NIMPEE v2.0

Network Infrastructure Management Platform Engineering Edition
  • Visualizes, maps, and documents the network
  • Warns about risks and impending outages.
  • Tracks dynamic and administrative changes.
  • Continuous Validation and compliance audits.

We are sorry, this video introduce NIMPEE 1.0. New video for 2.0 version coming soon!

Discovery, Inventory, Mapping

Intelligent Discovery

Intelligent Discovery

Only a single set of read-only network authentication credentials is required for full network discovery and mapping. All other configuration is optional, including seed addresses or network scanning. NIMPEE follows active network relationships to naturally discover all existing paths, devices, and users.

Detailed Inventory

Detailed Inventory

Devices, interfaces, modules, part numbers, serial numbers, operating systems, and much more are detailed in the live network inventory. Instantly find interface using description or filter out specific status

Network mapping

Network Mapping

NIMPEE maps location of all devices, users, hosts, and endpoints. Location awareness enables to find connection information for any individual user or to search for users connected to a specific device or using a specific router. Topology awareness enables to automatically detect site boundaries, which can be further configured to accommodate and group the devices accordingly.

Network Visualisation and Dynamc Diagrams

End to End Paths

End to End Paths

Visualize complete active network path between any two endpoints. See all routing and switching forwarding decisions, including the results of all security decisions of all active path filters for the specific source-destination pair.

Site Connectivity

Site Connectivity

Show site-to site connectivity or individual sites, including all managed and unmanaged devices. Display wired and wireless users, or IP phones. Visualize details of individual protocols or aggregate links and topology into representative view.

Protocols & features

Protocols & features

Display active QoS, applied Access Control Lists, or transmission issues on any of the diagrams. Verify link and device redundancy, or visually analyze specific protocol topology.

Change and Configuration Management

Track Dynamic Changes

Track Dynamic Changes

Find changes that occurred since last week or since last month ago. Compare any two network state snapshots to find changes in network connectivity, addressing, device operating systems, module serial numbers, and more.

Track Administrative Changes

Track Administrative Changes

See when changes have occurred on the devices throughout the network or find change history for a specific device. See exactly what has changed in the configuration or compare configurations of different devices. Use stored configuration for device recovery or sanitized configuration for sharing.

Network Documentation and Analysis Reports

Network Analysis Report

Network Analysis Report

A network-wide document in Microsoft Word format containing summarized and detailed network analysis results, including transmission issues and risks. Document can be generated for the current network state, or for any previous network snapshots.

Site low level design

Site low level design

Site-specific technical document containing detailed information needed to successfully reconstruct the site. The document includes information such as hardware and software, interfaces and connectivity matrix, Spanning Tree and VLANs, routing, addressing, and management. Document can be generated for the current network state, or for any previous network snapshots.

Continuous Compliance and Risk Audit

Redundancy

Redundancy

Ensure redundancy policy is followed for the networks of specific size, or serving a large number of users. Visually inspect missing redundancy and determine optimal interconnections

Network Stability

Network Stability

Identify paths that pose risk to topology stability, or paths that have violated guarded state, and specific reason behind the issues. Find crashed and recently rebooted devices. Identify Layer 2 spanning tree convergence and the number of the affected users. Determine routing convergence from the overall routing presence.

Consistency

Consistency

Verify consistency of Operating System deployment or FHRP/STP protocol collocation alignment throughout the network. Correlate with excessive broadcasts or diagrams of the network

Advanced Analytics & Much More

Issue prioritization

Issue prioritization

The number of affected users is calculated for every issue through topology and user location awareness, which enables to prioritize issues not only by technical severity, but also by the extent of impact on the network. Issues in the backbone and on the uplinks will naturally have higher business impact, because they will be affecting a larger portion of the business.

Security Analytics

Security Analytics

Analyze all the details of all the Access Control Lists in the network, including every row content and parameters, and point in the network where the access lists are applied

Log Analytics

Log Analytics

Find an IP address from a specific network in a body of any log message ever received by the system. Filter specific message types or sort by message severity. Find any security-related logging message by searching for a network of interest or by message type

Love Networks? Love Javascript? Want to be part of our team?

We're always looking for talented, passionate people to join our team.