From preparing and verifying changes, through planning network transitions and upgrades,
to finding root cause and determining business impact, IP Fabric helps network engineers
throughout network lifecycle. See for yourself how comprehensive technological mapping
and formal verification can help you with network projects and network management.
NIMPEE is Plug&Play, intelligently discovering over 3 000 devices per hour, identifying known and unknown devices, eliminating the need for manual data entry to CMDB, and providing detailed asset information needed throughout network lifecycle, from technical projects to billing audits.
With tens of thousands of endpoints it was impossible to maintain up-to date inventory. NIMPEE enables us to locate any device or endpoint in the network, and to ensure that new network devices and interfaces are added to the monitoring systems
Network Manager, National transportation operator
Only a single set of read-only network authentication credentials is required for full network discovery and mapping. All other configuration is optional, including seed addresses or network scanning. NIMPEE follows active network relationships to naturally discover all existing paths, devices, and users.
Devices, interfaces, modules, part numbers, serial numbers, operating systems, and much more are detailed in the live network inventory. Instantly find interface using description or filter out specific status
NIMPEE maps location of all devices, users, hosts, and endpoints. Location awareness enables to find connection information for any individual user or to search for users connected to a specific device or using a specific router. Topology awareness enables to automatically detect site boundaries, which can be further configured to accommodate and group the devices accordingly.
Network Visualisation and Dynamic Diagrams
Network visualization and dynamic network mapping is necessary for troubleshooting, assessment, and planning of the network, however maintaining a detailed map of the entire network is beyond legacy tools. NIMPEE provides detailed technology visibility and drilldowns in dynamic network maps, visualizing individual technology and protocols, which enable network engineers to plan changes, troubleshoot connectivity issues, and document the network.
Mapping and verifying end to end paths, from switching trough balancing to firewall and cluster policies, enables us to troubleshoot issues much quicker, and to communicate with other engineers about the network
Network Engineer, National Traffic Controller
End to End Paths
Visualize complete active network path between any two endpoints. See all routing and switching forwarding decisions, including the results of all security decisions of all active path filters for the specific source-destination pair.
Show site-to site connectivity or individual sites, including all managed and unmanaged devices. Display wired and wireless users, or IP phones. Visualize details of individual protocols or aggregate links and topology into representative view.
Protocols & features
Display active QoS, applied Access Control Lists, or transmission issues on any of the diagrams. Verify link and device redundancy, or visually analyze specific protocol topology.
History and Configuration Management
Tracking changes enables to verify, document and understand what is happening in your network. Whether performing changes manually or using automation, adding hardware, swapping cables, or troubleshooting why the network has stopped working, NIMPEE identifies dynamic and administrative changes in the network, enabling to verify deployments, validate work, and control the rate of change
Answering what has changed in the network has always been a nightmare of long and detailed analysis. Now it’s available as a report every day
Network Manager, International Bank
Track Dynamic Changes
Find changes that occurred since last week or since last month ago. Compare any two network state snapshots to find changes in network connectivity, addressing, device operating systems, module serial numbers, and more.
Track Administrative Changes
See when changes have occurred on the devices throughout the network or find change history for a specific device. See exactly what has changed in the configuration or compare configurations of different devices. Use stored configuration for device recovery or sanitized configuration for sharing.
Network Documentation and Analysis Reports
Reporting and planning requires proper documentation with detailed technical parameters. Up to date documentation and history are very time consuming to maintain and require continuous effort. NIMPEE generates historical and current network documentation and network analysis reports, supporting change management processes, team communication and reporting.
Proper documentation is impossible to maintain because it requires significant and constant effort. Automating creation of detailed documentation enables to maintain up to date and historical information, which significantly reduces risk and overhead in our projects
Senior Network Engineer, Multinational financial services company
Network Analysis Report
A network-wide document in Microsoft Word format containing summarized and detailed network analysis results, including transmission issues and risks. Document can be generated for the current network state, or for any previous network snapshots.
Site low level design
Site-specific technical document containing detailed information needed to successfully reconstruct the site. The document includes information such as hardware and software, interfaces and connectivity matrix, Spanning Tree and VLANs, routing, addressing, and management. Document can be generated for the current network state, or for any previous network snapshots.
Verification and Risk Audit
Key to preventing outages is visibility into all operational aspects of technology, including hidden risks. Maintaining such deep visibility is not possible without specialized tools. NIMPEE verifies all operational parameters and behavior in the network, identifying risks such as critical single points of failure, nonfunctioning backups, broken links, and unstable paths, which can be fixed before the outage. A hundred of predefined verifications can be modified or new checks added depending on the specific needs. NIMPEE prioritizes issues by the number of affected users, enabling you to focus on issues based on business impact, not just severity.
Without NIMPEE we could not continuously verify that 802.1X access control technology was deployed where necessary, and that there are no detours or loops in our network, preventing issues that would normally arise
Network Engineer, Global Logistics Operator
Ensure redundancy policy is followed for the networks of specific size, or serving a large number of users. Visually inspect missing redundancy and determine optimal interconnections
Identify paths that pose risk to topology stability, or paths that have violated guarded state, and specific reason behind the issues. Find crashed and recently rebooted devices. Identify Layer 2 spanning tree convergence and the number of the affected users. Determine routing convergence from the overall routing presence.
Verify consistency of Operating System deployment or FHRP/STP protocol collocation alignment throughout the network. Correlate with excessive broadcasts or diagrams of the network
Advanced Analytics & Much More
The number of affected users is calculated for every issue through topology and user location awareness, which enables to prioritize issues not only by technical severity, but also by the extent of impact on the network. Issues in the backbone and on the uplinks will naturally have higher business impact, because they will be affecting a larger portion of the business.
Analyze all the details of all the Access Control Lists in the network, including every row content and parameters, and point in the network where the access lists are applied
Find an IP address from a specific network in a body of any log message ever received by the system. Filter specific message types or sort by message severity. Find any security-related logging message by searching for a network of interest or by message type
See for yourself how comprehensive technological mapping and formal verification can help you with network projects and network management