NIMPEE

Network Infrastructure Management Platform Engineering Edition

Discovery & Inventory

NIMPEE is Plug&Play, intelligently discovering over 3 000 devices per hour, identifying known and unknown devices, eliminating the need for manual data entry to CMDB, and providing detailed asset information needed throughout network lifecycle, from technical projects to billing audits.

With tens of thousands of endpoints it was impossible to maintain up-to date inventory. NIMPEE enables us to locate any device or endpoint in the network, and to ensure that new network devices and interfaces are added to the monitoring systems Network Manager, National transportation operator
Intelligent Discovery

Intelligent Discovery

Only a single set of read-only network authentication credentials is required for full network discovery and mapping. All other configuration is optional, including seed addresses or network scanning. NIMPEE follows active network relationships to naturally discover all existing paths, devices, and users.

Detailed Inventory

Detailed Inventory

Devices, interfaces, modules, part numbers, serial numbers, operating systems, and much more are detailed in the live network inventory. Instantly find interface using description or filter out specific status

Network mapping

Network Mapping

NIMPEE maps location of all devices, users, hosts, and endpoints. Location awareness enables to find connection information for any individual user or to search for users connected to a specific device or using a specific router. Topology awareness enables to automatically detect site boundaries, which can be further configured to accommodate and group the devices accordingly.

Network Visualisation and Dynamc Diagrams

Network visualization and dynamic network mapping is necessary for troubleshooting, assessment, and planning of the network, however maintaining a detailed map of the entire network is beyond legacy tools. NIMPEE provides detailed technology visibility and drilldowns in dynamic network maps, visualizing individual technology and protocols, which enable network engineers to plan changes, troubleshoot connectivity issues, and document the network.

Mapping and verifying end to end paths, from switching trough balancing to firewall and cluster policies, enables us to troubleshoot issues much quicker, and to communicate with other engineers about the network Network Engineer, National Traffic Controller
End to End Paths

End to End Paths

Visualize complete active network path between any two endpoints. See all routing and switching forwarding decisions, including the results of all security decisions of all active path filters for the specific source-destination pair.

Site Connectivity

Site Connectivity

Show site-to site connectivity or individual sites, including all managed and unmanaged devices. Display wired and wireless users, or IP phones. Visualize details of individual protocols or aggregate links and topology into representative view.

Protocols & features

Protocols & features

Display active QoS, applied Access Control Lists, or transmission issues on any of the diagrams. Verify link and device redundancy, or visually analyze specific protocol topology.

History and Configuration Management

Tracking changes enables to verify, document and understand what is happening in your network. Whether performing changes manually or using automation, adding hardware, swapping cables, or troubleshooting why the network has stopped working, NIMPEE identifies dynamic and administrative changes in the network, enabling to verify deployments, validate work, and control the rate of change

Answering what has changed in the network has always been a nightmare of long and detailed analysis. Now it’s available as a report every day Network Manager, International Bank
Track Dynamic Changes

Track Dynamic Changes

Find changes that occurred since last week or since last month ago. Compare any two network state snapshots to find changes in network connectivity, addressing, device operating systems, module serial numbers, and more.

Track Administrative Changes

Track Administrative Changes

See when changes have occurred on the devices throughout the network or find change history for a specific device. See exactly what has changed in the configuration or compare configurations of different devices. Use stored configuration for device recovery or sanitized configuration for sharing.

Network Documentation and Analysis Reports

Reporting and planning requires proper documentation with detailed technical parameters. Up to date documentation and history are very time consuming to maintain and require continuous effort. NIMPEE generates historical and current network documentation and network analysis reports, supporting change management processes, team communication and reporting.

Proper documentation is impossible to maintain because it requires significant and constant effort. Automating creation of detailed documentation enables to maintain up to date and historical information, which significantly reduces risk and overhead in our projects Senior Network Engineer, Multinational financial services company
Network Analysis Report

Network Analysis Report

A network-wide document in Microsoft Word format containing summarized and detailed network analysis results, including transmission issues and risks. Document can be generated for the current network state, or for any previous network snapshots.

Site low level design

Site low level design

Site-specific technical document containing detailed information needed to successfully reconstruct the site. The document includes information such as hardware and software, interfaces and connectivity matrix, Spanning Tree and VLANs, routing, addressing, and management. Document can be generated for the current network state, or for any previous network snapshots.

Verification and Risk Audit

Key to preventing outages is visibility into all operational aspects of technology, including hidden risks. Maintaining such deep visibility is not possible without specialized tools. NIMPEE verifies all operational parameters and behavior in the network, identifying risks such as critical single points of failure, nonfunctioning backups, broken links, and unstable paths, which can be fixed before the outage. A hundred of predefined verifications can be modified or new checks added depending on the specific needs. NIMPEE prioritizes issues by the number of affected users, enabling you to focus on issues based on business impact, not just severity.

Without NIMPEE we could not continuously verify that 802.1X access control technology was deployed where necessary, and that there are no detours or loops in our network, preventing issues that would normally arise Network Engineer, Global Logistics Operator
Redundancy

Redundancy

Ensure redundancy policy is followed for the networks of specific size, or serving a large number of users. Visually inspect missing redundancy and determine optimal interconnections

Network Stability

Network Stability

Identify paths that pose risk to topology stability, or paths that have violated guarded state, and specific reason behind the issues. Find crashed and recently rebooted devices. Identify Layer 2 spanning tree convergence and the number of the affected users. Determine routing convergence from the overall routing presence.

Consistency

Consistency

Verify consistency of Operating System deployment or FHRP/STP protocol collocation alignment throughout the network. Correlate with excessive broadcasts or diagrams of the network

Advanced Analytics & Much More

Issue prioritization

Issue prioritization

The number of affected users is calculated for every issue through topology and user location awareness, which enables to prioritize issues not only by technical severity, but also by the extent of impact on the network. Issues in the backbone and on the uplinks will naturally have higher business impact, because they will be affecting a larger portion of the business.

Security Analytics

Security Analytics

Analyze all the details of all the Access Control Lists in the network, including every row content and parameters, and point in the network where the access lists are applied

Log Analytics

Log Analytics

Find an IP address from a specific network in a body of any log message ever received by the system. Filter specific message types or sort by message severity. Find any security-related logging message by searching for a network of interest or by message type

See for yourself how comprehensive technological mapping and formal verification can help you with network projects and network management