You are on page 1of 34

2021 H3C HSE Training

iMC (Intelligent Management Platform)


CONTENTS 1. General Introduction
2. Challenges of NMS
3. iMC (Intelligent Management Platform)
4. Components of iMC
5. Case Study
General Introduction
Brand value, Market position
Certificates
Brand value and market position

No.1 market share in China

Serving 30000+ customer

Delivery of 500000+ sets

500+ invention patents

Gartner Magic Quadrant

Continuous development for


18 years
No.1 Market share in China

The only China brand selected by Gartner


Challenges of NMS
Diverse brands, massive devices
Lack of data basis, complicated deployment
Requirements of convergent IT management

Business
Convergence
Entire
Concentration
Local
Concentration
Decentralized Convergent Management for
business
Management Management for multiple IP
resources, i.e. network,
Centralized management security and storage, etc.
and unified policy delivery
Network device management,
focusing on configuration and
performance

 IT resources of network, computing and storage tend to converge and collaborate


 Unified management of hardware, middleware, client and APP
 IT users, IT resources and application business showing trend of close integration
Multiple vendors, various models ?
Facing challenges anytime

Why cannot
log in ERP
Deployment and management

01 How to simplify deployment and 02 How to be well-documented and


improve efficiency strengthen management
Lack of data basis

• How to effectively prove the


01
completion of KPI ?

• How to truthfully show the


02
overall state of the network ?

• How to truly reflect the


03 urgency and necessity of
expansion ?
Existing problems we face

Difficult to manage Hard to remind failure Difficult to locate


network accurately warning promptly problems quickly

Hard to assess risks Difficult to record Macro-decision-making


for network change network behavior without data support
iMC
Intelligent Management Platform
H3C intelligent management center
iMC Plat + Components + License

Enabling network agility to drive business efficiency


What can iMC do ?

iMC Standard
Edition
Professional
Edition

Resource Performance Fault Security Configuration Hierarchical

• Auto discovery • Network monitor • Alarm • Authority • Obtain conf. • Fast link up
• Topology mgt. • Threshold control • Fault analysis control • Review & • Alarm report
• Device information • Performance • Troubleshootin • Access control check • Multilevel report
• Remote mgt. analysis g • Log analysis • Backup
• Visualization • Notification • Batch release
iMC platform legend

iMC Platform Homepage Network Topology iMC WSM Module


Network element management
Providing intuitive device panel display, WYSIWYG, displaying device composition and running
status.
Customized dashboard
Dashboard can be customized at will, displaying what you need in real time.
Configuration management

Automatic deployment Conf. comparison


Conf. template lib Compliance check
Version template lib Baseline audit
Deployment guide Overview of changes
Conf. backup List of device conf.
Conf. rollback Syslog of operation
Highlight – Hierarchical management

 Deployment by
hierarchical authority
Headquarter NMS
 10000 nodes per station
 Synchronizing data of
topology, assets
Tier-2 NMS
information, alarm,
performance and report
by standard API between
Local NMS Local NMS Local NMS
superior and low-level
NMS
Highlight – Management for multiple vendors

iMC multi-vendor equipment management is based on public MIB, i.e.


RFC1213, LLDP-MIB and Entity-MIB.

220+ vendors

1600+product series

8000+product models

Customized setting
Installation and deployment

 Multi OS: Windows, Linux


Slave 1 Slave 2 Slave 3

 Centralized or distributing deployment


iMC  Cold standby or hot standby of two servers
Server Cluster Master
 Virtualization deployment (License Server)
CMI
 Hot standby support both sharing storage
cluster and DRBD
Internet Explorer, Firefox,Chrome
Components of iMC
EIA/EAD, WSM, NTA …
EIA: End-user intelligent access
Unified Wired and Wireless Access Control

• Policy-based user and device authentication ,


authorization and enforcement
Application Access • Access rules based on user role, device type and
IMC Policy Enforcement endpoint integrity
• Advanced mobile device profiling (fingerprinting)
• 802.1X authentication & simplified self registration
portal option
• Traffic shaping for optimal bandwidth allocation
• Customizable portal to match customer’s brand
Employee Guest
EIA application scenarios

Business Dumb
Office Public WiFi Device Mgt.
Trip Terminal
Recommended:

• Wired/wireless access • Transmission security • Clientless model • Authenticate


• Certificate and token over public network • Get phone number & terminals that cannot
ring supported through SSL VPN Open ID by following actively initiate authN
• Temporary authN for • Access to internal official account • Auto-scan IoT
guests resources • Push ads endpoints
WSM: Wireless services manager
Unified Wired and Wireless Management
Wired & Wireless network visibility
• Status and monitoring of user terminals
• Discover wireless APs & connected clients
• Track device status, performance and users
STATION
• Ensures consistency with AP configure backup
MAC: 00:24:d6:94:d7:52 • Maps your wireless network
Who’s connected?
• Optimizes wireless coverage with heat map
• Location based services
Where are your APs? What status • Robust reporting for compliance
are the APs?
WSM heat-map management

Draw barriers
Support different line type, barrier texture Check RF coverage according
and thickness, and system can calculate Check RF coverage according to channel
attenuation to signal intensity

 AP and antenna models built in WSM  Support AP and vAP deployment together
 Support user-defined AP and antenna model  Support RF Plan report
 Draw RF coverage result according to antenna wave and angle  Support user-defined RF coverage color
NTA: Network traffic analyzer

Greater visibility and control of network usage


• Unlocks power of data monitored
- Including Netflow, NetStream and Sflow
- Enables user-based traffic flows and network usage
• In-depth rule-and-policy-based analysis
- Including fault and SLA analysis
• Easy to understand reports based on traffic,
application, session baseline and traffic trend
IPM: intelligent Portal management
Comprehensive management capabilities

Dashboard North-bound API

Network Mgt. Service Mgt. Endpoint Mgt. Wireless Mgt.


ACL Mgt. Endpoint Access (EIA) Wireless Service (WSM)
Traffic analysis (NTA)
QoS Mgt. Endpoint Profile (EIP) Real-time Location (RTLS)
Service Layer Application Mgt. (APM)
Network Detect (NPD) Endpoint Admission (EAD) Spectrum Analysis
3D Room (3DM)
IPSec VPN (IVM) Endpoint Data (EDM) Quality Evaluation
Intelligent Report (iAR)
MPLS VPN (MVM) Endpoint Behavior (EBM) Wireless Troubleshooting
User Behavior (UBA)
Branch Mgt. (BIMS)

Plat Layer Alarm Report Performance Topology Configuration

Network Server Storage Virtualization Database Middleware Application OS Computer Room


Case Study
Four major banks in china
Unified management platform for four major banks

Project background:
• Diverse manufacturer brands, massive equipment, and
complicated equipment types are difficult to manage
• Low O&M efficiency and frequent configuration errors
• The operation cannot be traced back and compared, and
there is a lack of audit means
• Lack of rapid disaster recovery and recovery capabilities

Construction goal:
• Unified management of all network equipment on the
existing network
• The bank-wide automated operation and maintenance
and audit management platform
• Provide a unified equipment configuration operation
entry for the whole bank
• The only export of equipment operation audit data in the
whole bank
Customer benefits

Unified Automated Disaster Audit


management configuration recovery automation
automation

Complete the unified Through automated By improving the Audit user


management of more batch operations, the batch scheduling behavior and
than 10 brands, more operation and function and configuration
than 200 models, and maintenance efficiency designing a one-key content, and
a total of more than was reduced from 180 disaster recovery provide alerts for
15,000 equipment. man-days to 9 man- function, the efficiency configuration
days, and the efficiency of disaster recovery is changes.
was increased by 20 greatly improved.
times.
Thank You

You might also like