Chinese | English

Products

ITSM
APEX OSSWorks APEX Integration Manager APEX Net Manager APEX Flow Manager APEX Desktop Manager Apex TransManager
Telecom
Radisys Trillium Radvision VoIP/IMS/3G Solution Spirit Voice/Video engine Adax signaling board and SG Surf Media Solution
Products
Location:Home > ITSM

APEX Flow Manager

  • Brief
  • Features
  • Advantages
  • Cases

Apex FlowManager is a network traffic monitoring product developed by Tekview. It is a powerful tool of traffic monitoring, measurement, tracking, analysis and management. Apex FlowManager provides comprehensive real-time network traffic reports and statistical data for the entire network, and implements in-depth analysis of network traffic composition and path. It helps carriers, government, education organizations, and enterprises in the filed of finance, electric power and etc. to build up an effective network traffic optimization strategy that quickly detects and identifies abnormal network traffic. By examining every data message, analyzing and intelligently correlating various types of data, Apex FlowManager can effectively monitor the status of various network flows. It warns or blocks illegal network usage and provides powerful evidence on network optimization and capacity expansion.

As an important part of the complete solution of Apex ITManager, Apex FLowManager can work with NetManager and ApplicationManager, and form different solutions to meet different customer requirements.

Apex FlowManager, from enterprise customers’ point of view, is comprehensive, advantageous, reliable, and advanced software that meets the requirements of both mid-level and high-level network management. It effectively helps enterprise users analyze and master network performance comprehensively, and hence, helps users improve network stability and reliability, guarantee the efficiency, safety and stability of core services, and gain an advantageous position in the fierce competition.

•Total flow Overview
Total flow Overview describes the status of all messages in the whole network. For example the status under monitor are the number of broadcast messages, the number of IP lamination texts, Message length distribution, IP TTL distribution, distribution agreement, network load, VLAN, autonomous domain, and etc. These basic statuses tells whether the current network is normal or not.

•Network throughput
The system can draw the diagram, including hour chart, day chart and month chart, of factual bandwidth at the current network monitor point.

•VLAN Traffic Information
FlowManager supports statistical analysis of all traffic among the Vlan, and carries on the effective management to Vlan.

•Chart of contrastive network traffic
Through the comparison of different charts, we can find network traffic occupancy clearly, and we can also know the most bandwidth of the machine and agreement.

•Network equipment traffic monitoring
System can monitor various network interface traffic of network equipment, such as switches, routers, business-critical servers, ect. We can monitor the port traffic if the network equipment and Host support the SNMP Service. All these traffic information is obtained through SNMP. These messages can be used to judge a physical network situation.
 

• The information of host IP packet flow
All of the host IP packet traffic, including the size of the flow of various agreements, flow to distribution information, and so on. The users can clearly understand the content of the network through some commonly used monitoring information. For example, common services(web,mail,ftp,etc), instant messaging(msn,QQ), P2P download(eDonkey,BT).

•Link’s flow distribution of user group
FlowManager can define user groups by IP-range, provide the traffic statics of user group and distribution agreements and other information accurately.

•Web surfer behavior audit
FlowManager can monitor all of the web access, including access to a list of the URL. In a web access quite busy network, we may establish certain filtration rule which only monitor the interested web access.

•IP-MAC binding
Through establishes the IP-Mac binding rule, may discover the IP resources abuse and the IP deceit. In some networks, the unscrupulous user through the use of ARP deception or IP deceit to undermine network, some users spontaneous illegally set up their DHCP server, thus makes the network increasingly complex and chaotic, through IP-MAC binding may discover these abuse behaviors.

•Traffic threshold
Traffic threshold includes two types of traffic threshold, they are threshold for the entire network and a port threshold.
The threshold rules set in different pages, for example, IP traffic pages, all traffic pages, the total traffic pages. In a word, all the threshold rules can be set through hyperlinks.

•Custom Agreement Monitoring
The user custom the new application according to their needs. For instance, the key servers, the specific applications, the specific serves, and so on.

3

4

1999-2014 © Tekview. All Right Reserved. Tekview Technologies Co., Ltd.