Monitoring Techniques for Cisco Network Registrar

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Monitoring Techniques for Cisco Network Registrar"

Transcription

1 White Paper Monitoring Techniques for Cisco Network Registrar White Paper 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 14

2 Introduction... 3 Statistics Collection... 3 Collect DHCP Server Statistics... 3 Collect DNS Server Statistics... 5 Collect TFTP Server Statistics... 9 Collect Host Statistics Interpret the Collected Statistics Interpret DHCP Server Statistics Interpret DNS Server Statistics Interpret TFTP Server Statistics Related Information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 14

3 Introduction This document describes the techniques that you can use to collect and interpret the statistics required to monitor a Cisco Network Registrar (CNR) deployment. You must collect and store the statistics in a usable format to make these decisions of both CNR and the network: Capacity planning Attack detection Misconfiguration The techniques in this document use these features to access the statistics counters that are available in the CNR version 6.1 servers: Server logging CLI commands API features You can apply these techniques to the earlier versions, where the statistics counters, logging functions, CLI, and API commands are supported. The techniques to collect statistics (like CPU use, disk use, and network use) are not in the scope of this paper. The minimum recommendations on the statistics that you must collect are provided in the Collect Host Statistics section. Statistics Collection The statistics collection step is important to monitor a CNR deployment. You can use the statistics to analyze directions and identify the trouble spots. Change the formats of collected statistics, so that all are in a common time-based reference and file format. Merge inputs with the comma separated value (CSV) text files as an intermediate format. You can use and analyze the collected data with integration of report and chart products. Each line in this file has a time stamp that is put into a normal state across the time zones if the deployment is geographically distributed. The collection of statistics (taking measurements) occurs with a recommended time of five minutes between each measurement. Each line in the CSV text file records the data items measured in the period (the last five minutes). For example, if you measure the number of request packets processed by the DHCP server, you can calculate the number of packets received in the given interval for each line, not the number processed from the start, which is the value reported by the server. Collect DHCP Server Statistics The DHCP server collects the basic statistics while it processes incoming requests. You must not do any configuration to enable this feature. The extensions that run in the CNR DHCP server are important performance factors that you must consider when you collect statistics. Any additional statistics that are available depend on the capabilities of the extension. CNR API Use the CNR API to collect the total statistics from the last server-start. To sample the statistics, your program must poll the server and record the changes from the last polling interval. Use the API command, GetServerStats. This API returns these attributes in an SCP object of the type, DHCPServerStats: 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 14

4 Attribute start-time total-discovers total-requests total-releases total-offers total-acks total-naks total-declines Description The date and time the server was last reloaded Total DHCPDISCOVER packets received Total DHCPREQUEST packets received Total DHCPRELEASE packets received Total DHCPOFFER packets sent Total DHCPACK packets sent Total DHCPNACK packets sent Total DHCPDECLINE packets received You can retrieve these counters with the CLI, use the server getstats command: nrcmd> dhcp getstats DHCP Log Files You can use the DHCP activity summary log to collect statistics from the server. You enable the activity summary logs when you set the activity-summary flag for the DHCP log-set attribute: nrcmd> dhcp set log-settings=activity-summary You set the report interval by the activity-summary-interval attribute: nrcmd> dhcp set activity-summary-interval=1m The counters are reported in message # For example: 02/08/ :00:02 name/dhcp/1 Activity Server DHCP activity, 60 seconds: Discovers: 20000, Offers: 20000, Requests: 20000, Acks: 20000, Nacks: 0, Rel.: 0, Decl.: 0, Exp.: 0, In use: Resp: 518, Req: 1, Acks/Second: 333. If you enable failover, the failover-related counters are reported in message # For example: 02/08/ :00:02 name/dhcp/1 Activity Server Failover RECEIVED: 324, bndupd 0, ack 318, nak 0, pool 0, poll 6, updreq 0, upddone 0, SENT: 839, bndupd 833, ack 0, nak 0, pool 0, poll 6, updreq 0, upddone 0, MISSED: 0 Category Label Description Activity Discovers DHCPDISCOVER packets received during reporting interval Offers Requests Acks Nacks Rel Decl Exp Resp Req DHCPOFFER packets sent during reporting interval DHCPREQUEST packets received during reporting interval DHCPACK packets sent during reporting interval DHCPNACK packets sent during reporting interval DHCPRELEASE packets received during reporting interval DHCPDECLINE packets received during reporting interval Number of leases expired during reporting interval Number of DHCP server response buffers in use at the end of this reporting interval Number of DHCP server request buffers in use at the end of this reporting interval Acks/Second Average rate for the reporting interval, if greater than 0 Failover Received Failover packets received during reporting interval 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 14

5 Category Label Description Received Bndupd Bind update packets received during reporting interval Ack Bind ack packets received during reporting interval Nack Bind nack packets received during reporting interval Pool Backup pool messages received during reporting interval Poll Polling (keep-alive) messages received during reporting interval Updreq Update request messages received during reporting interval Upddone Update done messages received during reporting interval Sent Failover packets sent during reporting interval Sent Bndupd Bind update packets sent during reporting interval Ack Bind ack packets sent during reporting interval Nack Bind nack packets sent during reporting interval Pool Backup pool messages sent during reporting interval Poll Polling (keep alive) messages sent during reporting interval Updreq Update request messages sent during reporting interval Upddone Update done messages sent during reporting interval Missed Failover packets dropped during reporting interval Collect DNS Server Statistics The DNS server collects the basic statistics during normal server processing, modeled after RFC Do not configure any item to enable this feature. The server collects the enhanced statistics separately for the interval from the last server-start and the enabled sample counters for the current sample-interval. The counters fit in these five categories: Performance Query Errors Security Maxcounters You can enable the sample counters for these groups by setting the collect-sample-counters attribute and configure the sample interval: nrcmd> dns enable collect-sample-counters nrcmd> dns set activity-counter-interval=1m The default sample interval is five minutes. No configuration is required to collect the total counters (measured from the last server-start or administrative reset). The DNS server counters include: Category id config-recurs config-up-time config-reset-time Label String identifier for this DNS server The recursion services offered by this server: available(1) - performs recursion on requests from clients; restricted(2) - recursion is performed on requests only from certain clients; unavailable(3) - recursion is not available. The elapsed time since the DNS server process was started. The elapsed time since the DNS server was last reset (restarted) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 14

6 Category Label config-reset The server state: other(1) - server in some unknown state; initializing(3) - server (re)initializing; running(4) - server currently running. counter-auth-ans counter-auth-no-names counter-auth-no-data-resps counter-non-auth-datas counter-non-auth-no-datas counter-referrals The number of queries which were authoritatively answered. The number of queries for which authoritative no such name responses were made. The number of queries for which authoritative no such data (empty answer) responses were made. The number of queries which were non-authoritatively answered (cached data). The number of queries which were non-authoritatively answered with no data (empty answer). The number of requests that were referred to other servers. counter-errors The number of requests the server has processed that were answered with errors (RCODE values other than 0 and 3). Reference RFC-1035 section ] counter-rel-names counter-req-refusals counter-req-unparses counter-other-errors counter-reset-time sample-time sample-interval The number of requests received by the server for names that are only 1 label long (text form - no internal dots). The number of DNS requests refused by the server. The number of requests received that could not be parsed. The number of requests which were aborted for other (local) server errors. The time stamp of the last administrative reset of DNS counters. The time stamp of the last sample. This attribute applies only when sample counters are enabled. The counter sampling interval. This attribute applies only when sample counters are enabled. These are the enhanced counters by category: Category Label Description Performance updated-rrs Total number of RR s added or deleted, including administrative updates from SCP. Note that a single update may have multiple deletes and/or adds. update-packets ixfrs-out ixfrs-in ixfrs-full-resp axfrs-out axfrs-in queries xfrs-out-at-limit xfrs-in-at-limit notifies-out notifies-in Total number of update packets successfully processed. Number of successful outbound incremental zone transfers. Number of successful inbound incremental zone transfers, including full zone responses. Number of successful outbound full zone transfers that are originated from IXFR requests, but required a full zone response because of IXFR errors, requested serial history was not available, or there were too many changes in the zone. Number of successful outbound full zone transfers, including full zone responses to IXFR requests. Number of successful inbound full zone transfers. Number of query responses, including name queries, IXFR/AXFR query responses, and query forward responses, but excluding update replies. Number of times the number of outbound zone transfers reached the concurrent limit (set by the DNS server visibility 3 attribute, xfer-serverconcurrent-limit, which has a default value of five). Number of time the number of inbound zone transfers reached the concurrent limit (set by the DNS server visibility 3 attribute, xfer-server-concurrent-limit, which has a default value of five). Number of outbound Notify packets. Number of inbound Notify packets Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 14

7 Category Label Description Query auth-answers Number of queries that were authoritatively answered (reference RFC-1611). auth-no-names auth-no-data-responses nonauth-answers nonauth-no-data-responses referrals relative-name-requests lame-delegations mem-cache-hits mem-cache-misses mem-cache-writes Number of queries for which authoritative-no-such-name responses were made (reference RFC-1611). Number of queries for which authoritative-no-such-data (empty answer) responses were made (reference RFC-1611). Number of queries that were non-authoritatively answered from cached data (reference RFC-1611). Number of queries that were non-authoritatively answered with no data, i.e. an empty answer (reference RFC-1611). Number of requests that were referred to other servers (reference RFC-1611). Number of requests received by the server for names that were only one text label long (reference RFC-1611). Number of lame delegations. Number of internal memory cache lookup hits. Number of internal memory cache lookup misses. Number of cache record writes to the persistent cache DB. Security rcvd-tsig-packets Number of received packets containing a TSIG record. detected-tsig-bad-time detected-tsig-bad-key detected-tsig-bad-sig rcvd-tsig-bad-time rcvd-tsig-bad-key rcvd-tsig-bad-sig unauth-xfer-reqs unauth-update-reqs restrict-query-acl Bad TSIG time detected from incoming packet contents. Bad TSIG key detected from incoming packet contents. Bad TSIG signature detected from incoming packet contents. Bad TSIG time reported in the TSIG error field in the incoming packet. Bad TSIG key reported in the TSIG error field in the incoming packet. Bad TSIG signature reported in the TSIG error field in the incoming packet. The number of restrict-xfer-acl ACL authorization failures for zones with restrict-xfer enabled. The number DNS update failures due to update-acl ACL authorization failures or because zones have been configured with the dynamic attribute disabled. The number of query failures due to restrict-query-acl ACL authorization failures. Errors update-errors Number of errors detected in update packets, excluding TSIG errors. ixfr-in-errors ixfr-out-errors axfr-in-errors axfr-out-errors sent-total-errors rcvd-format-errors sent-format-errors sent-other-errors Number of inbound IXFR errors, excluding packet format errors. Number of outbound IXFR errors, excluding packet format errors. Number of inbound AXFR errors, excluding packet format errors. Number of outbound AXFR errors, excluding packet format errors. Number of requests the server has processed that were answered with errors (RCODE values other than 0, 3, 6,7, and 8). reference RFC-1611 Number of incoming packets received with the error field set, i.e. with RCODE set to FORMERR. Number of requests received that could not be parsed and resulted in a FORMERR response. reference RFC Number of requests that were aborted for other (local) server errors. reference RFC-1611 Maxcounters concurrent-xfrs-in The maximum number of concurrent threads used for inbound zone transfers during this reporting interval. concurrent-xfrs-out The maximum number of concurrent threads used for outbound zone transfers during this reporting interval Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 14

8 CNR API You can collect total statistics from the last server-start or sample counters that use the CNR API. Use the API call getcnrdnsserverstats. This API returns these statistics: Attribute Description Value Data Type dns-server-stats total-counters sample-counters The current DNS server statistics The category counters measured since the last server start or administrative reset The sample counters measured during the last sampling interval SCP Object of type DNSServerStats. SCP List of counter objects of type DNSServerPerformanceStats, DNSServerQueryStats, DNSServerSecurityStats, DNSServerErrorsStats, and DNSServerMaxCounterStats. SCP List of counter objects of type DNSServerPerformanceStats, DNSServerQueryStats, DNSServerSecurityStats, DNSServerErrorsStats, and DNSServerMaxCounterStats. You can use the server getstats command to retrieve these counters with the CLI: nrcmd> dns getstats nrcmd> dns getstats all total nrcmd> dns getstats all sample DNS Log Files You can use the DNS activity summary log to collect periodic statistics from the server. Set these items to enable the activity summary log: The activity-summary flag for the DNS log-settings attribute The report interval The categories to be logged For example: nrcmd> dns set log-settings=activity-summary nrcmd> dns set activity-summary-interval=1m nrcmd> dns set activity-counter-log-settings=total, sample, performance, query The default report interval is five minutes. Note: You must enable sample counters to report counters for the sample interval. The counters are reported for both totals and the latest sample interval in messages 03523, 03573, 03574, 03575, 03576, 03577, 03578, 03579, and For example: 02/20/ :48:41 name/dns/1 Info Server [Stats-Perform] Total since Fri Feb 20 15:42: update-rrs:0, update-packets:0, ixfrs-out:0, ixfrsin:0, ixfrs-full-resp:5, axfrs-out:10, axfrs-in:0, queries:10, xfrs-out-atlimit:0, xfrs-in-at-l notifies-out:10, notifies-in:0. 02/20/ :48:41 name/dns/1 Info Server [Stats-Perform] sampled at Fri Feb 20 15:43: with interval of 300 sec - update-rrs:0, updatepackets:0, ixfrs-out:0, ixfrs-in:0, ixfrs-full-resp:5, axfrs-out:10, axfrs-in:0, queries:10, xfrs-out xfrs-in-at-limit:0, notifies-out:10, notifies-in: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 14

9 02/20/ :28:42 name/dns/1 Info Server [Stats-Query] Total since Fri Feb 20 13:54: : auth-answers:1, auth-no-names:0, auth-no-dataresponses:0, nonauth-answers:3, nonauth-no-data-responses:0, referrals:1, relative-name-requests:0, refusals:0, lame-delegations:0, mem-cache-hits:316, mem-cache-misses:124, mem-cache-writes 02/20/ :29:42 name/dns/1 Info Server [Stats-Query] sampled at Fri Feb 20 14:28: with interval of 60 sec: auth-answers:1, auth-nonames:0, auth-no-data-responses:0, nonauth-answers:3, nonauth-no-dataresponses:3, referrals:0, relative-name-requests:1, refusals:0, lamedelegations:0, mem-cache-hits:0, mem-cache-misses:18, mem-cache-writes:4. Collect TFTP Server Statistics CNR API You can use the CNR API to collect statistics from the last server-start. To sample statistics, your program must poll the server and record the changes from the last polling interval. Use the GetServerStats API call. This API returns these attributes in an SCP Object of type TFTPServerStats: Attribute id server-start-time server-reset-time Description String identifier for this TFTP server. The start time of the server. The time the server was last restarted or reloaded. server-state The server state: other(1) - server in some unknown state; initializing(3) - server (re)initializing; running(4) - server currently running. server-time-since-start server-time-since-reset total-packets-in-pool total-packets-in-use total-packets-received total-packets-sent total-packets-drained total-packets-dropped total-packets-malformed total-read-requests total-read-requests-completed total-read-requests-refused total-read-requests-ignored total-read-requests-timed-out total-write-requests total-write-requests-completed total-write-requests-refused total-write-requests-ignored total-write-requests-timed-out total-docsis-requests total-docsis-requests-completed The elapsed time since the TFTP server process was started. The elapsed time since the TFTP server was last reset (restarted or reloaded). Maximum number of packet buffers that can be used by the server. Total number of packet buffers currently in use by the server. Total number of packets received by the server since the last server reset. Total number of packets server has sent since the last server reset. Total number of packets drained (read and discarded) since the last server reset. A packet is drained when the TFTP server is overwhelmed and is using all its packets already, so there are no more available to process the incoming packet. Total number of packets the server has dropped since the last server reset. This includes packets that are unknown to the server, malformed, duplicated, drained, etc. (any packet that is dropped for any reason). Total number of packets the server has received that were malformed since the last server reset. Total number of packets the server has received that were read requests since the last server reset. Total number of read requests that were completed since the last server reset. Total number of read requests that the server refused since the last server reset. Total number of read requests that the server ignored since the last server reset. Total number of read requests that timed out since the last server reset. The number of packets the server has received that were write requests since the last server reset. Total number of write requests that were completed since the last server reset. Total number of write requests that the server refused since the last server reset. Total number of write requests that the server ignored since the last server reset. Total number of write requests that timed out since the last server reset. The number of packets the server has received that were CSRC 1.0 dynamic DOCSIS requests since the last server reset. Total number of CSRC 1.0 dynamic DOCSIS requests that were completed since the last server reset Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 14

10 Attribute total-docsis-requests-refused total-docsis-requests-ignored total-docsis-requests-timed-out read-requests-per-second write-requests-per-second docsis-requests-per-second Description Total number of CSRC 1.0 dynamic DOCSIS requests that the server refused since the last server reset. Total number of CSRC 1.0 dynamic DOCSIS requests that the server ignored since the last server reset. Total number of CSRC 1.0 dynamic DOCSIS requests that timed out since the last server reset. Number of read requests per second processed during this reporting interval. Number of write requests per second processed during this reporting interval. Number of CSRC 1.0 dynamic DOCSIS requests per second processed during this reporting interval. You can use the server getstats command to retrieve these counters with the CLI: nrcmd> tftp getstats Collect Host Statistics To collect host statistics you must plan the host capacity and tune the system performance. The mechanism used to collect information on the machine is not in the scope of this document, because it is system dependent. You must collect at least these statistics: CPU usage User System Wait Network usage Send Receive Disk usage Read Write Uptime at the same rate and in the same vein as the server information Collect the use as percentages. Interpret the Collected Statistics You must interpret the collected statistics as an art more than a science. You must develop heuristics and adjust over time, because they are based on your deployment and deployment history. Calculate the steady state for all the statistics that you collect. These sections describe what to look for in theses categories: Capacity planning Attack detection Misconfiguration Each server has statistics that highlight what the server does. These are its performance indicators. The uptime of the servers and the machines are used to warn of errors. Restarts can occur for maintenance. However, if they occur frequently, you can have a problem that requires investigation Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 14

11 You can merge the collected host statistics with the collected server statistics to help plan capacity. With one CSV file that contains machine and server statistics, you can create charts that map server performance with CPU, network, and disk usage. Attack detection covers both malicious attempts to break your network and friendly processes that cause more load than expected. You must know the steady state rates for each server to calculate if an attack occurs. Misconfiguration can occur both in the servers and network configuration. You must know the deployment architecture to monitor the configuration. Interpret DHCP Server Statistics The number of DHCP messages processed is the main performance indicator for the DHCP server. Request and response buffers provide an indication of the traffic load on the server. Failover counters provide an indication of the state of failover synchronization. Capacity Planning You can chart the CPU, network, and disk usage versus the performance indicators of the DHCP server, by using the merged CSV text file. From this you can determine what combination of machine resources impact the performance of your server, aid the capacity plan, and tune the performance of the machine. The number of request buffers used indicates how many simultaneous requests the server handles. When the network operates at a steady state, this value remains relatively constant. When a large reboot occurs, the value jumps to the configured maximum. Further incoming packets are dropped, and new requests are only taken in by the server as pending requests. This algorithm leverages the fact that DHCP clients timeout and retry if they do not receive a response. Dropping the extra requests allows the server to dedicate its process to handle only as many packets as it can respond to within the client time out and minimizes the total time required to bring all clients on line. Once the reboot event is completed, the buffers in use return to steady state values. Note: Since the same pool of request buffers is used for both lease activity and failover activity, request buffers in use never reach 0 when failover is enabled, even in the absence of client activity. The default value for max-dhcp-requests is 500, but you can tune this to the capacity of the server. The server capacity is defmed in terms of the lease rate and the average latency of the lease transaction. For example, if the maximum capacity of the server is 1000 leases/sec, and on average, leases are returned to the client in 500 ms, then a value of 500 is sufficient for the server to respond to clients at this rate. A lower value throttles the performance of the server below this capacity. A higher value increases the latency during burst events, but allows a greater number of clients to be serviced without retries. Given the typical client timeout of four seconds, an average latency of two seconds can be tolerated without added client timeouts on the traffic load. You can measure the maximum leases per second where CPU use reaches 100% or the latency exceeds the maximum threshold. The number of response buffers in use indicates how many simultaneous requests are completed by the server. When the network operates at a steady state, this value remains constant, and tracks with the number of request buffers in use. If the server reaches its configured maximum, it can no longer respond to events. This should not occur and is an indicator of a serious network problem. Since the same pool of response buffers is used for both lease activity and failover activity, the server adjusts this value to be at least four times the request buffers, to ensure sufficient resources are available to process all pending client and failover activity simultaneously Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 14

12 The performance of the DHCP server is impacted by the performance of external systems, if LDAP client lookups are used, or the server is integrated into a Broadband Access Center (BAC) provisioning system. If the external systems are operated at capacity, then the DHCP server seems slower. If the CPU utilization on the DHCP server does not reach 100% before the latency threshold is reached, this can be an indicator of a provisioning system performance problem. In this case, you can fix the problem in the provisioning system, and not at the DHCP server. Attack Detection Comparing the rates of incoming DHCP messages with the steady state rates of incoming requests is a method of detecting a possible attack. A large number of dropped packets, declines, or nacks could also be indicators. However, these can also be indicators of a misconfiguration. A large increase in requests can indicate that a CMTS was rebooted or that some portion of the network restarted after a power outage. Misconfiguration The presence of decline messages indicates a network configuration error or a misbehaving client. Addresses are marked unavailable when a decline is received, but then reclaimed once the unavailable timeout period expires. However, addresses continue to cycle through an unavailable state until the network problem is resolved. The DHCP server logs contain additional entries for specific error conditions that are encountered, and can be used to help isolate the problem. Some number of nacks are normal when failover partners resynchronize after an outage. An excessive number of nacks can indicate a configuration mismatch between the servers that prevents them from agreeing on the state of a lease. In this case, the servers may fail to complete resynchronization. You can use the failover configuration feature in the CNR web UI to verify and correct failover configuration issues. If the number of dropped DHCP messages increases over the steady state for this statistic, a configuration error can exist in the provisioning system that prevents the server from assigning the client a valid address that matches its client class assignment. The DHCP server logs contain additional entries for the specific encountered conditions. Interpret DNS Server Statistics The main performance indicators for the DNS server are the number of query, zone transfer, and update messages processed. Capacity Plan You can chart the CPU, network, and disk usage versus the performance indicators of the DNS server by using the merged CSV text file. From this information you can determine what combination of machine resources impact the performance of your server, aid with the capacity plan and tune the performance of the machine. A high number of memory cache misses can indicate that you should increase the size allocated to the cache to support a higher volume of queries. However, if the majority of query responses are non-authoritative, cache misses can indicate the TTLs for these records are too short to be usefully cached. In this case, a larger cache has little impact. The performance counters, xfrs-out-at-limit and xfrs-in-at-limit indicate the number of times the server was throttled back by its configuration limit in processing zone transfers. If the main function of the server is to support zone transfers (for example, it is a secondary server configured to service zone requests from a group of secondtier secondary servers that serve client query requests), you can increase this limit to reduce the latency of zone updates. You should take care when changing this value for general-purpose servers, since an increase in zone 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 14

13 transfer responsiveness decreases the responsiveness of update and query processing. The query, zone transfer, and update performance counters can be used to assess the primary role of each server in the network. Attack Detection A method of used to detect a possible attack, is to compare the rates of incoming query messages with the steady state rates of incoming requests. A large number of no-such-data responses or ACL authorization failures can be indicators. However, these can also be indicators of a misconfiguration. A large increase in queries can also indicate that some portion of the network restarted after a power outage. Misconfiguration The presence of lame delegation errors indicates a misconfiguration in the network that needs to be corrected on the originating name server. An excessive number of error packets received can indicate configuration problems in other DNS servers in the network. The DNS server logs contain additional entries for specific error conditions that you encounter, and you can use these to help isolate the problem. An excessive number of no-such-data responses can indicate a configuration mismatch between the domain information provided to the client in a DHCP response, and the zones configured on the DNS server. These configuration errors should be corrected at the DHCP server, or the originating provisioning system, as appropriate for the deployment. A large number of ACL authorization failures can indicate a configuration mismatch between servers or a situation where clients issue requests from a new network that was not added to the authorized list. The DNS server logs contain additional entries for specific error conditions that are encountered, and can be used to help isolate the problem. Interpret TFTP Server Statistics The main performance indicators for the TFTP server are the number of read and write request messages processed. Packet buffers in use provide an indication of the traffic load on the server. Capacity Plan You can use the merged CSV text file to chart the CPU, network, and disk usage versus the performance indicators of the TFTP server. From this information you can determine what combination of machine resources impact the performance of your server, aid to plan the capacity and tune the performance of the machine. The number of packet buffers used indicates how many simultaneous requests are handled by the server. When the network is operating at a steady state, this value should remain relatively constant. When a large reboot event occurs, this value can jump to the configured maximum. The server default is 512. Further incoming packets are dropped, and new requests are only taken in by the server as pending requests. This algorithm leverages the fact that clients timeout and retry if they do not receive a response. Dropping the extra requests allows the server to dedicate its process to handle only the packets it can respond to within the client time out and minimizes the total time required to bring all clients on line. Once the reboot event is completed, the buffers in use return to steady state values. This value does not need to be tuned. Since the TFTP protocol starts a new connection for each client request, configuring the server to accept a greater number of simultaneous connections can quickly exhaust server resources, and result in degraded performance overall. The maximum value that can be configured is Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 14

14 Attack Detection A method used to detect a possible attack is to compare the rates of incoming read and write requests with the steady state rates. A large number of refused and/or ignored requests can also be indicators. However, these can also be indicators of a misconfiguration. A large increase in requests can indicate that a CMTS was rebooted or some portion of the network was restarted following a power outage. Misconfiguration An excessive number of ignored read requests can indicate a configuration mismatch between the file information provided to the client in a DHCP or BOOTP response, and the files available on the TFTP server. Configuration errors should be corrected at the DHCP server, or the originating provisioning system, as appropriate for the deployment. The TFTP server logs contain additional entries for specific error conditions that are encountered, and can be used to help isolate the problem. Related Information Technical Support - Cisco Systems Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 14

Network Registrar Data Backup and Recovery Strategies

Network Registrar Data Backup and Recovery Strategies White Paper Network Registrar Data Backup and Recovery Strategies White Paper 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 Introduction...

More information

Server Status Dashboard

Server Status Dashboard CHAPTER 3 Server Status Dashboard The Cisco Network Registrar server status dashboard in the web user interface (web UI) presents a graphical view of the system status, using graphs, charts, and tables,

More information

Managing DNS Server Properties

Managing DNS Server Properties CHAPTER 17 Managing DNS Server Properties This chapter explains how to set the DNS server parameters. Before you proceed with the tasks in this chapter, read Chapter 15, Managing Zones, which explains

More information

Application Protocols for TCP/IP Administration

Application Protocols for TCP/IP Administration Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities

More information

DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1

DHCP Failover. Necessary for a secure and stable network. DHCP Failover White Paper Page 1 DHCP Failover Necessary for a secure and stable network DHCP Failover White Paper Page 1 Table of Contents 1. Introduction... 3 2. Basic DHCP Redundancy... 3 3. VitalQIP Failover Solution... 5 4. VitalQIP

More information

HOST AUTO CONFIGURATION (BOOTP, DHCP)

HOST AUTO CONFIGURATION (BOOTP, DHCP) Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration

More information

DNS + DHCP. Michael Tsai 2015/04/27

DNS + DHCP. Michael Tsai 2015/04/27 DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration

More information

A DHCP Primer. Dario Laverde, dario@mediatracker.com. 2002 Dario Laverde

A DHCP Primer. Dario Laverde, dario@mediatracker.com. 2002 Dario Laverde A DHCP Primer Dario Laverde, dario@mediatracker.com 2002 Dario Laverde Dynamic Host Configuration Protocol DHCP Client DHCP DHCP Server Dynamic Host Configuration consists of at least an IP address in

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information

More information

Cisco IOS DHCP Server

Cisco IOS DHCP Server Feature Summary Cisco IOS DHCP Server With the introduction of Cisco IOS Easy IP Phase 2, Cisco IOS software supports Cisco IOS Dynamic Host Control Protocol (DHCP) Server functionality. DHCP is a protocol

More information

History. Dynamic Host Configuration Protocol (DHCP) DHCP. Server on UDP port 67, client on UDP port 68 (not ephemeral) RFC 2131

History. Dynamic Host Configuration Protocol (DHCP) DHCP. Server on UDP port 67, client on UDP port 68 (not ephemeral) RFC 2131 History Dynamic Host Configuration Protocol (DHCP) Diskless workstations needed to know configuration parameters like IP address, netmask, gateway address etc. on boot Small boot programs on ROM needed

More information

CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE

CHAPTER ANSWERS IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE CHAPTER S IMPLEMENTING, MANAGING, AND MAINTAINING A MICROSOFT WINDOWS SERVER 2003 NETWORK INFRASTRUCTURE 2 TEXTBOOK CHAPTER 1 S: IMPLEMENTING DHCP CHAPTER 1 IMPLEMENTING DHCP CHAPTER REVIEW QUESTIONS 1.

More information

dnsperf DNS Performance Tool Manual

dnsperf DNS Performance Tool Manual dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the

More information

Gaia Syslog Messages. Technical Reference Guide. 25 February 2014. Classification: [Protected]

Gaia Syslog Messages. Technical Reference Guide. 25 February 2014. Classification: [Protected] Gaia s Technical Reference Guide 25 February 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Configuring DHCP and DNS Services

Configuring DHCP and DNS Services 12 CHAPTER A DHCP server provides network configuration parameters, such as IP addresses, to DHCP clients. The FWSM can provide DHCP server or DHCP relay services to DHCP clients attached to FWSM interfaces.

More information

State of the Cloud DNS Report

State of the Cloud DNS Report transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare

More information

Monitoring Microsoft Exchange to Improve Performance and Availability

Monitoring Microsoft Exchange to Improve Performance and Availability Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations

More information

VitalQIP DNS/DHCP & IP Management Software SNMP MODULE VERSION 2.3 USER S GUIDE

VitalQIP DNS/DHCP & IP Management Software SNMP MODULE VERSION 2.3 USER S GUIDE VitalQIP DNS/DHCP & IP Management Software SNMP MODULE VERSION 2.3 USER S GUIDE This document contains proprietary information of Alcatel- Lucent and is not to be disclosed or used except in accordance

More information

Configuring DHCP. DHCP Server Overview

Configuring DHCP. DHCP Server Overview Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter

More information

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614 Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server

More information

Chapter 3 Updating Software Images and Configuration Files

Chapter 3 Updating Software Images and Configuration Files Chapter 3 Updating Software Images and Configuration Files This chapter provides an overview of CLI commands that the user would employ to copy and save both configuration files and software image files

More information

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure

Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule

More information

Network Working Group. Category: Standards Track October 2006

Network Working Group. Category: Standards Track October 2006 Network Working Group B. Volz Request for Comments: 4704 Cisco Systems, Inc. Category: Standards Track October 2006 The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Client Fully Qualified Domain

More information

Configuration Notes 0215

Configuration Notes 0215 Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...

More information

State of the Cloud DNS Report

State of the Cloud DNS Report transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare

More information

DHCP and DNS Services

DHCP and DNS Services CHAPTER 9 A DHCP server provides network configuration parameters, such as IP addresses, to DHCP clients. The security appliance can provide DHCP server or DHCP relay services to DHCP clients attached

More information

DNS and LDAP persistent search

DNS and LDAP persistent search FreeIPA Training Series DNS and LDAP persistent search FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-14-2013 FreeIPA DNS integration FreeIPA is able to store

More information

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary

More information

Configuring DHCP. DHCP Server Overview

Configuring DHCP. DHCP Server Overview Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter

More information

DNS zone transfers from FreeIPA to non-freeipa slave servers

DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

More Internet Support Protocols

More Internet Support Protocols Domain Name System (DNS) Ch 2.5 More Internet Support Protocols Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Configuring DHCP. DHCP Server Overview

Configuring DHCP. DHCP Server Overview Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter

More information

White Paper. Optimizing the Performance Of MySQL Cluster

White Paper. Optimizing the Performance Of MySQL Cluster White Paper Optimizing the Performance Of MySQL Cluster Table of Contents Introduction and Background Information... 2 Optimal Applications for MySQL Cluster... 3 Identifying the Performance Issues.....

More information

EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02

EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

ms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm

ms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm Page 1 of 12 Knowledge Base FRS Event Log Error Codes PSS ID Number: 308406 Article Last Modified on 10/13/2004 The information in this article applies to: Microsoft Windows 2000 Server Microsoft Windows

More information

DNS and BIND Primer. Pete Nesbitt pete @ linux1.ca. April 2012

DNS and BIND Primer. Pete Nesbitt pete @ linux1.ca. April 2012 DNS and BIND Primer Pete Nesbitt pete @ linux1.ca April 2012 1 When we access the Internet we typically do so by accessing systems using a somewhat meaningful hostname often in the form of a web based

More information

Investigation of DHCP Packets using Wireshark

Investigation of DHCP Packets using Wireshark Investigation of DHCP Packets using Wireshark Mohsin khan Faculty of Telecommunication Engineering and Environment Birmingham City University England Saleh Alshomrani Faculty of Computing and IT King Abdulaziz

More information

Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer

Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Version 2.0.0 Notes for Fixpack 1.2.0-TIV-W3_Analyzer-IF0003 Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER 6 This chapter describes how to configure the health monitoring on the CSM and contains these sections: Configuring Probes for Health Monitoring, page 6-1 Configuring Route Health Injection, page

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Boot(ing) protocols. From (R)ARP to BSDP. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. September 12, 2008

Boot(ing) protocols. From (R)ARP to BSDP. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. September 12, 2008 Boot(ing) protocols From (R)ARP to BSDP dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 12, 2008 dr. C. P. J. Koymans (UvA) Boot(ing) protocols September 12, 2008 1 / 25 ARP

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging

SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without

More information

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,

More information

Monitoring Your Network

Monitoring Your Network CHAPTER 17 Date: 3/22/13 When naming ACE objects (such as a real server, virtual server, parameter map, class map, health probe, and so on), enter an alphanumeric string of 1 to 64 characters, which can

More information

Securing an Internet Name Server

Securing an Internet Name Server Securing an Internet Name Server Cricket Liu cricket@verisign.com Securing an Internet Name Server Name servers exposed to the Internet are subject to a wide variety of attacks: Attacks against the name

More information

Computer Networks CCNA Module 1

Computer Networks CCNA Module 1 Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The

More information

Networking Dynamic Host Configuration Protocol

Networking Dynamic Host Configuration Protocol System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 System i Networking Dynamic Host Configuration Protocol Version 5 Release 4 Note Before using this information and the product

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

DHCP and DNS Protocols

DHCP and DNS Protocols DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters

More information

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP

More information

Recommended IP Addressing Methods for EtherNet/IP Devices

Recommended IP Addressing Methods for EtherNet/IP Devices Recommended IP Addressing Methods for EtherNet/IP Devices Version: 1.0 10-June-2003 Published by EtherNet/IP Implementors Workshop Open DeviceNet Vendor Association (ODVA) ControlNet International (CI)

More information

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER 3 CHAPTER This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: Information About NTP, page 3-1 Licensing Requirements

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

Chapter 32 Initialization (BOOTP and DHCP)

Chapter 32 Initialization (BOOTP and DHCP) Chapter 32 Initialization (BOOTP and DHCP) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 32-1 Overview Bootstrapping (Diskless workstations) BOOTP Dynamic address allocation

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

Running a Workflow on a PowerCenter Grid

Running a Workflow on a PowerCenter Grid Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

orrelog SQL Table Monitor Adapter Users Manual

orrelog SQL Table Monitor Adapter Users Manual orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

Teldat Router. DNS Client

Teldat Router. DNS Client Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality

More information

Ethernet. Customer Provided Equipment Configuring the Ethernet port.

Ethernet. Customer Provided Equipment Configuring the Ethernet port. Installing the RDSP-3000A-NIST Master Clock. Ethernet Connect the RJ-45 connector to a TCP/IP network. Equipment The following equipment comes with the clock system: RDSP-3000A-NIST Master Clock Module.

More information

DNS SRV Usage June 22, 2011

DNS SRV Usage June 22, 2011 DNS SRV Usage June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope of this Document... 3 DNS SRV (RFC 2782)... 3 Deployment Scenario... 4 Mediatrix Unit Configuration... 5 Scenario

More information

Cisco CNR and DHCP FAQs for Cable Environment

Cisco CNR and DHCP FAQs for Cable Environment Table of Contents CNR and DHCP FAQs for Cable Environment...1 Questions...1 Introduction...1 Q. How do I access CNR remotely?...1 Q. How do I access CNR remotely if the CNR server is behind a firewall?...2

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

DHCP Failover: Requirements of a High-Performance System

DHCP Failover: Requirements of a High-Performance System DHCP Failover: Requirements of a High-Performance System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 DHCP Failover: Requirements of a High-Performance

More information

IPv6 Diagnostic and Troubleshooting

IPv6 Diagnostic and Troubleshooting 8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................

More information

Configuring SIP Trunk Failover in AOS

Configuring SIP Trunk Failover in AOS 6AOSCG0023-29A October 2011 Configuration Guide Configuring SIP Trunk Failover in AOS This configuration guide describes the configuration and implementation of Session Initiation Protocol (SIP) trunk

More information

DHCP Overview. Information About DHCP. DHCP Overview. Last Updated: April 30, 2012

DHCP Overview. Information About DHCP. DHCP Overview. Last Updated: April 30, 2012 DHCP Overview Last Updated: April 30, 2012 The Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which provides the framework for passing configuration information

More information

Lab 5-5 Configuring the Cisco IOS DHCP Server

Lab 5-5 Configuring the Cisco IOS DHCP Server Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader

More information

Snapt Balancer Manual

Snapt Balancer Manual Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt

More information

CYAN SECURE WEB APPLIANCE. User interface manual

CYAN SECURE WEB APPLIANCE. User interface manual CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network

More information

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved DNS ActiveX Control for Microsoft Windows Copyright Magneto Software All rights reserved 1 DNS Overview... 3 1.1 Introduction... 3 1.2 Usage... 3 1.3 Property... 4 1.4 Event... 4 1.5 Method... 4 1.6 Error

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

RADIUS Authentication and Accounting

RADIUS Authentication and Accounting 5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules

More information

Internet Protocols. Supporting Protocols and Framing. Updated: 9/30/14

Internet Protocols. Supporting Protocols and Framing. Updated: 9/30/14 Internet Protocols Supporting Protocols and Framing Updated: 9/30/14 Supporting Protocols ARP / RARP BOOTP ICMP DHCP NAT IP Supporting Protocols IP protocol only deals with the data transfer (best-effort)

More information

- The PIX OS Command-Line Interface -

- The PIX OS Command-Line Interface - 1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by

More information

Configuration Guide. DHCP Server. LAN client

Configuration Guide. DHCP Server. LAN client DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information