Chapter 18: Identifying Trends and Setting Thresholds 18-1 Copyright © 1998, Cisco Systems, Inc.
18-2MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identify what trend analysis is Identify when and why to use trend analysis Identify when and why to set performance thresholds Configure data logging properties Upon completion of this chapter, you will be able to: Objectives
18-3MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configure Trend Reporter parameters Generate reports using the Trend Reporter tool Set performance thresholds Receive and interpret threshold traps Objectives (cont.)
18-4MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identifying patterns of change in network traffic for: Utilization Protocol mix Errors What Is Trend Analysis?
18-5MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Early warning of potential congestion Input to resource planning Ongoing updates to baselines Why Analyze Trends?
18-6MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Utilization on critical links Utilization by protocol Peak utilization Relative mix of protocols Errors What Should Be Analyzed?
18-7MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Daily Weekly Monthly Quarterly When Should Trends Be Analyzed?
18-8MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Early warning for: Bandwidth Errors Banned protocols Packet and protocol traps Event notification What Are Performance Thresholds?
18-9MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. How Do Thresholds Work? Rising Threshold Falling Threshold Rising Event No Event Falling Event Rearm Rising Event Rising Event Rearm Falling Event
18-10MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Bandwidth on critical links Significant increases in errors Use of banned protocols Which Thresholds Should Be Set?
18-11MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Ongoing monitoring Intermittent trouble Security monitoring When Should Performance Thresholds Be Set?
18-12MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Logging Data
18-13MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configuring Trend Reporter
18-14MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Generating Trend Reports
18-15MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Generating Trend Reports Automatically
18-16MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Setting Performance Thresholds
18-17MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Adding Traps
18-18MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Adding Traps (cont.)
18-19MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Installing New Properties
18-20MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Receiving and Interpreting Threshold Traps
18-21MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Identify what trend analysis is Identify when and why to use trend analysis Identify when and why to set performance thresholds Configure data logging properties Summary
18-22MCSIIdentifying Trends and Setting Thresholds Copyright © 1998, Cisco Systems, Inc. Configure Trend Reporter parameters Generate reports using the Trend Reporter tool Set performance thresholds Receive and interpret threshold traps Summary (cont.)