Nepean Networks' Traffic Intelligence | Empowering Smart SD-WAN with AI-Driven Insights

Ronald BartelsRonald Bartels
5 min read

In the dynamic world of modern networking, where businesses rely on seamless connectivity, security, and performance, Nepean Networks stands out with its innovative Smart SD-WAN strategy. At the core of this approach is Traffic Intelligence, a sophisticated add-on powered by the Illuminate platform. This system blends artificial intelligence with advanced analytics to deliver unprecedented visibility and control over network traffic. By transforming raw data into actionable insights, Traffic Intelligence shifts network management from reactive firefighting to proactive optimization, ensuring businesses stay ahead of threats, bottlenecks, and inefficiencies.

Traffic Intelligence is more than just monitoring—it's a comprehensive toolkit designed for today's distributed, cloud-centric environments. Through Illuminate's AI-infused Deep Packet Inspection (DPI) engine, it provides real-time transparency into network activities without compromising privacy or performance. Let's explore how this powerful feature set elevates SD-WAN deployments.

Where AI Meets Analytics | The Illuminate Foundation

Nepean Networks' Illuminate is the cornerstone of Traffic Intelligence, combining a lightweight DPI engine with cloud-based informatics and data feeds to unlock deep network insights. This three-tier solution stack starts with the DPI engine, which identifies applications, protocols, hostnames, encryption ciphers, and other key attributes directly on network devices. It integrates seamlessly for tasks like traffic identification, firewalling, Quality of Service (QoS), and cybersecurity.

The informatics engine then aggregates this data in the cloud, turning it into meaningful analytics for device discovery, application analysis, and risk assessment. Finally, data feeds offer intelligence on thousands of popular applications, including domains, IPs, CDNs, platforms, and protocols. Crucially, Illuminate focuses solely on metadata—statistics and summaries of flow data—avoiding the capture of actual transmitted content to ensure compliance with data protection standards like PCI DSS and HIPAA.

This AI-driven approach goes beyond traditional tools, using machine learning to detect anomalies, predict threats, and optimize usage patterns. For instance, it can pinpoint unauthorized VPNs, rogue DHCP services, or even compromised IoT devices that might evade endpoint security agents.

Over 40 Real-Time Dashboards for Comprehensive Visibility

One of Illuminate's standout features is its extensive suite of over 40 real-time dashboards, tailored to provide granular insights across key areas. These dashboards empower IT teams and MSPs to monitor and manage networks with precision, turning complex data into intuitive visualizations.

  • Inventory and Asset Tracking: Illuminate automatically detects and catalogs all devices on the network, from laptops and smartphones to IoT gadgets like cameras, printers, and smart watches. It tracks attributes such as vendor, category, IP and MAC addresses, discovery times, and last-seen timestamps. This creates a dynamic inventory that helps identify unauthorized devices, such as rogue wireless access points that could interfere with operations. In policy enforcement scenarios, it flags violations like prohibited activities (e.g., torrent downloads or crypto-mining), providing logs for compliance or disciplinary actions.

  • Bandwidth Usage by Site, User, or Application: Gain tailored reports on bandwidth consumption segmented by user, group, application, device type, OS, protocol, and more. Illuminate's DPI excels at identifying bandwidth hogs, breaking down usage into uploads and downloads. Name resolution reports detail internet connections, categorizing them by business vs. social media use, and even geolocating connections to highlight global patterns. This level of detail is invaluable for optimizing resources and enforcing productivity policies.

  • Cybersecurity Threat Monitoring: Using machine learning, Illuminate identifies cyber risks, malware, and risky behaviors in real-time. It detects access to known command-and-control servers for botnets, outdated protocols vulnerable to exploits, and data leaks from IoT devices or browsers with "call home" features. Out-of-band analysis spots sophisticated malware that disables endpoint agents, offering early warnings against ransomware or other attacks. It also audits DHCP and DNS servers to uncover rogue services or man-in-the-middle threats, and highlights dark web access or legacy protocols like SMBv1 that propagate vulnerabilities.

  • Application Performance Metrics: Deep packet inspection accurately identifies applications in use, providing real-time protocol analysis and hostname visibility from various traffic flows. Dashboards reveal application-specific metrics, enabling administrators to prioritize critical tools like video calls or cloud services while throttling non-essential ones.

These dashboards are accessible via a user-friendly portal, making advanced analytics available to businesses of all sizes without requiring extensive expertise.

Deeper Performance Analysis with Grafana-Based Metrics

For those needing even more detailed scrutiny, Traffic Intelligence integrates a Grafana-based metrics engine—part of the Antares platform—to deliver in-depth performance visibility. Antares serves as the command center for SD-WAN management, extending Illuminate's capabilities with intuitive graphs that span timeframes from one minute to one year.

Key metrics include:

  • Bit Rate, Latency, and Jitter: Monitor data transfer speeds, delays, and variations in real-time to ensure smooth performance for latency-sensitive applications like VoIP or video conferencing.

  • Packet Loss and Utilization: Track dropped packets and resource usage to identify bottlenecks or overutilization, preventing downtime and optimizing link aggregation across multiple ISPs (e.g., fiber, LTE, fixed wireless).

  • Experience Scoring and Change Tracking: Assign scores to user experience based on QoS metrics and track changes over time. This helps detect subtle degradations, such as recurring packet loss at remote sites, allowing for proactive adjustments.

Integration with Antares also supports zero-touch provisioning via Nepean Networks' Juggler service, simplifying deployments and enabling remote management of upstream (modems, routers) and downstream (access points, switches) devices. In real-world tests, this setup has prevented outages, saving hours of downtime while maintaining seamless failover.

From Reactive Troubleshooting to Proactive Optimization

Traffic Intelligence redefines network management by evolving it from a reactive process—waiting for issues to arise—to a proactive strategy focused on prevention and enhancement. Traditional "set it and forget it" approaches to firewalls and SD-WAN leave vulnerabilities unpatched, rules stale, and configurations misaligned. Illuminate addresses this by continuously watching the firewall and network traffic, validating against best practices, and providing forensic tools to trace incidents back in time.

For MSPs and businesses, this means reduced operational costs, faster issue resolution, and enhanced security. A case in point: A retail chain using Nepean Networks' SD-WAN reduced public IP usage, simplified deployments, and achieved zero downtime for point-of-sale systems—all monitored through Traffic Intelligence's dashboards.

In an era of relentless cyber threats and exploding data demands, Nepean Networks' Traffic Intelligence equips businesses with the tools to thrive. By leveraging AI, DPI, and integrated analytics, it not only illuminates the network but also illuminates the path to superior performance, security, and efficiency.


10
Subscribe to my newsletter

Read articles from Ronald Bartels directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ronald Bartels
Ronald Bartels

Driving SD-WAN Adoption in South Africa