Sei sulla pagina 1di 36

Cisco Prime Network Control System

Unified Management for Borderless Networks

Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Mobile devices created challenges

when using focused tools

Understanding Cisco Prime Cisco Prime Network Control System

(NCS)
Addressing client access issues with

Cisco Prime NCS


Cisco Prime NCS v1.0 deep dive Comprehensive Wireless Lifecycle

Management
Scalability, Deployment Options and

Services
Summary
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

IT Consumerization: Now a Reality


Smartphone adoption is growing at 50%+ annually* By 2015, tablets will constitute 50% of laptop sales**

ORGANIZATION

TIME
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

IT Resources Stay The Same


Fixed User
Wired access One user: One device

Borderless User
Anytime, Anywhere access One user: Many devices

Mobile User
Wireless access One user: Local devices

Access Evolution

Early 90s

Late 90s

Today

Effectively support users with box management Need for policy & control Need for operational efficiency
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5


For more information visit Cisco Prime Websites

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

100% support Partial support

Cisco Prime for Enterprise Product Features


Cisco Prime Features Service-centric foundation Optimized operations experience Integrated Cisco best practices Complete lifecycle management Day-one device support Smart Interactions Physical and /or virtual appliance Product Positioning Guidance Converged wired/wireless user access monitoring and troubleshooting Complete wireless lifecycle management Complete wired lifecycle management Borderless Networks services: TrustSec, Medianet, EnergyWise Video session/TelePresence monitoring and troubleshooting Application and performance visibility
1 2

NCS 1.0

LMS 4.1

CM 1.0

NAM 5.1

1 2

2010 Cisco and/or its affiliates. All rights reserved.

Day-one support for selected products only Includes sub-set of Smart Interactions features In conjunction with Cisco Identity Services Engine (ISE)

Cisco Confidential

Converged Access Management for Wired and Wireless Networks


Wireless | Wired | Security Policy | Network Services

Unified Management Users Policy Operations

Improved Network Visibility Faster Troubleshooting Eliminate Configuration Errors


2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

Wireless considered as an EQUAL MEANS of ACCESS

Cost pressure requires a DO MORE WITH LESS operational model

Focused solutions will deliver DIMINISHING RETURNS

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10

Contributors to Wireless Network Problems


400 350 300 250 200 150 100 50 0 Number of Customers
A recent survey shows that respondents view client devices as the TOP contributor to wireless network performance problems

Client devices RF Interference Unexpected Faulty wireless Old or outdated Insufficient IT (Drivers, from Wi-Fi and/ demand for network design wireless adminstrator connections, or non-Wi-Fi increased implementation technology expertise authentication, sources converage of or other issues) capacity

Other

Major Issues Contributing to Wireless Network Problems

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11

Integrated Wired & Wireless Monitoring and Troubleshooting


Any Network
Wired Access Wireless Access

Any Location

Any End-user Device

Remote Access

UNIQUE PERSPECTIVE Extends to USERS and ENDPOINTS


2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

Wired Expert

Wireless Security Expert Expert

Network Generalist

Consumes lots of time and resources Manual correlation of data Inefficient operational model
2010 Cisco and/or its affiliates. All rights reserved.

Less time and resources needed Single view of critical data Improves IT efficiency

Cisco Confidential

13

Answer the who, what, when, where and how access related questions

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14

Troubleshooting Laptop Connectivity Issues Example


Multiple teams/tools to provide resolution:
Wireless NetOps WCS with MSE
Verify user credentials Confirm laptop associates to network Observe time laptop may connect Validate current location

Traditional Approach
Where?

MSE
LMS

How?

?
?

Who?

NAC

?
?
?

WCS

Wired NetOps LMS


Check port and connectivity

When?

Security Ops NAC and ACS View


Check laptop conforms to AUP Confirm access to VLAN for resource/application is

What?

WCS

permitted

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

15

Troubleshooting Laptop Connectivity Issues Example


One platform with consolidated view for immediate resolution:
Account verified Connectivity confirmed Endpoint complies with AUP Permitted time of day Impermissible location for laptop Problem identified/Case closed
Who?
Unied Management
Where?
What?
When?
How?

Cisco Prime NCS Approach

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

17

Designed to Work With How IT Approaches Problems


Information architecture: Seamless navigation and

workflows align to tasks


Modern interaction behavior: Maintains context while

performing network management tasks


Smart tables & advanced filtering: Quickly view additional

information without leaving the workflow


Ever-present alarm views & browser: Always-on visibility to

potential end-user problems to speed remediation

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18

High-level View of Key Metrics with Contextual Drill-down to Detailed Data

Flexible platform: Accommodates new and experienced IT administrators Simple, intuitive user interface: Eliminates complexity User-defined customization: Display the the most relevant information
Cisco Confidential 19

2010 Cisco and/or its affiliates. All rights reserved.

Lumos Features DRAFT

2011 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

19

Correlated and focused wired / wireless

client visibility

Client health metrics Client posture & profile Client troubleshooting Client Reporting Unknown device ID input

Clear view of the end-user


landscape
Who is connecting Using which device Are they authorized

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

20

Wired & wireless discovery

and inventory

Add / detect infrastructure devices such as switches, WLAN controllers and access points Comprehensive access

infrastructure reporting
View the access infrastructure as a whole or as discrete technologies Stolen asset notification Track when devices presumed stolen come back online

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Lumos Features DRAFT

2011 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

21

21

Provides Context as to Where the Wired Endpoint Resides

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

22

Converged Security and Policy Monitoring and Troubleshooting

Shows where security & policy problems exist


Retrieves information directly from clients: Wired, wireless - authenticated, unauthenticated

Reduces the time to troubleshoot security & policy problems


Client posture status and client profiled views

Drill deeper into security & policy issue details


Direct linkage from Cisco NCS to Cisco ISE with contextual filtering

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

23

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

24

RF Prediction Tools Assist in Designing Optimal WLANs


Easily Visualize the Ideal RF Environment
Integrated Planning Tool
Import floor plans from 3rd-party tools Configure access point placement, coverage, and other variables Generate equipment proposal
Planning Tool Instant Access to Tools Hierarchical Maps

Hierarchical Maps
Design multiple buildings, floors, regions

Location and Voice Readiness Tools


View performance and coverage estimates

Eliminate improper RF designs and coverage problems Built-in tools perform site-surveys, RF reassessments and RF readiness evaluation
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

Flexible Configuration Templates Streamline Operations


Instant Additional Info.

Industrys Broadest Array of Integrated Configuration Templates


Apply common configurations across one or

Customizable Templates Easily Define Configuration Parameters

more controllers and access points Role-based access control and partitioning Standalone access point monitoring and migration Control power consumption with energy wise integration
Controlled wireless guest access

Fast creation and maintenance of configurations for WLAN controllers, APs, and MSE Maximizes uptime and improves operational efficiency Deploy large, multi-site networks and managed-service alike
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

Quickly Access the Information You Need When You Need IT


Centralized Monitoring of the entire WLAN and LAN
Identify and diagnose RF Interference events,

Coverage Visualization

air quality and interference security threats with Cisco CleanAir Robust fault event and alarm management Guided step-by-step client troubleshooting tools
Ever-present search for cross network

Color-Coded Icons Ever-present Alarm Summary

historical information Cisco ISE and ACS views for additional endpoint data

Efficiently assess, prioritize and manage RF interference issues Analyze problems and misconfigurations for all client devices across all connection media Troubleshoot large-scale LAN and WLAN environments with minimal IT staffing Quickly discover events occurring outside baseline parameters
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

Simplified Customization of Display Ever-Present Search

Mapping Hierarchy and Icons


(Expandable)

Quick Access To Tools

Heat Map of Each Location

Ever-Present Alarm Summary


(Expandable)

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28

Returning the Network to Optimal Performance


1 Integrated workflows and tools: 1.Receive performance degradation notices 2.Quickly asses service disruptions 3.Research resolution 4.Take action CleanAir alerts summaries and reports
Streamlined Workflows

2 3

identify where poor air quality and interferers exist Security dashboard and index show current security status Voice Tools for customized queries to address VoWLAN problems

Security Dashboard

Diagnose the RF environment and mitigate interference from Wi-Fi and non-WiFi sources Quickly assess and understand ways to improve the security index of the network Quickly discover events occurring outside baseline parameters
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

Continuous Improvement
Long term historical reporting and trend analysis
Extensive on-demand and

automatic reporting Fully customizable Focused compliance reporting Alarm and event forwarding to 3rd-party solutions Output to CSV of PDF

Effectively plan for future capacity, while properly controlling costs Align the reporting structure to your business or operational environment Understand common trends and top users of resources to right-size the network environment
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

CleanAir
Detect RF Interference Locate the source Automatically adjust to optimize the environment

Adaptive WIPS
Assess wireless vulnerabilities Auto-classify threats Protect the wireless network

Context-Aware
Contextual Info about WiFi clients and tagged mobile devices Optimize application delivery

Identity Services Integration


Shows where security & policy problems exist Drill deeper into issue details

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31

Complete lifecycle management of hundreds of wireless LAN

controllers from a centralized location

Rich monitoring and troubleshooting for Cisco Catalyst Switches Visibility into key performance metrics interface ports, endpoints and users and switch inventory Device
Cisco Lightweight Access Points Cisco Autonomous Access Points Cisco Switches

WCS Devices Supported


3,000 1,250 0

NCS Devices Supported


15,000 5,000 5,000

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

32

Physical and Virtual Physical Appliance


Application & Components

Virtual Appliance
Application & Components

OS

Cisco Provided

Cisco Provided

OS

Cisco-branded Hardware (1RU) Virtual Infrastructure

Customer Provided

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33

Cisco WCS 7.0.X


Licenses
Multi-tier License Model

Cisco Prime NCS


Singlei-tier License Model

WCS Base License


(Examples: WCS-APBASE-X or WCS-WLSE-APB-X)

Prime NCS License


(Example: L-NCS-1.0-X)

WCS Plus License


(Examples: WCS-Plus-X or WCS-WLSE-Plus-X)

Database*
Must be on WCS 7.0.164.0 or 7.0.164.3

1:1 Upgrade

*Note: WCS 7.X is the last release running on CiscoWorks Wireless LAN Solution Engine (WLSE)
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

Lumos Features DRAFT

2011 Cisco Systems, Inc. All rights reserved.

Cisco Confidential

34

Converged Management of Borderless Networks


Plan
Identify mobility solutions that align to your business strategy Cisco Unified Wireless Network Readiness Assessment Optimize mobile connectivity with enhanced performance, security and reliability Wireless LAN Network Assessment Ensure the architecture can support the solutions Wireless LAN Architecture Design

Build
Design a secure, high performance network for mobile collaboration Wireless LAN Planning and Design Accelerate ROI with efficient migration and implementation Wireless LAN Implementation

Mission Critical Wireless

Run
Lower TCO with out-tasked management and monitoring Wireless LAN Remote Management Services Improve efficiency and performance with network intelligence Wireless LAN Optimization

2010 Cisco and/or its affiliates. All rights reserved.

Enable the Architecture

Enable Business Solutions

Enable a Smart Network Cisco Confidential

35

Converged Access Management for Borderless Networks


Single Unified View Improve IT Productivity Enable the Workforce

Single viewpoint for wired, wireless, security & policy management Unprecedented visibility and control Direct access to Cisco support and services
2010 Cisco and/or its affiliates. All rights reserved.

Empower first-tier to address issues without escalation Resolve problems faster with logical workflows Improve resource productivity, lower TCO

Provide reliable access to network services


Visibility at the access layer as networks become borderless

Address problems where most issues occur - The endpoint


Cisco Confidential 36

Potrebbero piacerti anche