Specifications
© 2006 Cisco Systems, Inc.
All rights reserved.
Product Features 2-33
NAM / Traffic Analyzer v3.5 Tutorial
© 2006 Cisco Systems, Inc. All rights reserved.
Product Features 2-33
NAM / Traffic Analyzer v3.5 Tutorial
Planning for NAM Deployment
Summary
Planning for NAM Deployment
Summary
Identify the problems or needs you are trying to solve with the NAM.
Determine how many NAMs you will need to deploy and where you need to
deploy them.
Define access policies, data collection and reporting, and alarm configuration
requirements for each NAM to match needs.
Identify what data collection and monitoring needs will help resolve
problems or needs.
Identify the appropriate SPAN sources – port, VLAN, or Cisco EtherChannel
tunnel for each NAM.
Configure security, monitoring, and alarming as defined in the previous steps.
View, modify, and monitor the configuration as necessary.
Review NAM system resources to ensure that NAM will continue to
support your collection and monitoring needs.
3
3
3
3
3
3
3
3
Planning Summary
Obviously, there is no easy formula for determining how many NAMs you will need, where the NAMs should
be deployed, and how they should be configured. It depends on what business or technical problems you are
trying solve. And those are just some of the things you need to consider. In short, following are some
guidelines for planning and implementing the NAM:
• Identify the problem or need you want to resolve with the NAM.
• Identify what data and reports will help resolve the problems or needs.
• Determine how many NAMs you need and where you need to deploy them.
• Identify the appropriate Data sources—port/interface, segment, VLAN, or Cisco EtherChannel®
tunnel—for each NAM.
• Define what access policies, data collection and reporting, or alarm features are needed for each
NAM.
• Configure security, monitoring, and alarms to meet the needs defined previously.
• Review NAM system resources to ensure that NAM resources remain low enough to support your
data collection and monitoring needs.
• View and modify your reports and configuration as necessary.
We have identified some strategies and considerations for the first three steps. The next section covers how
to configure access, data sources, data collection and reports, and alarms to deliver the monitoring you
need.