Professional Documents
Culture Documents
Whitepaper
ii | BlueCat Networks
Use of this document This publication is provided as is without warranty of any kind,
express or implied, including, but not limited to, the implied
Copyright warranties of merchantability, fitness for a particular purpose, or
non-infringement.
This document and all information (in text, Graphical User Interface
(“GUI”), video and audio forms), images, icons, software, design, All terms mentioned in this publication that are known to be
applications, calculators, models, projections and other elements trademarks or service marks are appropriately capitalized. BlueCat
available on or through this document are the property of BlueCat Networks cannot attest to the accuracy of this information. Use of
Networks or its suppliers, and are protected by Canadian and a term in this publication should not be regarded as affecting the
international copyright, trademark, and other laws. Your use of this validity of any trademark or service mark. The trademarks, service
document does not transfer to you any ownership or other rights marks and logos (the “Trademarks”) displayed are registered and
or its content. You acknowledge and understand that BlueCat unregistered Trademarks of BlueCat Networks, Inc. and others.
Networks retains all rights not expressly granted. Users are not permitted to use these Trademarks for any purpose
without the prior written consent of BlueCat Networks or the third
Persons who receive this document agree that all information party owning the Trademark.
contained herein is exclusively the intellectual property of BlueCat
Networks and will not reproduce, recreate, or other use material No Professional Advice
herein, unless you have received expressed written consent from This document is for convenience and informational purposes
BlueCat Networks. only. This document is not intended to be a comprehensive or
detailed statement concerning the matters addressed; advice or
Copyright © 2010, BlueCat Networks Inc. All rights reserved recommendations, whether scientific or engineering in nature or
worldwide. otherwise; or an offer to sell or buy any product or service. BlueCat
Networks does not warrant or make any representations regarding
Publisher Information the use, validity, accuracy, or reliability of, or the results of the use
Published in Canada — No part of this publication may be of, this website or any materials on this document or any website
reproduced, transmitted, transcribed, stored in a retrieval system, referenced herein. This document is intended solely for the use of
or translated into any human or computer language in any form or the recipient. It does not institute a complete offering and is not to
by any means without the express written permission of: be reproduced or distributed to any other person.
BlueCat Networks Inc.
4101 Yonge Street, Suite 502
Toronto, Ontario
Canada M2P 1N6
Attention: Product Manager
Telephone: 416-646-8400
Fax: 416-225-4728
E-mail: info@bluecatnetworks.com
Website: www.bluecatnetworks.com
IPAM Intelligence - All Roads Lead to Proteus™ | iii
Executive Summary
BlueCat Networks is leading the market in 3rd generation IP
Address Management and is defining it as IPAM Intelligence™. It
explains in detail the urgency around moving from spreadsheets,
homegrown, and legacy solutions to intelligent IPAM solutions.
Contents Integration����������������������������������������������������������������������������������������� 10
Support for Heterogeneous Environments�������������������������������������� 10
IPv6 Introduces New Complexity��������������������������������������������������������������� 2 Real-Time Visibility into DNS and DHCP Services������������������������������� 12
IP Reconciliation����������������������������������������������������������������������� 12
Why Legacy Tools and Manual Processes No Longer Work�������������������������������� 3 Mapping Devices���������������������������������������������������������������������� 13
1
OECD. (2008) Internet Address Space – Economic Considerations in the
Management of IPv4 and the Deployment of IPv6. Retrieved June 3, 2008 from
http://www.oecd.org/dataoecd/7/1/40605942.pdf
2
Executive Office of the President – Office of Management and Budget (2005)
Memorandum for the Chief Information Officers. Retrieved June 3, 2008 from http://
www.whitehouse.gov/omb/memoranda/fy2005/m05-22.pdf
3
EUROPA Press Release (2008) An unlimited source of Internet addresses to be on
stream in Europe by 2010. Retrieved June 3, 2008 from
http://europa.eu/rapid/pressReleasesAction.do?reference=IP/08/803&format=HTML
&aged=0&language=EN&guiLanguage=en
IPAM Intelligence - All Roads Lead to Proteus™ | 3
Why Legacy Tools and Manual Processes No compliance with regulations. These features allow administrators
to state with confidence who had access to what IP addresses and
Longer Work when, and assess the consequences of such access.
Within many small and medium-sized companies, network The lack of granular access control limits change management to a
administrators track IP addresses using spreadsheets. Every select few (typically senior administrators), as there is no means to
time new addresses and networks are allocated or modified, an extend restricted functionality to less experienced users. Without
administrator manually updates the spreadsheet. Management access control comes the problem of too many administrators
practices based on spreadsheets are prone to human error in changing the same data concurrently. This configuration problem
configuration. One conflicting IP address or assignment can can cause service outages and business disruption. A granular
disrupt network services. Spreadsheets used to monitor network IP approach to IP management allows for individual or group
usage have limited abilities to track large amounts of data in multi- administrative access rights on a hierarchical basis, that establishes
user environments. They simply do not scale to meet enterprise who can make changes, what can they change, who can approve
requirements. such changes, and when such changes can take effect.
▪▪
The Introduction of Intelligent IPAM Restoration of any deleted data pertaining to domains,
networks or IP addresses;
Vendors began introducing second generation IPAM solutions ▪▪ Quick navigation functionality to view entire networks;
over a decade ago. These software solutions were IP-oriented, but
▪▪ Network event notification;
were complex and oftenincluded an expensive licensing model.
▪▪ Enforcement of corporate naming policies; and,
Today’s ‘always-on / always accessible’ network infrastructures ▪▪ Accurate modeling of network domains for the purpose of
are considerably larger and more complex than those of 10 anticipating requirements for IP addresses
years ago. They are expected to deliver quality of service that
far outstrips decade-old requirements. Without question, IP Intelligent IPAM solutions embody these features and functions
address management is more challenging, and the need for more and much more. They offer services to ensure high availability
sophisticated IPAM tools and processes has emerged. Fortunately, and continuity of network services, such as database backup and
we are witnessing a transition from second generation IPAM restoration, clustering with data replication and automatic failover,
to intelligent solutions offering new capabilities required to data checking, system monitoring, auditing and reporting.
meet modern day network administration requirements. These
solutions offer leading-edge technology and innovative designs
to dynamically manage IP addresses and their associated data.
local administrators who are permitted to make changes to the network infrastructure
▪▪ Monitoring of remote appliances; within pre-prescribed guidelines based on access rights.
IPAM Intelligence - All Roads Lead to Proteus™ | 5
• Self Provisioning
• Distributed
Administration
• Multi-Core
Architecture
• Asset
Management
• Data Grouping
• Data Migration
• Ease of Use
6 | BlueCat Networks
Management
One of the most important aspects of any IPAM system is its
efficacy in managing your IP addresses, name space and DHCP
services while reducing your total cost of ownership. The goal of
every system should be to achieve centralized management with
distributed services.
IP DHCP DNS
BlueCat Networks’ Proteus™ appliance achieves this goal through
DHCP DNS concurrent usage, distributed administration, restrictive roles and
a web-based interface. Proteus’ multi-core design allows multiple
administrators to manage similar or disparate parts of the network
space from different points. For example, a user who is familiar with
Multiple users configuring DNS & DHCP services. the name space can manage the IP portion via the DNS interface,
where another user might want to manipulate DNS names from
the IP side.
addresses together to a single entity in the system to provide a to plan and deploy to a parallel testing environment – which mimics
tracking mechanism for dual stacked clients. a production environment – without interfering with production
servers and IP addresses.
Organizations can plan for the future and confidently deploy their
IPv6 networks when needed, knowing that Proteus can take them
to the next level.
IP Reconciliation
With Proteus, administrators can reconcile modeled IP address
IP Address Tracking information with the current state of their network. Reconciliation
can be defined for a block of address space or on a specific
IPAM solutions are responsible for maintaining accurate data on IP network.
inventories and their related allocations through DNS and DHCP.
Organizations must have real-time data about IP address allocation IP reconciliation uses automated, scheduled network discoveries
by configuration, zone and subnet while also tracking host names, to track actual IP usage on the network and reconcile this to
MAC addresses, port data and more. In large networks, resolving the data within Proteus. This allows administrators to unearth
accessibility issues becomes increasingly challenging, especially reclaimable IP addresses (those no longer in use on the network)
when multiple locations are involved. At any time, your network as well as discover addresses in use that have not been provisioned
administrator might need to access information of IP addresses in by Proteus.
use, when they were assigned, what devices are consuming the
address, and the network or subnet. Having this level of visibility The scheduling mechanisms allow for routine scans that can
greatly reduces network abuse, increases network management better determine the addresses in use, as well as ad-hoc scans
efficiency, and enhances network security. when irregular network behavior is suspected. Best practices in IP
reconciliation allows for the detection of:
Proteus’ purpose-built user interface, auditing and reporting tools ▪▪ Reclaimable IP addresses – IP addresses no longer in use
lead the IPAM market in IP tracking technology, enabling network on the network but are still allocated in the IP database;
administrators to monitor all network configuration changes
in real-time. With spreadsheets, network administrators simply ▪▪ Unknown IP addresses – IP addresses which exist on the
cannot track IP allocation at this level of granularity, let alone keep network but are not authorized (e.g. a manager who
up with the dynamic updates. attaches a wireless router to support extra staff ); and,
▪▪ Mismatched IP data – IP addresses which exist in both the
IP database and on the network, but do not match, as in
IP Modeling
the case of new MAC addresses being used with old IP
Proteus allows administrators to model different IP address spaces addresses due to a hardware refresh.
within an organization, including IANA IP grants, as well as any and
Proteus’ discovery module uses a non-invasive method to ‘walk the
all private spaces. You can model your public, corporate, private
network’ using layer 2 information. This is achieved by processing
and lab spaces with tools that track, partition, resize, move and
SNMP information through the routers without using a flood of
split IP network space. In addition, Proteus network templates
ping requests. The discovery process can detect routable networks,
allow you to pre-design your networks according to your business
default gateways and port information.
requirements. You can create one or more network templates that
include settings such as non-standard default gateway addresses, Administrators typically define IP reconciliation policies that
DHCP ranges, host record data, and DNS and DHCP deployment discover IP allocation information over several, periodic network
options. These templates save you from manually configuring sweeps. The discovered IP allocations are compared to the
hundreds or thousands of networks. allocation state maintained in Proteus to identify addresses that are
misaligned, which may indicate reclaimable IP space, unauthorized
Proteus allows you to manage overlapping IP spaces through the
addresses or updated IP information.
creation of separate Proteus configurations. This powerful feature
allows you to manage the IP spaces of separate entities without The reconciled information can also indicate dynamic allocations
conflict or issue. For example, in the event of two companies that do not match their states inside the DHCP service. This can be
merging, IT administrators can maintain separate conflicting IP used to identify a machine that might have hijacked a reserved
infrastructures that can co-exist while the IP integration process address.
is planned and deployed. For another example, consider an
Internet Service Provider who manages 20 different customers. Since many networks have mobile users, the IP addresses reported
Each customer’s IP space can exist in its own Proteus configuration during a single network discovery might not be an accurate
without interfering with others’ spaces. Another major benefit of representation of the network, which is why Proteus includes the
Proteus’ configuration feature is that it allows system administrators ability for scheduled network discoveries on a periodic basis. This
8 | BlueCat Networks
allows Proteus to build a baseline of data overtime that will help These tools transfer simple network administration to the network
the administrator to make a more educated decision in identifying users by empowering them to make their own IPAM requests.
and eliminating erroneous data. Such requests are automatically added to Proteus, with real-time
notification to an administrator, who can then approve or deny the
Once the network has been discovered, administrators can requests. By automating these arduous tasks, Proteus drastically
determine what actions should be taken. Proteus does not reduces the time and effort spent managing the IPAM system and
automatically process discovered data since administrators should the IP space it controls.
determine whether the information should be incorporated into
the system or not. There are different types of resolutions available
Distributed Administration
depending on how addresses were allocated and what information
the network discovery yielded. For example, a static address will To provide a centrally-managed environment for distributed
get processed differently from one allocated by DHCP. administration, Proteus offers a web-based interface. This
lightweight interface allows access to the Proteus system from any
Administrators can filter and sort data to focus on specific areas of
location, regardless of the administrators’ platforms [or underlying
interest. Once an administrator has chosen an action to reconcile,
processing requirements].
changes are made to the IP information and the audit trail is
updated, as with all Proteus operations. Many other systems support rich clients, which work well for small
numbers of administrators but create issues for concurrency and
platform compatibility. They also require additional software to be
Workflow
installed on an administrator’s desktop. This restricts which system
Users typically work on many different parts of the IPAM administrators can make changes, preventing them from making
infrastructure and usage patterns can be viewed based on the type changes away from their desk or when out of office.
of user. For example:
Proteus avoids this through its AJAX-enabled web interface that
▪▪ Power users can focus on building or merging networks; provides the benefits of a rich client without additional overhead
▪▪ Help desk staff can focus on adding DNS records to the and compatibility issues. Administrators can connect to Proteus
external name space; and, systems with any standard web browser, without the need for
additional software or plug-ins, and allowing them to connect
▪▪ Network engineers can focus on making changes to the from anywhere inside or out of the office.
DHCP settings on the network.
Single Core vs. Multi-Core for representing a DNS host record Data Grouping
with IPv4 and IPv6 addresses.
Most IPAM information is represented in a hierarchical structure and
navigated through drill downs, tree interfaces or decomposition.
Proteus’ multi-core design incorporates a method for identifying
A multi-core approach allows administrators to configure IPAM data objects that can be traversed laterally rather than via the traditional
in the core that they are the most familiar with. DNS administrators drill down approach.
are able to configure DNS changes and automatically update
the IP address space - as host records are created, the core Proteus’ Object Tagging feature allows users to apply contextual
responding IP addresses are reserved and marked in use. Similarly labels to multiple objects to create a unique navigation pattern
DHCP administrators are able to configure DHCP changes and and grouping structure. For example, users might want to group
automatically update the DNS and MAC spaces - as IP address network equipment by geographic location. Administrators can
are assigned or reserved, host names and MAC addresses can be define the tag structure for geographic zones, and then define
automatically created and assigned. Any change to one core will child tags that describe the desired structure. Users can then apply
automatically make the appropriate changes in any related core. tags to an object to define the relationship that will allow them to
traverse the objects outside the traditional parent-child model. For
In addition to the relationship between the various cores, another example, one can immediately display – “show me all the printers
important aspect of the multi-core design is its ability to map in NY building B on the 3rd floor”.
deployment roles and options onto various portions of the data.
Deployment roles contain information about how an object should
be deployed including the server and any additional parameters.
Data Migration
Roles are inherited down throughout a core to eliminate the need As you transition from spreadsheets or homegrown solutions to an
of repeating and introducing inconsistencies from human error. Intelligent IPAM solution, you need tools to migrate data from the
For example, an administrator can create a set of deployment old system to the new, in a manner that is simple and error free.
roles at the DNS view level and all sub-domains underneath Without such tools, the volume of data and its relationships can
will automatically inherit the roles. Some configurations will make data migration an arduous task.
require additional parameters that might span several servers.
For these situations, deployment options can accommodate Proteus simplifies data migration by using a purpose-built import
deploymentspecific data for a particular object. engine that migrates data from structured XML. This format can
10 | BlueCat Networks
between the network services and domain layers with many split applications to manage IP addresses ran into scale problems
between BIND on UNIX or Microsoft DNS. during the early stages of VoIP rollout. Others who used IPAM tools
licensed by IP address found themselves forced to increase their
budgets so that the rollout could continue.
BlueCat Adonis DNS/DHCP appliance
From an IPAM perspective, implementing VoIP involves three major
The BlueCat family of Adonis DNS/DHCP appliances can be
components:
managed from the Proteus IPAM appliance to provide a robust,
appliance-based replacement for UNIX or Windows-based DNS
and DHCP services. Adonis appliances are available in a number Specialized DHCP Options
of hardware configurations designed to meet a variety of
organizational needs. The Adonis XMB™ platform provides robust, Assigning IP addresses to handsets can be done statically, but
highly available DNS and DHCP services at the branch level, while dynamic assignment using DHCP is most often preferred. This
the Adonis 1750R™ offers hardware redundancy for mission critical requirement alone prompted many organizations to re-examine
services. Adonis appliances can be distributed across your network their existing DHCP infrastructures, as DHCP shifted from a
and centrally managed by Proteus. They reflect dynamic changes normal network service to a critical infrastructure element. Voice
in their environments, which are incorporated into the Proteus applications require “dial tone” services and when an organization
database in real-time. has hundreds or thousands of IP phones that can be powered on
at the same time, high availability via both clustering and DHCP
failover greatly reduces downtime. Proteus’ DHCP implementation
Proteus Management Agent for Windows allows for quick configuration of DHCP failover as well as scope
splitting for Windows environments. In addition, Proteus’ user
The Proteus Management Agent for Windows (PMA) is used in
interface supports several options specifically introduced for DHCP
environments where Microsoft DNS and/or DHCP require IPAM
and VoIP.
integration. Specifically designed for the Windows environment,
this .net-based solution provides similar functionality for the
managed services available on the Adonis appliances. This solution TFTP Image Files
eliminates the need to replace existing hardware and services on
Windows servers, while providing a management solution that is Once a handset has an IP address, DHCP provides the boot file image
lacking in the current Windows DNS/DHCP interface. name that will be used to initialize the handset. Using information
provided in the DHCP options, the handset locates the TFTP server
Users can choose to run PMA in the short term, with the intent of and downloads the specified boot image. Management of these
transitioning their services onto appliances, or continue to invest files, including deployment, creation, and revision, is managed
in Microsoft’s DNS/DHCP solution. through the Proteus user interface. Using TFTP Deployment Roles,
Proteus can determine which servers will contain TFTP repositories
As with the Adonis appliance, the Agent updates Proteus with and will replicate the files as needed.
the latest dynamic changes. Users familiar with the Microsoft
DNS/DHCP environment recognize that all changes made By centrally managing these services, and deploying to a
through the Microsoft Management Console (MMC) interface are distributed number of locations, it is simple for an administrator
immediate, which can result in loss of connectivity if bad data is to make changes and roll them out to a number of TFTP servers
introduced. This process is rather unforgiving and in the case of simultaneously. In the event of a rollback scenario, the administrator
DNS, changes can be cached for several hours. Proteus alleviates can simply change the boot image file and redeploy without the
this issue by allowing deployments to be scheduled, thus allowing need to make changes in multiple locations.
administrators to choose if and when changes go live. Once PMA is
implemented, all changes to Microsoft DNS and DHCP services are
DNS Mapping To Support ENUM Protocol
handled by Proteus. MMC is no longer needed.
Part of the VoIP rollout strategy is the DNS mapping to support the
VoIP Implementations ENUM protocol. The E164 numbering system is the format used for
most telephone numbers including country, area, and additional
With the recent introduction of VoIP, many organizations increased delegation codes.
their IP address consumption significantly. A 200% to 300% rise
in the number of managed IP addresses is not uncommon. These This protocol uses DNS to map the E164 number using similar
major increases were largely due to the fact that IP phones require methods to those used in reverse DNS mapping of the IPv4 and
two network addresses. IPv6 space. The information is represented in normal DNS zones,
but since the numbers are stored in reverse dotted notation,
Administrators utilizing tools like spreadsheets or in-house it becomes very difficult for most administrators and users to
12 | BlueCat Networks
visualize.
Visibility
Proteus has native support for modeling the ENUM space with
With dynamic DNS and DHCP data, real-time visibility into DNS
delegation methods to handle country and area codes. The user
and DHCP updates is an important part of IPAM intelligence.
interface also supports unified management of services, like SIP
Spreadsheets provide visibility into static data; however, as more
and email, for a given phone number. E164 numbers are presented
and more services are standardizing on DHCP for IP allocation,
in Proteus in normal reading order and are converted to the reverse
more and more DHCP addresses are being leased to a variety of
format upon service deployment. This removes the difficulty in
different devices and spreadsheets just can’t track these dynamic
configuring ENUM while providing the necessary visibility.
updates.
Since the API uses web services to encode XML information, the
API is not limited to a single language, thus reducing dependence
on a specific platform.
Included with the Proteus appliance, BlueCat offers Java® and Perl
packages for the web service. These packages reduce the time
required to write code and make the API fit tighter with the specific
DHCP Data DNS Data
language. API sessions are tracked by the same audit trail and user
management system, and can occur over secured or unsecured
channels.
IP Reconciliation
Proteus’ IP Reconciliation feature provides visibility into the
network through the Network Discovery service, including the IP,
MAC, host and port for each device on the network.
Monitoring
User Name IP Address
Change Control With Proteus, administrators can proactively monitor their entire IP
Comment space to identify trends or potential threats. It gives them the tools
they need to ensure ultimate network performance.
XHA
DHCP Failover
Data Integrity
Database Backups
BlueCat’s Proteus and Adonis appliances include recovery The Data Checker service continuously checks the IPAM data for
mechanisms that return the systems to factory default inconsistencies and logical issues that might result in a failed
configurations. In the event of a system failure, these recovery deployment of one or more IPAM services. The service also
mechanisms quickly return systems to a known working condition, examines the configuration and compares it against best practices
from which administrators can reload databases from backup or to indicate where settings might not be ideal. Once a concern is
detected, it is automatically triaged to determine what type of
deploy other working configurations.
impact it will have on the system. Issues that result in an erroneous
condition are flagged and prevent deployment until resolved by
High Availability user intervention.
Adonis appliances provide the ability to cluster pairs of systems in Since data issues are often detected while administrators are
an activepassive state. Systems are connected through a heartbeat offline, they trigger events which are then processed by the
monitor that actively checks each system for configuration changes notification system to alert users. Issues found by the Data Checker
and errors. Configuration changes in one system are automatically can be viewed globally and locally on a per object basis.
replicated to the other, to ensure both remain synchronized.
The heartbeat monitor also detects errors or problems in a unit Appliance Level Redundancy
and automatically initiates failover to the other unit. Clustering
with automatic failover ensures customers do not experience a BlueCat offers carrier grade appliances with redundant hard drives
disruption of DNS/DHCP services in the event of a hardware or and power supplies and other hardware components. Should a
software error. single component fail, the appliance will continue to function.
MAC Filtering
MAC Filtering limits the systems that can access specific DHCP
Toronto London NYC pools. This feature ties into BlueCat’s MAC Pool capabilities that
System Admin
restrict DHCP access to a list of configurable MAC addresses. MAC
Filtering can also explicitly deny MAC addresses from a global deny
list.
com represents the 5th (005) router (rtr) in Toronto (tor). Proteus’
Naming Policies feature allows organizations to establish a pre-
defined naming policy and associate it with a view or zone. The
feature also restricts what host names can be used to prevent
network administrators from configuring hosts or zones with
vulgar phrases, trademarked terms or other undesirable words.
Audit Tracking
Proteus’ extensive audit trails provide control and complete
visibility to all administrative changes, facilitate governance and
help comply with government and industry regulations. For more
details, please see Audit Tracking on page 23.
Authentication
Proteus provides its own identity manager and supports several
alternative methods of authentication. The appliance can
authenticate users against an organization’s existing Active
Directory, LDAP, Kerberos or Radius services. Proteus also provides
mechanisms to use secondary authentication services when the
primary means is not available.
Conclusion servers.
BlueCat Networks, a worldwide market leader in IPAM innovation and thought leadership, is
benchmarking IPAM excellence in the networking industry. BlueCat Networks experiences
overwhelming marketplace acceptance of its networking solutions, resulting in high double
digit growth, year over year, since the company’s inception.
BlueCat Networks is headquartered in Toronto, Ontario, Canada with offices in the United
States, Europe and the Asia Pacific region. It sells networking appliances and services
worldwide through direct and indirect sales channels in over 32 countries.
To Learn More
For more information on BlueCat Networks, and our award winning Proteus IPAM solutions,
please visit our website at www.bluecatnetworks.com or call us at 1-866-895-6931.
www.bluecatnetworks.com
North American European Head Office: United Kingdom Germany Asia Pacific Head Office
Corporate/R&D BlueCat Networks BV BlueCat Networks Europe BlueCat Networks 1 Fullerton Road
Headquarters: Johannes Verhulststraat 156A Merlin House (Zentraleuropa) #02-01
502-4101 Yonge Street 1071 NP Amsterdam Brunel Road Altrottstrasse 31 Singapore 049213
Toronto, ON M2P 1N6 The Netherlands Theale Berkshire RG7 4AB D-69190 Walldorf, Germany Phone: +65 6832 5124
Phone: +1.416.646.8400 Telephone: +31 20 754 64 85 Phone: +44.118.902.6680 Telephone: +49.6227.38489.10 Fax: +65 6408 3801
Fax: +1.416.225.4728 Fax: +44.118.902.6401 Fax: +49.6227.38489.18
Toll Free: +1.866.895.6931
US Offices:
Reston, VA Atlanta, GA Chicago, IL Philadelphia, PA Los Angeles,CA
1818 Library Street 1165 Sanctuary Parkway 300 East 5 th Avenue 1500 Market Street 4640 Campus Drive
Suite 500 Suite 260 Suite 440 12th Floor / East Tower Suite 103
Reston, VA Alpharetta, GA 30009 Naperville, IL Philadelphia, PA Newport Beach, CA
20190 Phone: +1.770.777.2461 60563 19102 92660
Phone: +1.703.956.3551 Fax: +1.770.777.2464 Phone: +1.630.946.6297 Phone: +1.215.246.3400 Phone: +1.949.260.8444
©2010. BlueCat Networks, the BlueCat Networks logo, the Proteus logo, IPAM Appliance, the Adonis logo, Adonis are trademarks of BlueCat Networks, Inc. Microsoft,
Windows, and Active Directory are registered trademarks of Microsoft Corporation. Any product photos shown are for reference only and are subject to change without notice.
All other product and company names are trademarks or registered trademarks of their respective holders. Printed in Canada.