 KiB 656 7 KiB 1127 45 45 7 1ms 11 45 1  724 7 KIB 656 7        1127 45 45     https 923KB 818  8 196 7     7  m https 382KiB 29 0 KB 145 9 9 7  129 8        121 3 KiB 143 2    1ms 10 45 1         gt                        ti 2 2   ti 171 0 KiB 150 8      335 12 12    7 12  t 8032       7257     1277 56 56 18 5  ttps 123 5       105 2 KiB 301 12 12 E 7 12  CRM SFDC 2109       184 2 KiB 504 6 6 6 20 6 4                                          4                 Bad transmission rate  if the data transfer is slow for a specific a
221. nalysis      Top URL    Calls volume  Conversations Conversations Conversations                         Raw Data      PROTOCOLS    Name Services       Performance    Flow Details  All Metrics  SQL ICMP     Performance              IP Server Errors       Top IP Client Non Ip         Top Query          CIFS       overview       Performance       Overview         rs      Top IP dient                                             Top Protocols  Traffic                  Figure 2 17  Overview of the relation between the metrics     If some TCP connections are slow  it is also possible to go directly to the protocol analysis if available  If they   re  actually SQL connections  an SQL icon will be available on the corresponding lines  and clicking it you will see  all the SQL analysis that matches these TCP connections  Likewise for HTTP transactions or other metrics  we    are able to analyze in details                                                        Sync       Server        Application Stack  CIFS        s shoute e B             TCP Netbios CIFS        Q os ShowtheCIFSt on Wi cis TCP   Netbios         5  8 Application Stack  DNS               Q       domain       IPv4 UOP   DNS Ll  Flows         Sync  14  Server MAC Application Stack  HTTP    Q cp    Show the TCP events of this conversation m http               4                  Li     Q wm Show the HTTP transactions for this conversation  E http         4                    Sync  14  Server MAC Application Stack  SQL p     
222. nd Time Client Zone Client IP    Server Zone Server      Application Traffic Packets   Handshake   Transactions   EURT  7  2010 07 30 16 41 56 ivate 192 16 2 Internet 88 191 122 7    A      2010 07 30 16 38 47       Figure 3 11  Flow aggregation from 16 38  0 16 42    Observe that the traffic  and the packet  handshake and transaction counts have been added  and the EURT aver   aged  For example  the handshake is now 19  12   7      Note  Performance Vision requires a complete set of data for an aggregate level to compute its summary  This  is the reason why captured network events don t appear right away on your probe  The probe first waits until the    end of the minimal aggregate time of 2 minutes  computes its summary  and only then is the aggregated data for  these last 2 minutes made available in the interface     34 Chapter 3  Main terms and concepts    CHAPTER  FOUR    METRICS COMPUTATION    Here  you can find details on how some of the less obvious metrics are computed  and how they are affected by the  sniffer configuration  You may safely skip this section unless you need a deeper understanding of how the sniffer  Works     4 1 Conversations    Many generic metrics are computed on TCP streams  To be able to interpret these correctly  it may be useful to be  aware of a few things     4 1 1 Client or Server     To find out which peer 18 the client  the sniffer tries several options          f it understands the protocol at hand  and has successfully identified it   t
223. networks to  govern the QoS of each packet  No standard meaning being assigned to given values  only the raw numeric  value is reported  For a given conversation  the probe keeps only the biggest DSCP encountered  In practice  a whole conversation should be governed by a single DSCP value     127    PV   User Guide Documentation  Release 3 3    End User Response Time Total time the user waited to get an applicative answer  The EURT stands for End  User Response Time  EURT 15 defined as the sum of the RTT  client   server   the SRT and the DTT  client    server   A timeout will cancel the computation of EURT     Fallback By convention  a zone which collect a larger set of addresses that includes addresses of other  more  specific zones  See Fallbacks for more details     Flow Regroups data exchanges between two network addresses for one application on the aggregation period  A  flow is a group of communications between two network addresses for one application during the aggrega   tion period  Notice that the VLAN tag  if present  as well as the device identifier  are considered components  of the network address     HTTP hit A HTTP hit designate a single HTTP transaction  used to build a HTTP page  This 18 typically an  image  a script  a stylesheet    The transaction to obtain the HTML is itself considered as a hit  Thus  a page  that contains 2 images and 1 stylesheet  all stored in different URLs  is made of 4 hits     HTTP page A HTTP page 18 the set of HTTP transactions 
224. ng a flow if it s  overloaded  The network may skip forwarding the datagram if it s congested     To make things worse  SPV does not currently report missing netflow frames     5 7 4 Limitation regarding content  Instead of the many measurements undertaken from the mirrored packets  netflow provides only mere volumetry   such as  for each IP address  protocol and ports      start stop timestamps     packets and bytes count     number of packets      number of TCP SYNs  FINs  RSTs     ToS      switch input output port numbers    50 Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3    5 7 5 Limitation regarding collection    Netflows are typically exported only after each individual flow 18 idle for more than a given timeout  grows larger  than a configured threshold or is active for more than a given duration  This later parameter is an important  concern  If the max age of a netflow is allowed to exceed SPV data integration period  2 mins  then received  netflows risk being late for database insertion and ignored     This is much shorter than most installations  For instance  default activity duration for CISCO equipment is  typically 30 minutes     Attention  Configure all your netflow emitters to expire flows after not  much  more than 2 minutes     5 7  Netflow 51    PV   User Guide Documentation  Release 3 3    52    Chapter 5  Deployment    CHAPTER  SIX    VIRTUAL APPLIANCE STEP BY STEP    6 1 How to get the image of the Virtual Appliance    You can get
225. ng of the response  you can use the feature Follow TCP stream  in the Analysis  menu      Conditions  Packets are saved by Performance Vision  as soon as the conversation they belong to matches a certain number of  conditions       If Capture HTTP if checked in a Zone then if an IP address matches the zone subnet  either as client or  server        If Capture HTTP if checked in an Application the  if a port or      IP address matches the application  either  as client or server      e And one of the following metrics is considered as out of the norm       Server Response Time  SRT  for TCP flows      Retransmission Rate        DNS Response Time    8 6  Packet level analysis 93    PV   User Guide Documentation  Release 3 3                  SEXES          2  sj  a qaa ay mxim       ytes yt ts  B Ethern net II  Src                      26 64  00 23 76 52 26 64 2  Dst  NexcomIn Oc f3 ae  00 10 f3 0c f3 ae   m    Inter  met Protocol  Src  192 168 50 50  192 168 50 50   051  216 52 242 80  216 52 242 80       36        40 00 40 06 59      C0 a8 32 32 dB 34  e   aa 11 Oe 00 00 00 00 40 02  30 02 04 2990 9 01 4b   00 00 00 00 01 03       M i  Packess  48 Displayed  48 Marked  0 Load tme  0 00  174          Figure 8 18  Viewing packets in Wireshark       traffic pcap   Wireshark  gt  a               1307 393997 ex 27                              jkkzrsvcpn ior 3kapnipndzgnhxr s NB SZ YOAPkTejAPe  jctrc3d9bePhbinitgDBbbP8Ndzcwdz  StS mm  red I EML  comm afe   17              UTPAL A 30
226. nk Local Multicast Name Resolution   mDNS  Multicast DNS   NDNS  Net   BIOS Name Service   WINS        Distributed poller management     1 17 3 Changes    Network sniffing      Automatically detects and listens again to network interfaces that come back up after a downtime period       At startup  automatically adjust and fine tune deduplication parameters for the best balance between pro   cessing power required and deduplication efficiency     Reporting      User   Password   TLS security support      User can customize    From    field when sending a report       Reports stored as PDF files on the probe and available through ftp     GUI      For Business Critical Networks  the Retransmission Rate threshold can now be    190     Configuration area reorganized for clarity      n the Configuration area  delete buttons are now more intuitive       Animation when running a request  to avoid overloading the probe by launching the same request several  times      8 Chapter 1  Release notes    PV   User Guide Documentation  Release 3 3      The timeframe selection in the  Watch last  filter is now more intuitive      When a filter is set to some value  it will be highlighted to be more visible       n Non IP traffic screen  data can be filtered by MAC address      Bookmarked pages now have their own specific title instead of a generic name       n DNS screens  the filter on request types are now sorted alphabetically      New Screens      DNS Performance Graph  with DNS response t
227. nly used to monitor the network traffic between two points in the network  If the network between these  two points consists of a physical cable  a network TAP may be the best way to capture traffic  The network TAP  has at least three ports  a port A  a port B  and a monitor port  To place a tap between points A and B  the network  cable between point    and point B 18 replaced with a pair of cables  one going to the           A port  one going to  the TAP s B port  The TAP passes all traffic between the two network points  so they are still connected to each  other  The TAP also copies the traffic to its monitor port  thus enabling an analysis device to listen  Network TAPs  are commonly used by monitoring and collection devices  TAP s can also be used in security applications because  they are non obtrusive  are not detectable on the network  can deal with full duplex and non shared networks  and  will usually pass through traffic even if the tap stops working or loses power     Advantages       No risk of dropped packets    Monitoring of all packets  including hardware errors  MAC  amp  media       Provides full visibility including congestion situations    Drawbacks      The device may require two listening interfaces on the analysis device    Costly    No visibility on intra switch traffic      Not appropriate for the observation of a narrow traffic range     5 3 Supported Protocols    The SPV sniffer can detect all Ethernet packets even if those packets have a VLAN tag
228. ns  DNS    servers  hostname  IP address  NTP  SMTP            Some changes in configuration require to reboot the probe  command  reboot      7 2 3 Restore probe state  You may need to restore some probe original configuration  There are three way of achieving this  As these are  destructive commands a strong confirmation will be requested     You want to erase any single data from your previous network captures  This preserves configuration settings and  IHM user accounts     pulsar  reset data    Stopping services     Deleting data     Done     The command reset a11 will destroy both your configuration and capture database  You will have a fresh new  database  Configuration settings  users and pollers will be reset to default values     pulsar  reset all    Stopping all services     Resetting      Creating default settings     Done     64 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    7 2 4 Formating data hard drive disks  This is to be used when you are delivered new data disk s   If you want to use it anyway  any existent data  capture  and configuration  will be lost  Default values will be restored     pulsar  format data disk    These processses should not be interrupted  Do NOT use Ctrl C   Preparing disk   Formatting disk   Installing disk   Generating database   Ihis may be quite long  5 min    Done     7 2 5 Listing running processes    The process command list all the processes running on the appliance as well as their uptime     pulsar
229. ntis tend to respond much slower than Brax  By clicking on it  having a looking at a second dashboard called Server Application Dashboard  we shall be able to determine if this  permanent or punctual and whether this due to the load on this application or on another one hosted on the same  server     3rd element  EURT by Client zone    Breakdown by zone  client     E m oim         E    B    j      Figure 8 11  EURT by Client zone    What we can see here is a breakdown of the EURT for this application between client zones  at one glance   you can determine which zone was impacted by the degradation and what are the different level of experienced  performance depending on where users are located  For example  from the screenshot here above  we could  certainly think that mainly one zone was impacted by the SRT degradation and also that there are some significant  differences in performance between zones due to differences in RTT values  network latency      8 4 3 Drill down dashboards    SecurActive APS offers two additional dashboards     Client zone   application dashboard        Server   application dashboard     Client zone   application dashboard  You can access this dashboard either through the menu or by clicking on a specific client zone in the Application  Dashboard   This dashboard contains three bits of information      EURT graph through time for this client zone and this application       EURT breakdown by server  so that you can compare the performance offered by 
230. ocumentation  Release 3 3    Report settings    General    Name  89 Report proxy  Description  00 This report describes the different flows received by  the proxy    Language   2 English 21    mer support securactive net  Scheduling settings    Report every  1 Day    Period and time    Start at     23 55    From   2  2012 06 19 To   YYYY MM DD       Figure 7 12  Create a new report        Week  Generates the report every x week s  the selected days  example  every two weeks on Friday   several days in the week can be chosen          Month  Generates the report every x month s  on y day  example  every month  the first of the month   be careful  if you choose the day 29  30 or 31  you will only receive your reports if there is such day  in the corresponding month        Start at defines the hour  format HH  MM  at which the generation of the report will start  Once the  report will have been generated it will then be sent to the recipients email addresses       From and To fields are optional  This allows you to define a validity period for the report  In such case  the  report will only be sent in the period ranging from the first date up to the second date     25 Report configuration    4   Create a new report    Available reports     Sent every 2 day at 23 55 00  To  supporti securactive net  Containing 3 vlews        Edit    Send Now            Figure 7 13  Report  A template just created    The new report template just created will appear in the list of available report t
231. odified time interval is the actual observation period     Operating System  OS  Different operating systems implement the core network protocols differently  The  probe attempts to guess the operating system that s used at both ends of a conversation based on these  differences  This information  even if inaccurate and unreliable  can still be used to help identify a host or a  network trouble     Poller Remote probe that listen and analyze the network traffic to produce statistics that the collector will fetch  and insert into the central database     Protocol Stack The various protocols identified in a flow  For instance  an HTTP conversation that s carried  in TCP over IP over Ethernet may be reported with the Eth IPv4 TCP HTTP protocol stack  whereas  in case of a IPv6 in v4 tunnel the protocol stack would be Eth  IPv4 IPv6 TCP HTTP  Not only this  notation makes all sort of tunnels visible but it also make apparent some protocols that are detected by the  sniffer despite running on non standard ports     Retransmission Packets being resent  when they have either been lost or damaged  Packet Retransmission is  identified thanks to their TCP sequence and acknowledgment numbers  and checksum values  Only packets  with a non null payload are checked     Retransmission Delay  RD  Delay between a packet and it s next retransmission  RD stands for Retransmission  Delay  RD 18 defined as the time between a packet and its next retransmission     Retransmission Duplicate ACK Dupl
232. oes not belong to the company s workstations  external consultant on the network  whose laptop is  trying to reach common resources on his home network  DNS  printers        or it may be the machine of someone  coming from a remote site with its own configuration or a machine that has been simply wrongly configured     How would we see it     A large number of ICMP Host Unreachable errors coming from one or several routers to this machine or this  group of machines  The          information contained in the payload of each of these errors would probably show  they are trying to reach a certain number of hosts for some services or applications     Migration legacy  A certain number of machines keep requesting DNS resolution to a DNS server which has been migrated  this    could be true for any application available on the network   Their users certainly feel worse performance when  trying to use these services     108 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    How would we see it     A large number of  CMP Host Unreachable errors coming from one or several routers to a group of machines   The ICMP information contained in the payload of each of these errors would probably show they are all trying to  reach the previous IP address of a given server     Network device misconfiguration    A router does not have a route configured  some machines are trying to reach some resources  unsuccessfully     How would we see it     A large number o
233. omatically authenticate your request using Basic HTTP  Authentication     2  Your download client may require the server itself to initiate the Basic HTTP Authentication process  For  instance  wget does so when you omit the   auth no challenge option  If so  you can instruct SPV  to initiate the process by appending  amp auth force http to the query string part of the URLs     NB  Basic HTTP Authentication does not protect your credentials from snooping  You may thus want to use  https    URLs instead of http         13 3 3 Scripting Examples  In the first example  we will retrieve the Top Servers page as stripped down HTML  filtering for the SSH applica   tion  using the command line with wget        Using the   auth no challenge option   wget   user admin   password admin   auth no challenge  http   SPV   skint  simplehtm_ nevrax netw       Using the  auth  query string parameter   wget   user admin   password admin  http   SPV   tskinct simplehtml nevrax network ipstats dst html    In the next example  we will retrieve the Bandwidth Chart page as a PDF  using the command line with cur1        curl will automatically initiate Basic HTTP Authentication when you pass credentials with the  curl  u admin admin  http   SPV  c   skinttpdf nevrax network bw chart page html filter capture              If HTTPS is used to keep your credentials concealed  your client may need an option to skip the server certificate  check  Here is an example with wget        Same wget query as abov
234. ome extent on the quality of the measurement provided by RTCP  Please  note that MOS is not very sensitive to    normal    latency values  When referring to voice or media  we refer to the    RTP traffic  which may correspond to different things  human voice  prerecorded message  ring back tone  busy  line tone       The VoIP module discards the jitter and packet loss data present in the RTCP flow and replace them  with equivalent values computed internally  This is so for several reasons        t was observed that many softphones do not place accurate  or even credible  values in these fields       RTCP stream is more often missing than present  probably because it is firewalled and of little use to the  VoIP client software     84 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    For the VoIP module to remain passive  there is no other option than compute these values for every RTP stream  to generate jitter and packet loss values which will be a good estimate of the real jitter and loss experienced by  both users  This is how  even  in the absence of RTCP stream  we can display a jitter and packet loss count  and  no RTT  and thus no MOS      8 3 5 VoIP Views    VoIP Overview    VoIP Overview is a view of all VoIP traffic in the network  zone per zone       Number of calls        MOS value    Packet loss  global or caller   callee     Jitter  global or client   server     RTT  global or client   server     Note  The value    caller       
235. on  Release 3 3    Table 13 10     continued from previous page  0xc0000043   SMB STATUS SHARING VIOLATION  0xc0000044   NT STATUS QUOTA EXCEEDED  0xc0000045   NT STATUS INVALID PAGE PROTECTION  0xc0000046   NT STATUS MUTANT NOT OWNED  0xc0000047   NT STATUS SEMAPHORE LIMIT EXCEEDED  0xc0000048   NT STATUS PORT ALREADY SET  0xc0000049   NT STATUS SECTION NOT IMAGE  0xc000004a   NT STATUS SUSPEND COUNT EXCEEDED  0xc000004b   SMB STATUS THREAD IS TERMINATING  0xc000004c   NT STATUS BAD WORKING SET LIMIT  0xc000004d   NT STATUS INCOMPATIBLE FILE MAP  0xc000004e   NT STATUS SECTION PROTECTION  0xc000004f   SMB STATUS EAS NOT SUPPORTED  0xc0000050   SMB STATUS EA TOO LARGE  0xc0000051   NT STATUS NONEXISTENT EA ENTRY  0xc0000052   NT STATUS NO EAS ON FILE  0xc0000053   NT STATUS EA  CORRUPT ERROR  0xc0000054   SMB STATUS FILE LOCK CONFLICT  0xc0000055   SMB STATUS LOCK NOT GRANTED  0xc0000056   SMB STATUS DELETE PENDING  0xc0000057   NT STATUS CTL FILE NOT SUPPORTED  0xc0000058   NT STATUS UNKNOWN REVISION  0xc0000059   NT STATUS REVISION MISMATCH  0xc000005a   NT STATUS INVALID OWNER  0xc000005b   NT STATUS INVALID PRIMARY GROUP  0xc000005c   NT STATUS NO IMPERSONATION TOKEN  0xc000005d   NT STATUS CANT DISABLE MANDATORY  0xc000005e   NT STATUS NO LOGON SERVERS  0xc000005f   NT STATUS NO SUCH  LOGON SESSION  0xc0000060   NT STATUS NO SUCH PRIVILEGE  0xc0000061   SMB STATUS PRIVILEGE NOT HELD  0xc0000062   NT STATUS INVALID ACCOUNT NAME  0xc0000063   NT STATUS USER EXISTS  0xc0000
236. on 2  and enter the proper SNMP community  in  accordance to the SNMP settings of the collector  You must use a bigger SNMP timeout than the default one  On  the screenshot below you can see we set a timeout of 20s     nsole   graphs       Console     Devices   gt   Edit  Logged in as admin  Logout  ogo    Devices  new     New Graphs General Host Options    Management Description  Graph Give this host a meaningful descnption   CactiTest   Management Hostname  I92468 10236    Graph Trees Fully qualified hostname or IP address for this device  192 168 10 236    Data Sources Host Template        Choose the Host Template to use to define the default Graph Templates and Data Queries associated with this Host  SPV   Central Collector jm          Devices     Number of Collection Threads                The number of concurrent threads to use for polling this device  This applies to the Spine poller only  1 Thread  default  Ir  Disable Host   Dats Queres Check this box to disable all checks for this host     Disable Host                     Availability  Reachability Options  Downed Device Detection   Templates        The method Cacti will use to determine if a host is available for polling  SNMP Uptime            Graph Templates   NOTE  It is recommended that  at a minimum  SNMP always be selected        Host Templates          Timeout Value 400  Data Templates        timeout value to use for host ICMP and UDP pinging  This host SNMP timeout value applies for SNMP pings        Ping R
237. on 2 5 13  the filename will evolve depending on the version number   The ZIP archive will contain the following files       SPV 2 5 13 r2 mf  ee SPV 2 5 13 r2 ovf    SPV 2 5 13 r2 diskl vmdk    5 6 2 Virtual hosts settings    Performance Vision virtual appliance is designed to run in a VMWare ESX v4 or v5 environment  It can be  lounched with a minimum of 512MB of RAM although a larger quantity is recommended to ensure satisfactory  performance rates     However all settings cannot be tested  in case of doubt it is recommended to fall back on these tested settings   e RAM  512MB  4GB  6GB  8GB  12GB or 16GB       CPU  1 4 or 8     5 6 3 Installation    1  Connect to your Vsphere Client and then in the Virtual Machines tab  in the    File    menu  select    Deploy a  new OVF template        Find and open the Performance Vision OVF file     Click on  Next  twice and then accpt the license agreement      Name the Virtual Machine appropriately  SPV applicance for example         A      N      The system detects the space available on the disk for the new Virtual Machine  we recommend to allocate  the following spaces        Trial Virtual Appliance  4GB RAM  2 vCPU  gt  2 0 GHz     Virtual Poller  8 GB  2 vCPU  gt  2 0 GHz   e Virtual Appliance   gt  16 GB  4 vCPU  gt  2 4 GHz   You get     Deploy OVF Template       Ready to Complete  Are these the options you want to use        C  Documents        SettingsYfranck DesktopYemwarelAPS        1 1 GB  16 0 GB    Ready to Complete    
238. onip      Created graph  CactiTest   Traffic   eth     Created graph  CactiTest   Disk Space          Created graph  CactiTest   Disk Space    srv          Figure 13 10  Summary    Congratulations     You now have many new graphs to monitor both your PV and your network  Do not forget to create new graphs  for the new BCA BCN you may add in the future     Creating a device for your probe    Although monitoring a probe is much less interesting since you won t be able to fetch any BCA BCN from a mere  probe  you can still add your PV probes in your Cacti monitoring system by following almost the same steps as  above  only selecting a device of type PV   Probe instead of PV   Central Collector     134 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3                         Figure 13 11       graphs displayed    13 1 2 How to integrate your APS with Nagios    Introduction  Nagios is a powerful tool to easily monitor IT network and servers  It can alert on reachability issue  software    or hardware problems  But it   s much harder to alert on    End User Response Time   With the help of the SNMP  module of your PV probes you can add new check on Nagios to perform this and other advanced checks     Prerequisites    PV side      The license cannot be a Free or Express version to enable SNMP    Enable the PV SNMP via SSH  user admin  with command snmp start       Create at least one BCA or one BCN     Network side      Network access from Nagios server to PV host f
239. ons      The purpose of the Business Critical Application Dashboard  BCA  is to have  regrouped into one single view   the most important elements that are critical for your business  In one single screen vital information is presented  to people in charge in order to radically improve early diagnostics and impact analysis  The right information  is directly available through a completely configurable and dynamic dashboard view  What is monitored is the  EURT  End User Response Time  metric  Thus  this dashboard reflects the quality of experience of the users for  the selected critical applications        n red  poor quality      n orange  medium quality      n green  good quality      n grey  not enough data gathered    Application            r time Traffic   Transactions            5 246  eS                             M Web Portal       Figure 8 1  Business Critical Application Dashboard view    8 1 1 Business Critical Application Dashboard Capabilities      You can customize the business critical dashboard to view specific applications and metrics corresponding  to your specific business     e From the BCA dashboard  you can drill down from the general view to detailed analysis and problem  resolution views     81    PV   User Guide Documentation  Release 3 3                Internal     7  A    Capture time  2010 10 25 14 52 00     https EURT  3 85   Transactions  128  B Salesforce   App  Dashboard              dashboard 4 Conv    NC          E    PP       Figure 8 2  Qui
240. ons    Any application can be tagged as Business Critical  Those applications are used to display the  Business Critical  Application Dashboard    To flag a given application as critical  or remove this flag   edit this application by  clicking on it on the application list and toggle the Critical Application checkbox     When you flag an application as Critical  three additional parameters are requested       The minimum transaction count  It indicates  for one minute  the minimum of SRT  Server Response  Time  events to be seen on the network for being considered as a pertinent measurement  If no transaction  at all is seen during the period of time analyzed  the color displayed on the BCA dashboard will be    white      If the number of events seen during the period of time analyzed is above zero but under this value  the  color displayed on the        dashboard will be                 It means that some events have been seen  but not  enough to be considered as a pertinent measurement  If the number of events seen during the period of time  analyzed is above or equal to this value  the color displayed on the BCA dashboard will be either    green         orange    or    red    depending on the EURT values     72 Chapter 7  Configuration    PV   User Guide Documentation  Release 3 3    Analyze HTTP  Capture PCAP  Critical application v  Define as a critical application    Min transaction count 0  Thresholds  Warn 800 ms    Thresholds  Alert 1000 ms    Remove Cancel Update  
241. or protocol SNMP  UDP port 161     Nagios Side       A Nagios script can be download from our website  http   download securactive net pv misc nagios nagios  pv  snmp pl   or on github  https   github com securactive nagios PV  snmp       Nagios v3    e Perl5    e Perl libraries   Net  SNMP and Getopt  Long  you can install them with cpan       Script must be executable by Nagios  chmod  x nagios      snmp pl     Command line usage    Help      nagios pv snmp pl   help    13 1  Integration with other Tools 135    PV   User Guide Documentation  Release 3 3    SNMP Network PV Monitor for Nagios version 0 4  GPL licence    Usage    nagios pv snmp pl   h    v   H   host     C   snmp community      2      1 login  x passwd             verboes  print extra debugging information   h              print this help message   H    hostname HOST  name or IP address of host to check   C    community COMMUNITY NAME  community name for the host s SNMP agent  default public           10 610581 081111  X        DasSSwd PASSWD              20  Login and auth password for snmpv3 authentication  If no priv password exists  implies AuthNoPriv   2  use snmp v2c         privpass PASSWD  Priv password        snmpv3  AurthPriv protocol    L         Drotocols eesuthproto    Drivproto    lt authproto gt    Authentication protocol  md5 sha   default md5    lt privproto gt    Priv protocole  des aes   default des    P       port PORT  SNMP port  Default 161      1       insensitive  Case insensitive for r
242. orm of GET parameters   http   DOMAIN PATH filter fieldl1 valuel amp filter field2 value2    If the capture begin or capture end filters are omitted  the engine will instead request data for the last  hour     The URL can       parameterized 10 ask      engine to render the output either  as stripped down   HTML       as PDF This is done by  prepending  respectively     152 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3       skintt tsimplehtml            skin  pdf  to      path        of the URL   http    DOMAIN   skin  pdf PATH filter fieldl valuel  filter field2 value2    NB  This is the same kind of URL you get when you click the    Export as PDF    button in the user interface     13 3 2 Authentication    SPV normally uses its own authentication forms  which you see whenever you log in the user interface with a Web  browser  This authentication system uses cookie based sessions to keep you logged in  which can be inconvenient  to support programmatically     SPV therefore also provides support for session less access with the Basic HTTP Authentication mechanism   Command line download clients like curl or wget support it natively     There are two ways to switch SPV over to session less Basic HTTP Authentication     1  Your download client may support it automatically  curl does  wget does if you pass the    auth no challenge command line option  In this case  pass your login and password in the nor   mal way supported by your client  and SPV will aut
243. ot reachable  either the source machine is scanning or it is misconfigured and tries to reach  a service which no longer exists or has been migrated      This view is great to pinpoint configuration and infection issues     Packets    Traffic We Code rc r zone stemoriP 7  Dsterror zone  5827 398 3KiB Time Exceeded  11  T 72 16 7 25  396 8        Time            This view can be accessed through Diagnostic   TCP events     2 14 Drill Down    You can navigate between the metrics to drill down to the point where you want to analyze fine details about    performance problems  or the opposite  to explore the context of such problems  You can also easily navigate to a  different related metric     2 12  TCP Events 23    PV   User Guide Documentation  Release 3 3    You can see several labeled icons at the beginning of most result tables  that direct you to a more detailed   more    general page matching a particular line        APPLICATIONS    Dashboards            Business Critical Applications      Requests       Application            Server   Application      Top Serve          Client Zone   Application Top Clients             IP server  Overview      Top Requests      Top Files      Performance      Detailed Matrix HTTP    Contextual Matrix    Status                Tops Reports DNS    Performance   Raw Data  Servers     Top IP Server Voip       Clients      Top IP Client    MOS  ES Applications      Top Host    Jitter   Packet Loss  EB Ports      Top User Agent    Bandwidth  A
244. ough SNMP  Performance Vision MIB       GUI  Find the company vendor name behind a MAC address for non IP traffic         Metrics  Added a new metric     O Window event  in TCP Events        GUI  JavaScript performance improvements    6 Chapter 1  Release notes    PV   User Guide Documentation  Release 3 3    1 14 2 Changes    e  PCAP  AutoPcap files are now kept for 72 hours instead of 48 hours      Export  All data views can now be exported directly as a PDF page  new  Export as PDF  icon         GUI  Updated TCP conversation workflow for an improved usability     1 15 Whats New in 2 7    1 15 1 New Features       Config   POSIX regular expressions are available in web patterns      Reports  Can now reorder pages in a report        GUI  DNS resolution requests can now be done and undone with a button  column by column  and no  longer through field mouse over     1 15 2 Changes       GUI  Replace in out by srv clt in all pages        Metrics  Deduplication is now performed independently for every interfaces VLANS if these are not ag   gregated        Config   Search and zone edition is now faster     1 15 3 Major bug fixes       Metrics  SIP connections were not properly tracked in some cases       Pulsar  Fix Pulsar analyzer ifaces and help commands      GUI  Fix empty unfolded line bug in grouping tables          System  Restart processes when they consume too much memory     1 16 What s New in 2 6    1 16 1 New Features    e  GUI  User manual is now accessible from the GU
245. out domain names  Web and DNS reports   you can use a regular expression by prefixing the  entry with a tilde character      For exmaple  you can use this to filter all but some names  For instance  here is  a valid input to filter all but Google   s and Amazon   s     122 Chapter 10  Frequently Asked Questions    PV   User Guide Documentation  Release 3 3    ae  21 aks  2g900gleN   fr oom 9    J   amazon V   2 3   11 216     10 10 How comes my VM keeps losing sync     Even if you configure NTP on a virtual appliance  ESX  helper  programs will try to set the date and time of  the VM from the ESX guest  This process will run concurrently with NTP date synchronisation with undefined  results  So if you have a VM that s regularly out of sync make sure your ESX itself has the correct time     10 11 What about Open Source     SecurActive uses internationally proven and rock solid open source components such as Linux  Python  Zope   Postgresql  Git  GCC     Our company has chosen to actively contribute to the open source community by  regularly submitting patches to these projects and provide access to parts of its own code       10 12 Standard TCP Session    A B  time ms  OPV Events client prone sever SPV Metrics     Comments  SYN 3  t Standard TCP 3 way handshake     Start of TCP session  Handshake 8     Uncommon data push from client    No response is awaited by the client  from server here  SPV cannot know  this and computes a DTT client     push client    15 4 RTT server     
246. p ssl 864 5       824 8KiB 752  192 168 80 6          R amp D 192 168 10 6 W Web Intranet           553 6       521 5KiB 497  192 168 10 9 VLAN_Sales  fallback  192 168 20 237 m ssh 372 1KiB  41 0KiB 5128  204 14 234 36 VLAN Sales  fallback  192 168 20 213    Salesforce 352 7KiB 337 0KiB 298  192 168 20 217 VLAN Labo  fallback  192 168 80 22 243 0KiB 216 7KiB 498       Figure 3 6  Source Destination conversations    On the other hand  client server conversations will be used for all views reporting performance  Hereunder you can  see  in the first line of the table  that a client server conversation takes into account the traffic in both directions     Client Zone Client IP Server Zone Server IP  Application Traffic Packets   Handshake   Transactions  VLAN R amp D 192 168 10 5 Internet 128 237 157 136 E ircu 1 7KiB 18 0 1  VLAN  Sales  fallback  192 168 20 217 Internet 174 36 30 4 m http 3 6KiB 22 4 Ti  VLAN R amp D 192 168 10 10 Internet 209 85 137 125 W NC tcp 2 6KiB 34 4 1  VLAN R amp D 192 168 10 8 Internet 208 71 169 36 m ircu 1 6KiB 17 0 2  VLAN Sales  fallback  192 168 20 202 Internet 91 121 2 221 vpn 16 9KiB 184 4 42  VLAN R amp D 192 168 10 4 Mother2 88 191 105 6 m Sro Mother2 16 8KiB 180 4 33  VLAN R amp D 192 168 10 6 Internet 140 211 15 34    http 12 5KiB 31 3 1  VLAN R amp D 192 168 10 4 Internet 193 48 186 4 m ssh 606 6KiB 919 4 11       Figure 3 7  Client Server conversations    In general  you will find that       Client Server is relevant when we are speaking
247. packet that looks like a Keep Alive will be ignored     4 1 3 DTT timeouts    The objective of the TCP DTT metric is to measure the duration of a single write  or of a sequence of closely  related writes   For protocols that do not follow the pattern request response  it is very important to detect when  two data transfers are separate in time  suggesting they are unrelated   The tcp  dtt  timeout parameter helps    35    PV   User Guide Documentation  Release 3 3    with that  If two packets are separated by more than this duration  then they do not belong to the same DTT  By  default  it is set to 1s so that lost packets nor a full reception buffer would not interrupt the DTT  but an actual  pause from the sending application will be detected as such     4 1 4 What is a retransmission     According to the sniffer  any TCP packet with a payload  or a SYN  a FIN or RST flag  which a sequence number  that was already covered is a retransmission  here  covered means that this sequence number was in a packet that  has already been analyzed      Fast retransmission 15 thus counted as retransmission     4 2 HTTP    The HTTP metric offers a very synthetic notion of a page  which is a set of HTTP documents fetched by the same  user and combined by his browser into a single object  a    page     Reconstructing pages from the actual packets  involves an unusually high number of operations and thus  deserves quite a detailed description     4 2 1 HTTP specific glossary  Although not re
248. po Re SLITHO                       1                 Strang SpvBCNZoneA  2                  Spy SPVBCNZoneB  3      qe  R   EnumVal SpvBCNGlobalStatus  4        Values  Ok 1   Warning 2   Alert 3   NA 4   Nothing 5   NotEnough  6              R   EnumVal SpvBCNStatusAtoB 5     78    Chapter 7  Configuration       spvNevraxBCNTime  2     PV   User Guide Documentation  Release 3 3        Values  Ok 1   Warning 2   Alert 3   NA 4   Nothing 5   NotEnough  6              R   EnumVal SPVBCNStatusBtoA  6        Values  Ok 1   Warning 2   Alert 3   NA 4   Nothing 5   NotEnough  6                    Gauge SPVBCNRttAtoB  7      pee    R     Gauge SPVBCNRttBtoA  8           R   Gauge SPVBCNRrAt oB  9           R   Gauge SpvBCNRrBtoA  10                    Counter SpvBCNRetransCountSumAtoB  11                R   Counter SpvBCNRetransCountSumBtoA  12           R   Gauge spvBCNBandwidthAtoB  13      Tee  R   Gauge spvBCNBandwidthBtoA  14               R   Counter SpvBCNTrafficSumAtoB 15                 R   Counter SpvBCNTrafficSumBtoA  16                 B     Counter SpvBCNPacketsCountSumAtoB  17             R   Counter SpvBCNPacketsCountSumBtoA  18      t    R   EnumVal SpvBCNThresholdSymetricLink 19        Values  True 1   False 2           R   Gauge SpvBCNThresholdBandwAvailableAtoB  20           R   Gauge SpvBCNThresholdBandwAvailableBtoA  21          R   Gauge SpvBCNThresholdBandwMinAtoB  22                  Gauge SpvBCNThresholdBandwMinBtoA  23                 R      Gauge SpvBCNThr
249. pplication  it may  of course  be due to  network congestion  retransmission issues  but also to TCP errors like 0  Windows  By looking at specific  conversations  you can view whether the TCP window is being reduced and by whom  client   server       IP Application Traffic Payload   Packets   Conn  attempts   Conn  established   0 Win Y     Web test 1 1 MiB 828 6 KiB 5042 228 228 255  39    https 320 5 KiB 192 1 KiB 1 885 126 246  35    ftp 12 4 KiB 1 3 KiB 187 42 82   32    https 47      44     4 640   51   00    https 42MiB 3 9 MiB 4487 51    m NO ten 7101      1 amp 8n 7 WIR         an an           Abnormal behaviors  by sorting the        events by number of SYN packets  you can easily view which ma   chines are generating a very high volume of TCP session start  which eventually do not drive to a complete  TCP session setup  If you see machines with large volume of SYN packets and few   no session setup  these  machines are either misconfigured or infected     This view can be accessed through Diagnostic   TCP events     2 13 ICMP Errors    Performance Vision provides an in depth view of ICMP errors  ICMP errors will report the volume of flows which  cannot be set up  either because the network  host  or port is unreachable   This can reveal        An unavailable host      A network which is not reachable  either it does not exist   which reveals a configuration   infection issue  on the source host  or it is not available   configuration issue         A port which is n
250. ptures and evaluates the  data without any impact on the original traffic     The port mirroring is the most commonly used solution to capture traffic  because it is inexpensive  flexible in  terms of how much traffic can be captured at once and remotely configurable     Please note that a port mirroring may have some drawbacks  such as      t can consume significant CPU resources while active    There is a risk of not receiving some packets  like media errors        n the case of traffic congestion at the switch level  the port mirroring is likely to drop some traffic  because  the SPAN process does not have priority      In some cases  a better solution for long term monitoring may be a passive TAP or an Ethernet repeater   hub       Advantages      Low cost  this feature is embedded in most switches     Can be configured remotely through IP or Console port    The only way to capture intra switch traffic      A good way to capture traffic on several ports at once    Drawbacks      Not adequate for fully utilized full duplex links  packets may be dropped      Filters out physical errors      mpact on the switch s CPU     Can alter the timing of the frame  with an impact on response time analysis       SPAN has a lesser priority than port to port data transfer    40 Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3    5 2 2 Network TAP    A network TAP  Terminal Access Point  is a hardware device which can passively capture traffic on a network  It  is commo
251. quired to use Performance Vision  the following definitions are required to understand the follow   ing description       HTTP message  as defined by RFC  it is an HTTP header optionally followed by a body  Sniffing gives us  some of the headers  the relevant timestamps  sizes  and so on  We may not see everything  but the beginning  of the header is mandatory in order to recognize an HTTP message       HTTP query  HTTP message with a command  GET  POST  HEAD  etc  and the URL     HTTP response  HTTP message with a response code  sometimes called status code or status                hit or transaction  HTTP query with optionally its associated HTTP response  note  a response with  no associated query is ignored for this metric      user  the HTTP client software  browser or whatever  that has sent the query under consideration  It s  identified by his IP address and user agent field       page  set of transactions that are supposed to be perceived as a single query implying a single delay for the  user  Notice how subjective this definition is  The intent is to include in a single page all the hits required for  a typical browser to display enough content for the typical user to think his query 18 fulfilled  For websites or  browsers that delay download of content until it becomes visible  or for websites that display intermediary  content  the only objective is to behave in a way that s understandable     root  of a page   the transaction that triggers other transactions for
252. r the CIFS commands  like    move            Number of metadata bytes read    Number of metadata bytes written    CIFS Path to the file related to this command  Number of queries   Query packets at applicative level  PDU   Sum of query payload   Number of bytes to be written     Date and time  Date and time  SMB command  Byte quantity  String   Decimal or hexa   Decimal or hexa   Byte quantity  Byte quantity  Byte quantity  Wildcard or regex  Decimal or hexa   Decimal or hexa   Byte quantity  Byte quantity    Continued on next page       143    PV   User Guide Documentation  Release 3 3    Table 13 5     continued from previous page    Operand Type    cits  cits  cifs  cifs  cifs  cifs  cifs  cifs  cifs  cits     response   response    response    response    Status   Subcommand   tree                 user     packets   payload   read   write     warning count    device    ip    Tot ED  lw V    mac    mac clt  Nac er  poller name  protostaox    Srt     Src  lt Count    vlan  zone    zone   zone     13 2 6 ICMP    Response packets at applicative level  PDU   Sum of response payload   Number of bytes read    Number of bytes effectively written   CIFS Status   CIFS Subcommand   CIFS Tree related to this command   CIFS Tree ID   CIFS User   Number of warnings  mostly client side   Either client or server IP or subnet   IP which demand a connection to a server  IP which replied to a connection demand  Client or Server MAC address   Client MAC  physical  address   Server MAC  physi
253. r virtual switches may have different more features     5 6  Virtual Performance Vision     4g    PV   User Guide Documentation  Release 3 3    5 6 7 Data storage  Virtual appliances come with no data disk  thus everything  traffic data as well as pcaps and reports  will be written  to the system disk only     If you plan to keep a long history of data then a dedicated data disk is mandatory  To create one  attach a new  drive to your VM and then run the format  data  disk command from pulsar     Notice that       you will not be able to resize this data disk hereafter  the required size depends on the traffic you plan to  monitor but anything below 500GB seams dubious        the data previously acquired will be lost       you are required to reboot the appliance once done     5   Netflow    5 7 1 Overview    Any SPV poller can be sent netflow v5  The pollers will add volumetry informations of every netflow in the traffic  statistics so that these flows will be visible from the GUI  In this case  IP address of the sending equipment will  be displayed next to the receiving poller name     5 7 2 Configuration  By default  pollers listen to UDP ports 2055  9555 and 9995  These ports can be changed in sniffer configuration  from the GUI  Clear this list of ports to disable the feature     Note that the sniffer must be restarted after this change     5 7 3 Limitation regarding reception  Netflow export  transported by UDP datagram  is a best effort service  A switch may skip sendi
254. ress or netmask  mac Client or Server MAC address MAC address  mac clt Client MAC  physical  address MAC address  mac srv Server MAC  physical  address MAC address  pkt eoount Number of IP packets Decimal or hexa   poller name Poller name  distributed probe  String               Sry                       Port number   vlan Tagged Link  802 1Q  Decimal or hexa   zone Server or Client Zone Zone name   zone  Zone of the client IP Zone name   zone Zone of the server IP Zone name       142 Chapter 18  Appendix    13 2 4 SQL    PV   User Guide Documentation  Release 3 3    Operand Type    capture begin  capture end  device   ip                                                   mac Srv  poller name                                        sql dbname  sql dbuser  sql error code  Sdql error counc  sql error msg  sql error rate  Sql werror status  sql query command  sql query count  sql query packets  sql query payload  sql response dtt  sql response packets  sql response payload  sql system   Srt   Sr rE  Count   vlan   zone   zone    zone    13 2 5 CIFS    Capture begin time   Capture end time   Either client or server IP or subnet   IP which demand a connection to a server  IP which replied to a connection demand  Client or Server MAC address   Client MAC  physical  address   Server MAC  physical  address   Poller name  distributed probe   Protocols stack   Average query transfert time     The database or instance name which is used to execute the       Authenticated username who exec
255. ring   Port number  Wildcard or regex  Duration  Duration  Decimal or hexa   Duration  Duration  Duration   Rate   Rate   Rate   Rate   Duration  Decimal or hexa   Duration   Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa        Continued on next page    13 2  Custom Filters    147    PV   User Guide Documentation  Release 3 3    Table 13 8     continued from previous page         Sum of RTTin both directions Duration                      RIT for data from server to client Duration         CLE Number of RTT for data from server to client Decimal or hexa   DEDE D IESUS P Number of RTT for data from client to server Decimal or hexa   rtt sign Sum of signalization RTT in both directions Duration  EE ut s CLE RTT for signalization data from server to client Duration  rtt sign count clt   Number of RTT for signalization data from server to client   Decimal or hexa   rtt sign count srv   Number of RTT for signalization data from client to server   Decimal or hexa                       80   RTT for signalization data from client to server Duration  22 2      RIT for data from client to server Duration  srt Server response time Duration  srt count Number of SRT computed in a time interval Decimal or hexa   srt sign Server response time for signalization Duration  srt sign count Number of signalization transactions in a time interval Decimal or hexa   timeout Number of timeout sent Decimal or hexa   vlan Tagged Link  802 1Q  Decimal or
256. rovements      LDAP Authentication      Second data merging level for http transactions for users with mirrored internet traffic         User interface improvements  like the switcher widget for IP or Zones    PV   User Guide Documentation  Release 3 3        Performance improvements for queries on large data range        Shellshock security update    1 3 What s New in 3 0      Database Transactions Analysis      Supported Databases in Performance Vision for SQL Performance Analysis    Oracle    Microsoft SQL    MySQL  and derivatives     PostgreSQL    Multi Node Analysis      Schedule packet captures on multiple nodes at once      Create triggered PCAPs at any time    Links between Flows  amp  Transactions      Switch from Flows to Transactions      Switch from Transactions to Flows    New Features  amp  Improvements      Top Protocol Stack        Top Source IP    Top Destination IP  Support For IEEE 802 1ah    Improvements in HTTP for IP origin address  servers  amp  proxies     Enrichment of existing views    Ability to cancel queries    Warning when a new version is available    New menu interface    User interface improvements    Database summary    Performance improvements on BCNs    1 4 Whats New in 2 18        Sniffer         Support  beta  of the skinny protocol        CSV dumper is now multi core  better performances                 capture all HTTP traffic  The page reconstruction can be activated by flagging zones     Applications          New button to remove unu
257. rser supports only protocol version 10   This should cover most of the installed base  though       TNS parser  for Oracle databases  was roughly reverse engineered from various sources  especially the  wireshark source code  It should thus not be expected to understand all messages in all situations       SIP parser implements no proprietary extensions  however prevalent       As there are no concept of connections for UDP  UDP conversations are ended after a timeout period of 2  minutes without any packet in any direction  This might not match the underlying protocol     42 Chapter 5  Deployment    PV   User Guide Documentation  Release 3 3       VoIP dialogs are identified by their call id only  which imply that if the sniffer listens to various independent  SIP proxys or servers then call id collisions can not be ruled out  this choice was made because it proven  useful in practice      5 4 Port mirroring and duplicated packets    5 4 1 Introduction  The configuration of a port mirroring session has to respect some specific rules and standards  The main goals of  a port mirroring session are to      Gain insight into the highest number of flows  which are seen as strategic by the IT manager     And ensure that all collected flows are appropriately analysed     It is crucial to ensure that a minimum number of flows are duplicated to the interfaces     5 4 2 Detail    SPV solution can manage any level of traffic duplication  dropping packets received in excess    this  howe
258. rsions  Free  NPS Express  NPS  APS Demo  APS Audit  APS Express  APS    License  VMware APS exists in flows limit  Small  Medium  Large and Unlimited     GUI  New chart that displays the    Number of Flows        Data  Export data of graphics or tables as CSV files     GUI  New advanced filters which all support    with    and    without    criteria     GUI  New zone selector design in forms to show the zone tree      Sniffer  Infinite loop of PCAP reading from    pcap replay loop    directory     1 11 What   s New in 2 11     Matrix  Client   Server matrix  available metrics    Traffic    Packet Count    Server Response Time  SRT      Connection Time  CT     Round Trip Time  RTT     Data Transfer Time  DTT     End User Response Time   EURT       License  VMWare  per flow license model    Limitation is set on central database sizing    Reports  Added global and per page description     GUI Report  Logo is customisable and displayed in both HTML and PDF     Report  Enhanced design     GUI  IP Summary  Improved filtering  Charts are filtered according to the  zone  filter    GUI  New matrix design     GUI  Rework the menu to better suit the workflow     Sniffer  Reduce memory consumption      Sniffer  Huge disk IO reducing for autopcap     1 12 Whats New in 2 10     Matrix  Performance Mapping Breakthrough  new    Matrix    views  Select the metric of your choice and  visualize at a glance where the issues are located      Matrix  Source   Destination matrix  available metrics
259. s  Client MAC  physical  address  Server MAC  physical  address    Ethernet Type  Decimal or hexa   Address or netmask  Address or netmask  Port number   Zone name   Zone name  Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  Address or netmask  MAC address   MAC address   MAC address  Continued on next page    icmp err  icmp err   icmp err   icmp type  ip   ipc It  ip netflow  10 5107   mac                            Sry       144 Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Table 13 6     continued from previous page    Operand Type                        7  pEL coumt                                                       poller name  proto    protostack  vlan    volp trartrio    zone  zone clt  zone srv    13 2 7 DNS    Client MTU  Maximum Transmission Unit   Server MTU  Maximum Transmission Unit   Number of IP packets   Number of packets sent from client   Number of packets sent from server   Poller name  distributed probe    Protocol a  Protocols stack   Tagged Link  802 1Q    Total traffic in both directions   Server or Client Zone   Zone from the ICMP packet was sent  Zone of the server IP       Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   String    Wildcard or regex  Decimal or hexa   Byte quantity  Zone name   Zone name   Zone name    Operand Type    capture begin  capture end  device  dns bandw  dns bandw clt  dns bandw srv    Ons pkt couHc    dnes kes COUNT     dnis  p
260. s ji 26m amp  j                    ms 1   Qg O 72485  eae          435 Ui 4uB 7960 80425 ms    h           1 54513 1903   8        68 72985 80ms 3       ms    22              26 081 90 Mi 67 MB 26 39  26 168 12m H Sams   Sp        O mnam      19014                 20836        ims    48       OO i 3451 3063 KB 5     3429 40ms   48188   an Q 108776            1757 2848             1965 59  8 1 4       Qa    1 1224 1657      17 uB 2 1258           ms     aa    1 92          863 KB 9 2988               8 18      Bytes esms 0        O   4 858 Bytes  666 Bytes    ems           i 3 53 KB 71298     aa      2             Sms           2 2 369 KB   Am    2 187        4       2 46KB        i           aa    2                  28 p          1        44       Anam          28     2 Sms     Aaa           2908     ag           Ims   aa           36195   Aan           fms          Figure 2 8     jo                        Ques sens SAT Y Query OTF Resco                  sme          4        FROM  m   tes                  soo                             sm 00  Stms          a           3m       soms d              NTO 20                    INTO 2008 2211 2       0  marmo        DEH            wx  0  DELETE        29m                  sa 0  mmr nao 2m         0  marr mo 29m 71        0  stem 118 Ej          0                        2208 j 208   wx 0             2Wm jj ms               2           2ms      0  sar mo 21m 171   sx 0             Fw      01 sims 1   a    2711 2ims     a    NTO 2tm
261. sed applications  and increase performance     2 Chapter 1  Release notes    1 5    1 6    PV   User Guide Documentation  Release 3 3        Help to create applications from NC flows      New default applications  more coherent  simpler and updated       Applications NC tcp et NC        have been removed  Send an email if the license 15 invalid or the data disk is almost full   Advanced filters are multi selectable  New flow degradation configuration  ICMP  The configuration page has better inner documentation  Kinetic Matrix  drag with the mouse to scroll throw matrices   New inline help in search forms for complex input like regex or custom filters  New page in HTTP  Top URL  SPV For Developpers    Whats New in 2 17    New applications  Application configuration      Applications can be defined with much more criteria     Applications can be exported to and imported from a CSV file         A new configuration page allows to check application rules     Webpattern and DynPort pages were no longer in use and were removed   New data field  Protocol Stack   which can be used to define an application     Deprecated URL pages were removed and replaced with new HTTP pages  Reports are automatically  migrated     Non IP flows are now integrated in all non specific views from the Application and Network menus   Non IP flows now have source and destination zones     New Raw Data pages to display data point to point chronologically  ie the way they are stored in the database  without a
262. see Pulsar documentation   The SNMP objects  that are thus made available are twofold  First there are the standard SNMP objects then SPV specific objects   Version 2c of the protocol is supported     System MIB    The probe uses the UNIX Net  SNMP   daemon  which serves standard MIB  So you can monitor your probe  from your SNMP console as you would normally monitor any UNIX server  For instance the usual statistics about  network interface usage  file system available spaces  I O operations  etc  are available     Monitoring specific MIB  In addition to these default information the probe provides various statistics under  iso org dod internet private enterprises securactive     The comprehensive MIB files are available from our web site   so this section only sketches what kind of infor   mation 18 available  You are encouraged to download the actual MIB for use with your common purpose SNMP  console  This will give you access to        nterface statistics for each network interface  such as the count of received packets  dropped packets and  duplicated packets     2 http   www net snmp org  3 http   www securactive net en documents 250 securactive mibs download    7 3  SPV Functional Configuration 77    PV   User Guide Documentation  Release 3 3      Protocol statistics for each recognized protocol  which can give a good impression on the realtime compo     sition of the whole network stream       Various CPU RAM information that are destined to troubleshoot an SPV more t
263. siness Critical Application    12 Chapter 2  Use The PV Graphical Interface    PV   User Guide Documentation  Release 3 3    You can access this view in the graphical interface in Dashboards   Critical Applications     2 3 2 Application Performance Dashboard    A simple click from the Business Critical Application Dashboard takes you to the Application Performance Dash   board  It shows you the evolution of the End User Response Time through time  along with the volume of  transactions  and its breakdown in Round Trip Time  Server Response Time and Data Transfer Time  At a glance   you can understand the origin of a change in the End User response time     Underneath this first graph  you find two additional bar charts  which help you understand which server s  and  Client Zone s  are performing better   worse  and due to what component of the End User Response Time   The  servers and zones are always presented from the one that corresponds to the highest volume of transactions to the  lowest     You can drill down and display either the Client Application Dashboard or the Server Application Dashboard by  clicking on a specific server or client zone  This drives you to a specific application dashboard focusing on the  same application for that specific server or client zone              0   14 00 1500 16 00 17 00 18 00   2012 03 21 13 15   2012 03 21 19 00   10000    Transactions sum  182 293  8000  16 000  000 ma              14 00 1500 16 00 17 00 18 00    Breakdown by serv
264. ss  MAC address  MAC address  Decimal or hexa   Decimal or hexa   Decimal or hexa   OS name   OS name   OS name   Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   Byte quantity  Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   String   Port number  Wildcard or regex  Duration  Duration  Decimal or hexa   Duration  Duration  Duration   Rate   Rate   Rate   Duration   Byte quantity       Continued on next page    13 2  Custom Filters    141    PV   User Guide Documentation  Release 3 3    Operand Type    ret    ret    rst    FSE   rst    rtt   rtt    rtt    rtt    rtt    rtt    srt   Sri Count  timeout  vian  VOLO st tall     zone  zone dst  zone src    13 2 3 HTTP    Operand Type    capture begin  capture end  device               httpnbrb coumnt  httphlt err count         111211  Help             Table 13 2     continued from previous page    Retransmission traffic from client to server  Retransmission traffic from server to client  Total Number of RST sent   Number of RST sent by client IP   Number of RST sent by server IP   Oriented RTT   RTT for data from server to client   Number of RTT for data from server to client  Number of RTT for data from client to server  RTT for data from client to server   Server response time   Number of SRT computed in a time interval  Number of timeout sent   Tagged Link  802 1Q    Total traffic in both directions   Source or Destination Zone   Zone name to w
265. stination treatment    For example  traffic from A to B takes into account all traffic coming from a host in A to a host in B  regardless  of the role they played  client or server   The above graphs take into account the communications from A to  B  only in one direction     Client   Server    In a client server conversation  all flows between two hosts will be classified following the concepts of client and  server  This means that the flows will group data exchanges to  and from  a client IP address from  and to  a server  IP address     For instance  a traffic from A to B for an application  provided both A and B can be a server for a single  application  will be broken down in two conversations  a conversation for client A  amp  server B  with  traffic from A to Band from B to               conversation from client B to server     with traffic from A  to Band from B to A      PV   User Guide Documentation  Release 3 3    Clt Srv corresponds to a view of network flows for performance analysis  When reviewing data for performance  analysis purposes  an administrator wants to view flows in function of the role of each host  client or server   Indeed  the role of a host has an impact on the metrics displayed and the clients and servers cannot be mixed      m  E TCP 15445 80  MEM    TCP 445 25665    F   UDP 53 44521  m                       17465 443             Performance between clients   x Performance between clients  In A to servers in B          in B and servers in A   
266. strators Yes           admin Administrators Yes  4       Figure 7 5  User account    John    is about to be deleted     7 3 2 Zone configuration    The aim of this chapter 18 to help the administrator of the platform to configure zones  When you change or create  a zone  the modifications will be effective within a short delay for future integrated data but not to the already  captured data which keep their old zone attribute     How to access the configuration menu     After clicking on the top right configuration button  you will observe a tree configuration menu with different  items     SPV Settings  Zones  Business Critical Networks  Applications  Web Applications  Dynamic Protocols    Reports    Probe Settings    Users  Pollers Status    Dump Restore       Figure 7 6  Configuration menu    Zones management using the GUI    Pleaser refer to Zones for Zone tree and Fallback explanations     You can reach the zone configuration page by clicking on the Zones label of the menu  The illustration below  lists the zones and their corresponding definitions     This page allows you to add a zone  edit a zone  move some zones around or delete a zone     In order to edit a zone or add a new child you need to click on the zone block to expand it       its filters will then  be available for edition     Each filter is composed of a subnet field  a MAC address field  a Vlan field  and device and poller select boxes   Any of these filters can be left blank  in which case no tests are p
267. struct pages     38    the process is very sensible to missing TCP fragments  retransmitted fragments cause no problem but frag   ments that are not mirrored to the probe do     the bigger the proxies  the less reliable client isolation will be   some heuristics regarding AJAX  content types and timing does not necessarily match your sites  some client may successfully hide the referrer  or worse  we may guess a wrong referrer   HTTP analysis may consumes more resources than what s available  or configured     any small inaccuracy in HTTP message reassembly or in transaction pairing will lead to much bigger inac   curacy of page load time     Chapter 4  Metrics Computation    CHAPTER  FIVE    DEPLOYMENT    5 1 How to integrate Performance Vision in your network     5 1 1 Preliminary steps  Performance Vision is dedicated to analyzing the performance of business critical applications in a corporate  network Hence the very first step before considering integrating Performance Vision in your network  is       identifying an up to date list of business critical applications  including applications directly supporting  business processes  but also applications on which these may rely     e g  DNS  Microsoft DS etc           locating the servers hosting these applications        defining which network devices clients are using to access these applications     5 1 2 Positioning the probe    Performance Vision appliance will be installed as close as possible to to the servers to prov
268. t rows  or by a configuration page  In  both cases  the administrator rights are requested     The setup is very easy because the capture filters are preset with the wanted flow characteristics  but the main  advantage of triggered PCAP is that it is possible to set a date and time to start the capture     Q      2014 03 12 15 30 18 2014 03 12 16 30 19             19  ie  Q 2014 03 12 15 30 04 2014 03 12 16 29 41 vprobe19  o  2 2014 03 12 15 30 26   1 2014 03 12 16 30 29   vprobe19      2014 03 12 15 34 07 2014 03 12 16 25 07             19   03 12 16 29 42             19            reate a triggered PCAP capture         roS     94 7     03 12 16 26 37 vprobel9            2014 03 12 16 11 19 2014 03 12 16 13 18             19     2014 03 12 15 32 54 2014 03 12 16 29 16 vprobe19                        Figure 8 20  Load the form to trigger a new           the flow data will be used to preset the filters        New Triggered PCAP x  Start Date  2018 01 01 00 00 00 Name   08 midnight issue     Metric  TCP M Port  5432  IP 1  192 168 10 3 IP 2     Pollers    vprobe19     gt    Advanced options      Add    Figure 8 21  Trigger a PCAP for midnight     By default only the local poller is selected to trigger the capture  but all known pollers are available  If multiple  pollers are selected for a capture  then one PCAP will be created for each one     All added triggered PCAPs are referenced in the dedicated page in the config menu  Is is possible to delete and  download them  regardl
269. t the mean time between the client request is significantly higher than the average  on a LAN  it should remain close to 1 ms   we may face three kinds of issue        the client is not requesting the correct DNS server  DHCP misconfiguration  for example   You can check  this out in the interface by looking at the Server IP fields       it means that the DNS server has an issue with regards to the caching of DNS names  The cache system  makes it possible to resolve a name without requesting the DNS server  which has authority for the DNS  zone  the IP address corresponding to the name  Hence  if the response time is high  first the application will  be slow from the user s point of view  and secondly it will incude an unnecessary consumption of bandwidth   This bandwidth will be wasted both on the LAN and on the Internet link  if we make the hypothesis that the  authority server sits on the Internet   If we consider the case of a fairly large organization  the bandwidth  used by the DNS traffic will not be negligeable and will represent an additional charge     e the DNS server may have system issues  If the server is overloaded  it cannot hold all the requests  and delay   or drop  some  which leads to a general slowdown of the network perfomances     You can easily cast a glance at these issues  go in the Analysis     DNS Messages menu  and fill the form with  appropriate values  especially the Requester Zone   to verify if the requests are correctly answered  and in an  a
270. ted  RTT Server would be impacted on the  server side and RTT Client           client side  RTT should then be analyzed in parallel to CT  Connection Time    because the treatment of new session by the IP stack has a higher priority      Some values are averaged measures  For each conversation  two kinds of values are reported       counters  for instance packets or byte counters  which are the sum over all connections aggregated for this  conversation       performance metrics  for instance RTT  SRT  DTT and the likes  which are average values over all samples  aggregated for this conversation     EURT    EURT stands for End User Response Time     This metric is an aggregate of various other measures meant to give an idea of the perceived overall end user  experience  It is taken as the sum of RTT  SRT and DTT     EURT has no meaningful physical counterpart  Only its evolution makes sense  and allow the system administrator  to check at a glance whether a network zone is behaving as usual or not  Notice that expected correct values for  both SRT and DTT depend on the protocol at hand  As a consequence you should not try to compare two EURT  of different applications     RTT    RTT stands for Round Trip Time     RTT gives an approximation of the time required for a packet to reach its destination  and can be further decom   posed into a RTT Server  delay between a data packet send by the client and its ACK from the server  and a  RTT Client  in the other way around   As a typ
271. th cacti   resource metrics     Once you have done this  if you reload any of the Data Query you should see the error message replaced by a  success indication           N  console   graphs         Console     Data Queries      Edit  Logged in as admin  Logout        Data Queries  edit  Junkie   Muxer Stats   New Graphs Nat    ime    A name for this data query  unkie   Muxer Stats                     for this data query  Statistics about multiplexers  parsers that route payload   Graph Trees XML Path    The full path to the XML file containing definitions for this data query   Data Input Method    Data Sources           Choose the input method for this Data Query  This input method defines how data is  Collection collected for each Host associated with the Data Query    Methods   Data Input   Methods    Associated Graph Templates    Graph Templates junkie   Multiplexers stats  Host Templates    Data Templates    Import Export  moo       path cacti   resource junkie muxerTable xml  Get SNMP Data  Indexed         Graph Template Name  Junkie   Muxer Stats       Return   Save      Figure 13 4  Success  XML files found     You can now proceed with device and graph creation     132               Chapter 13  Appendix    PV   User Guide Documentation  Release 3 3    Creating a device for your central collector    When choosing a host template select PV   Central Collector from the drop down box  Also  take a close look to  the SNMP settings for this host  You should choose SNMP versi
272. that a single click drives on more detailed information on the object you are  most interested in     If you click on the EURT graph in any of these three dashboards  you make a focus on a shorter period of    90 Chapter 8  Interpreting the results    PV   User Guide Documentation  Release 3 3    time  for example a SRT peak     depending on the aggregation level you either reach a lower aggregation  level for a shorter period or the corresponding performance conversations  see Data Aggregation   At the  same time you will get the server and zone breakdown for that more specific period of time        f you click on a server  you reach the Server   application dashboard        f you click on a client zone  you reach the Client zone   application dashboard     8 5 TCP Errors   Events    8 5 1 Objectives    These two tables expose to the user many TCP statistics in order to reveal dysfunctions or unusual events     8 5 2 TCP Errors    For each TCP conversation the following fields are displayed     RD Server Client    Duplicate acks    number of SYNs    number of handshakes    number of session ends    number of FINs from client    number of FINs from server     number of RSTs from client     number of RSTs from server    number of timeouts    By sorting on the RD or duplicate ack fields one can quickly check the worst conversations in term of TCP  performance  Also  number of reset packets are usually noteworthy  One can then jump to the IP summary page  of either the client or
273. that was required to build a whole HTML page   including its images  scripts  stylesheets and other related resources  This might also include the resources  used to update the page dynamically  through AJAX  that is  Javascript  or from other means      Initial Sequence Number The sequence number used in the SYN packet of a TCP connection     Jitter Packet delay variation  The Jitter 18 defined as the variance of RTT  average difference between RTT  measures and the average RTT   For more details  this equation is used  Sqrt   Average RTT1  2         RTTn  2                          1       RTTn   2      Maximum Transfert Unit  MTU  The MTU that s reported by the probe is the size of the biggest Ethernet  frame that was seen in this conversation  It is thus distinct from the physical MTU  although for a large  number of packets the observed MTU is expected to converge toward the physical MTU     Media Access Control  MAC  address Identifier assigned to each network adapter and used for addressing in  the lowest physical layer  As in practice only Ethernet devices are supported then these will always be  Ethernet addresses     Observation period      all reports  defines the observation time window  Observation Period is based on     starting time and an ending time provided by the user  These user defined boundaries will automatically  be moved to the closest previous aggregation boundary for the starting time and to the next aggregation  boundary for the ending time  this m
274. tion  Release 3 3       eoo ftp 10 1 0 110   FileZilla  LANDAR        Sota  Host  10 1 0 110 Username  ftp Password  sesese Port    Quickconnect       Response  200 Type set to I  Command         Response  227 Entering Passive Mode  10 1 0 110 187 12    Command  LIST   Response  150 Opening ASCII mode data connection for file list  Response  226 Transfer complete   Status  Directory listing successful    Local site   Users franckolivier SECURACTIVE Generic_Licences   3  Remote site     3           Pictures  Ii          Public   Y  5                       2 APS      Archi Clients      Doc VM   J Generic Licences    Filename Y Filesize Filetype Last modif   Filename                       5             202               20 450                     12 12 20  License app GE Upload Binary 12 12 20 Empty directory listing  4  Add files to queue    Open   Edit   Create directory  Refresh    Delete    Rename  Selected 1 file           Empty directory     Server Local file Direction Remote file Size Priority Status    Queued files   Failed transfers Successful transfers       Figure 9 7  Filezilla uploading a license file     Warning  It is STRONGLY recommended to reboot all the probes after upgrading  use the reboot com   mand in Pulsar          Note  Security    The FTP access is writable only  no read   It allows only to put a Securactive signed and encrypted file  This file  will be automatically moved  checked and executed by an internal process     ServicePack    In rare cases  it
275. tion MAC Address   Source MAC Address   Oriented Max Tranfert Unit   Client MTU  Maximum Transmission Unit   Server MTU  Maximum Transmission Unit   Source or Destination OS   Source OS   Destination OS   Total payload from source to destination  Total payload from source to destination  Number of IP packets with a payload  Number of packets with payload sent from client  Number of packets with a payload sent from server  Total retransmission payload   Retransmission payload from client to server  Retransmission payload from server to client  Payload from server to client   Total number of IP packets   Number of packets sent from client   Number of packets sent from server   Poller name  distributed probe    Server Port   Protocol   Protocols stack   Retransmission delay   Retransmission delay from client to server  Retransmission count  both directions    Total retransmission delay indic  Retransmission delay indic client to server  Retransmission delay indic server to client  Oriented retransmission rate   Retransmission rate client to server  Retransmission rate server to client  Retransmission delay from server to client  Total retransmission traffic    Duration  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Decimal or hexa   Ethernet Type  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  Address or netmask  MAC addre
276. ually consists of communications between the IP phone and a call manager   IPBX  The 2 signalization  protocols supported are SIP  Session Initiation Protocol  and MGCP  Media Gateway Control Protocol    Please note that SIP may follow the same route as the RTP traffic or not  while MGCP follows the same  route as RTP     e Media protocol  the role of this protocol is to carry the voice signal from one IP phone to the other IP  phone  it can eventually go through the call manager              RTP is the only media protocol supported by  Performance Vision  It stands for Real Time Protocol  it usually runs over UDP       Control protocol  the role of this protocol 18 to carry quality and control information from one phone to the  other phone  RTCP is the only control protocol supported  It stands for Real Time Control Protocol     8 3 3 Quality of service  amp  MOS    MOS stands for Mean Opinion Score  It is a numeric indication of the perceived quality of service of VoIP  It  is expressed by a number ranging from 1 to 5  1 corresponding to the lowest quality and 5 to the highest  close  humain voice      8 3  VoIP Module 83    PV   User Guide Documentation  Release 3 3    MOS Rating    Excellent    Good    Fair  Poor  Bad       Please note that in real network a MOS note of over 4  4 is unachievable  A low MOS will translate into echo and  degraded signal  MOS is in principle the result of a series of subjective tests  in the context of network analysis   MOS will be estimate
277. ute the queries  The system specific error code   Number of errors   The SQL error message   Errors rate   The SQL error status   Type of SQL command   Number of queries   Query packets at applicative level  PDU   Sum of query payload   Average response transfert time    Response packets at applicative level  PDU   Sum of response payload   Database system   Server response time   Number of SRT computed in a time interval  Tagged Link  802 1Q    Server or Client Zone   Zone of the client IP   Zone of the server IP    Date and time  Date and time  Decimal or hexa   Address or netmask  Address or netmask  Address or netmask  MAC address  MAC address  MAC address  String   Wildcard or regex  Duration  Wildcard or regex  Wildcard or regex  String   Decimal or hexa   String   Rate   String   SQL command  Decimal or hexa   Decimal or hexa   Byte quantity  Duration  Decimal or hexa   Byte quantity  SOL system  Duration  Decimal or hexa   Decimal or hexa   Zone name   Zone name   Zone name    Operand Type    capture begin  capture end  cifs command  cifs data payload  cifs domain  ocOifs error count  cifs fileid  cifs meta payload  cifs meta read  cifs meta written  cifs path  cifs query count  cifs query packets  cifs query payload  cifs query write    13 2  CustomFilters    Capture begin time  Capture end time  CIFS Command    Payload of data  files transfered  without CIFS meta infor       CIFS Domain  Number of errors  mostly server side   CIFS File ID    Metadata payload used fo
278. ver   Server response time   Number of SRT computed in a time interval  Number of timeout sent   Tagged Link  802 1Q    Total traffic in both directions   Server or Client Zone   Zone of the client IP   Zone of the server IP    13 2 2 Source Destination    String   Port number  Wildcard or regex  Duration  Duration  Decimal or hexa   Duration  Duration  Duration   Rate   Rate   Rate   Duration   Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Decimal or hexa   Decimal or hexa   Duration  Duration  Decimal or hexa   Decimal or hexa   Duration  Duration  Decimal or hexa   Decimal or hexa   Decimal or hexa   Byte quantity  Zone name   Zone name   Zone name    Operand Type    Owin           count 020  Owin count srv  app   bandw  bandw clt  bandw srv  begin  capture begin  capture end   ETE   Cl comin    delta session  device  diffserv  dilrtserv olt  diffserv srv    Zero Window Size in both direction  Zero Window Size from client   Zero Window Size from server   Total traffic from source to destination  Total traffic from source to destination  Traffic from server to client   Number of SYN packets   Capture begin time   Capture end time   Connection time   Number of successful handshakes    Difference between created session and finished sessions    Client or Server Diffserv  Client Diffserv  Server Diffserv    Decimal or hexa   Decimal or hexa   Decimal or hexa   Application name  Byte quantity  Byte quantity  Byte quantity  Decimal or hexa   Date and time  Date 
279. ver   involves a significant loss of performance  There are two main rules       Basic port mirroring sessions  also called 1 to 1 port mirroring session  This configuration does not generate  duplicated packets  However  increasing the number of 1 to 1 port mirroring sessions could produce this  phenomenon     Switch       Server    Appliance  SecurActive Performance       Figure 5 5   1 to  1  port mirroring session      Multiple port mirroring sessions  also called N to 1 port mirroring session  In this specific event  the dupli   cated packets phenomenon can occur     Switch       Server    Figure 5 6   N to 1  port mirroring    Warning     According to the number of listening points  in a multi switch mode this phenomenon can occur despite  the use of a 1 to 1 port mirroring session       A VLAN is a definition of a set of ports  this means that the port mirroring session is a N to 1 port   mirroring session        5 4  Port mirroring and duplicated packets 43    PV   User Guide Documentation  Release 3 3    5 4 3 Some examples of duplicated packets   non duplicated packets    In a standard port mirroring configuration  N to 1   it is highly likely that some transmitted packets to the appliance  are duplicated  In the following example  configuring a port mirroring session on both the IN traffic and the OUT  traffic of the switch means that the appliance will receive twice the same traffic        Appliance  SecurActive Performance       Figure 5 7  Example with duplicate
280. what is a  good or a bad response time  with no experience of the impact it has on users  For example  indicating that the  Network Round Trip Time from    site Atoasite Bis 200ms does not mean you have a measure which is  acceptable or not  In the same way  a Server Response Time  SRT  of an application Aof100ms may be  very    bad    when the same value would be excellent for an application B  As    consequence  it is important  to consider performance metrics as relative values  one of the key to a good interpretation of performance metrics  is to compare systematically performance metric value       to another time period     to another users group     Mixing up performance metrics for several applications does not make sense  When looking at application  performance metrics  you should be very careful of isolating applications for analysis  As a consequence the  metrics which very much depend on the application s specific behaviour should not be considered altogether  this  is true for metrics such as EURT  End User Response Time   SRT  Server Response Time  and DTT  Data Transfer  Time      RTT measurements can marginally be impacted by the behaviour of the operating system  Network Round  Trip Times for TCP are based the TCP acknowledgment mechanism  This means that  although RTT is generally  a good measurement of round trip latency  if the operating system of one of the parties is so overloaded that the  acknowledgment process becomes slower  RTT values will be impac
281. which  are the same tables with more information     Even if both tables are alike  there is a subtle difference  By displaying more information  MAC addresses   detected OS  server port  protocol stack   the flow details may split a conversation in different rows and then the  network and applicative metrics are split as well  Conversations is a more synthetic view whereas Flow Details 18  a troubleshooting one     The Raw Data pages are different  the results show the data as stored in the database  The results are sorted  chronologically by default  For instance  it is useful for troubleshooting to know in a global conversation where  exactly the packets with a high metric value are     2 6 HTTP Analysis    In the Protocols section  the set of pages for HTTP performance allows you to analyze HTTP traffic     From these pages  you can easily find the most solicited servers or hosts  according to the number of hits  by  payload or by response time     Top Server IP    Begin 2013 03 18 04 00   End 201303180800 Q        Q          Client Zone Server Zone Client      Server IP Client or server IP Srv  Port    VLAN Device id HTTP Status Host    Poller        zl    13 03 18 04 00 Aggregate Level  15 minutes  2013 03 18 08 00 Number of collected results  10  Sync    Server IP   Server Zone Page Count Y  Total Hit Count   Hits in Error  4     8 5        Resp  Content Length   Page LT  Load Time    HIT RT  Response Time   r 4 ms 3 ms  17 5 KiB 32 ms 31 ms  9 4 KiB 32 ms 31 ms       
282. ystem Utilities          Figure 13 2  Imported Items       Junkie   Muxer Stats      Junkie   Parser Stats      PV  BCN    If you select one of these you will face an error message such as     console   graphs      Console   gt  Data Queries   gt   Edit  Logged in as admin  Logout          Data Queries  edit  Junkie   Muxer Stats   New Graphs Nam      e T  A name for this data query  unkie   Muxer Stats  Graph Description Statistics about multiplexers  parsers that route payload        Management A description for this data query  Statistics about multiplexers  parsers that route payload   Graph Trees XML Path   lt path_cacti gt  resource junkle muxeriblexml                         The full path to the XML file containing definitions for this data query    path cacti   resource junkie muxerTable xml    DEAE Data Input Method  4 Choose the input method for this Data Query  This input method defines how data is Get SNMP Data  Indexed      COMM CHOR collected for each Host associated with the Data Query   jethods    Data Queries   Could not locate XML file     Data Input  Methods   Return   Save  Templates                 Save      Graph Templates       Figure 13 3  Error  XML files not found     You must manually copy the remaining xml files in the expected path  or change the XML Path in each of the data  queries definition         muxerTable xml  parserTable xml and sourceTable xml in   lt path_cacti gt  resource  junkie     e bcaTable xml bcnTable xmlandmetricTable xmlin  pa
283. yte of the frame  or less if the frame is smaller   excepting the TOS  TTL and IP checksum fields  are taken into account     The rational behind skipping Ethernet header is that we want to pair two packets if only their Ethernet addresses   or VLan tag  differ  one is a copy of the other  merely one switch away from it   The rational behind excluding  TOS  TTL and checksum fields of the IP header is to be able to pair two packets when one is a copy of the other   only one hop away from the first one  after traversing one or several routers      Then a packet digest is build from the remaining bytes and compared to those of previously received packets  If  one is found with same signature  the new packet is dropped  If one is found that is older than the older expected  duplicate then the packet 1s allowed to proceed     The age of the oldest expected duplicate is set by a runtime parameter which default value 15 100ms  This default  value should fit most settings     5 5 Distributed Architecture    5 5 1 How does the distributed infrastructure work     Appliances hosting only the sniffer component of SPV are called    pollers     The appliance hosting the components  in charge of collecting  merging and integrating the data from the pollers into a single database is called    collector      The collector appliance may also host one sniffer component     Poller     G LI SSH  TCP 22   TIT  gt     Sniffer   Data       a           oo     77          7                           2
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Samsung AFXDSH028EJ 用户手册  平成13年横審第23号 貨物船長栄丸岸壁衝突事件 言渡年月日 平成14  Manual do Usuário  Reflexiones sobre tecnología y educación en tiempos del cibertexto  KORTHO HOT QUICK CODER - Universal Stenciling & Marking  TomTom car kit para iPhone  取 扱 説 明 書  Manual de Recursos do Professor do Velho Testamento  User`s Manual  Télécharger le PDF    Copyright © All rights reserved. 
   Failed to retrieve file