Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN

Size: px
Start display at page:

Download "Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN"

Transcription

1 Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN Service Specification Version 10

2 Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN Document History Product/Version Number: Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN 10 Date of Release: 29/11/07 Contract Number: Instrument type: Integrated Infrastructure Initiative (I3) Activity: SA3 Work Item: WI-15 Dissemination Level RE (Restricted) Lead Partner Document Code GN v10 Authors: Loukik Kudarimoti

3 Table of Contents 1 Summary 2 2 Service Overview 3 3 LHCOPN Monitoring Requirements 7 4 Managed Service specification Appliance specification Deployment Location Site Responsibilities Security perfsonar MDM Service in beta 25 5 Support 26 6 Extending the MDM Service Measurement footprint Additional Network Metrics and Software 27 7 Conclusions 28 8 References 29 Appendix A Hardware Specification 30 A.1 Hardware configuration 30 Appendix B Software Description 34 B.1 Measurement Tools 34 B.2 perfsonar Software 37 Appendix C Hardware - Software - Metrics mapping 42 Proposal for a perfsonar Multi Domain Monitoring Service for LHCOPN 10 i

4 1 Summary The LHC project is designing and implementing an Optical Private Network (OPN) dedicated to support the LHC experiments. As with the operation of any network, monitoring plays a critical role. This document draws up a specification for a monitoring service that can fulfil the monitoring requirements of LHCOPN. The monitoring service, named as the perfsonar Multi Domain Monitoring Service, is delivered by using products designed and developed by an international consortium of backbone network operators. This consortium, called perfsonar, has developed products that are highly advanced in their capabilities to measure and display network metrics. Users from various organisations across the world can gain seamless access to measurement data being gathered by any network with the help of these products. The primary users of the perfsonar Multi Domain monitoring service are the Tier-0 and Tier- 1 sites. The primary users of the monitoring data and measurement capabilities made accessible by the supported perfsonar products are the Network Operations Centre responsible for the IP operations of the LHCOPN, the End-to-End Co-ordination Unit (E2ECU) and the Tier-0 and Tier-1 personnel. Other users can also make use of the monitoring data and the measurement capabilities. The perfsonar Multi Domain Monitoring service has been successfully rolled out to six backbone networks across Europe, delivered with the help of a dedicated Service Desk setup at DANTE. This service provides a complete solution that includes support for the monitoring software, the operating system and the required hardware that are needed to provide reliable and precise monitoring of the network. It can be readily deployed at the Tier-0 and Tier-1 sites across the world. This document specifies the service by defining its scope and describing the products that will be provided as part of the service. It lists the requirements expected from a site where it will be deployed and very importantly, it discusses the ideal locations for these products to be deployed within the various sites. Deployment of hardware and operating system at the Tier-0 and Tier-1 sites raises some security concerns that are discussed in this document along with some information on the measures taken by the service to address such concerns. To summarize, the objectives of the LHCOPN, its monitoring requirements and the geographically distributed users provide a challenging multi domain environment in which the network has to be operated and monitored. The combination of perfsonar products and the perfsonar Multi Domain Monitoring service along with many years of backbone monitoring experience demonstrate how these requirements and challenges can be met. Page 2

5 2 Service Overview The perfsonar Multi Domain Monitoring (MDM) service provides users with access to network measurement data from multiple network domains. Users can collect monitoring data from all domains where the service is deployed in order to visualise network characteristics and troubleshoot related issues. For the specific monitoring of the LHC Optical Private Network (LHCOPN), DANTE, CERN and the 11 Tier-1 sites are collaborating on a customised version of the perfsonar MDM service. This customised service will be used to monitor the IP and circuit operations of the LHCOPN. Probes will be placed at the 12 nodes (the 11 Tier-1 sites and CERN) in order to monitor the interconnections between these nodes. The perfsonar MDM service desk at DANTE will operate this service. Users of this service and of the collected measurement data will be the LHCOPN IP Coordination Unit (LIPCU), the End-to-End Coordination Unit (E2ECU) and the Tier-1 sites who are the contributors to the LHCOPN operations. As part of a public trial phase, a similar service has already been rolled out to 6 network domains in Europe with 5 further networks to be introduced in the first quarter of The GÉANT2 project will extend this trial to LHCOPN monitoring. Similarly, ESnet and Internet2 are distributing compatible perfsonar measurement systems to their backbones and to various customer locations. Features The MDM service s measurement tools and the hardware and operating system they require are packaged in an appliance that can be deployed at any location. For LHCOPN it will be deployed close to the border router(s) of the Tier-0/1 sites. Active and passive measurement techniques will be used to monitor the network connectivity between Tier-0 and Tier-1 sites. Regular active measurements will probe the network connections in order to determine: Page 3

6 one-way delay and delay variation TCP achievable bandwidth ICMP-based round-trip time traceroute information to monitor routing path changes Regular passive measurements will be carried out to collect utilisation, input error and packet discards statistics from the sites network elements. LHCOPN-specific network weathermaps and diagnosis tools will be provided to visualise the measurement results. The service desk will use these data to generate monthly service reports. The monitoring infrastructure will be operated in a secure mode with well-defined responsibilities. The service specifications provide an overview of risks assessment. Network configurations and router firewalls play an important role in the mitigation of these risks. Therefore, all Tier-0/1 sites are required to meet specific responsibilities in order to maximise network security and reliability. Benefits of a managed service The service will provide up-to-date information about network health and assist operational teams in diagnosing network-related issues. Deploying the monitoring infrastructure at the administrative boundaries (the Tier-0/1 border routers) establishes demarcation points that help distinguish network issues in the LHCOPN from those at the sites. The advantage of a centrally managed service is that it provides a common view of the network status with low overheads for the Tier-0/1 network operators involved. The service provides reports based on the monitored data that can be used to analyse network statistics (for example, usage or errors) and performance bottlenecks. Reports can also be used to monitor adherence of network providers to Service Level Agreements and to detect usage trends. Deployment of identical tools and the use of a common service in all the Tier-0/1 sites will provide a unified network information view across all sites. The tools can be used on a day-today basis as part of normal site operations as well as for network engineering and capacity planning. The Tier-0/1 sites can also use the tools to demonstrate the quality of the wide-area networking service they deliver to the LCG project using the LHCOPN. Service desk responsibilities The perfsonar MDM service desk at DANTE will: Manage the measurement tools, data archives and visualisation tools. Manage the hardware and operating systems in order to ensure the reliability of the measurement tools and the data. Page 4

7 Ensure the integrity of the monitoring infrastructure, availability of the measured data, data quality and its archival. Site responsibilities All sites are required to contribute the following components to the MDM service: a terminal server dedicated IP interface on the border router(s) a PSTN/ISDN line for out-of-band access a Gigabit Ethernet switch a GPS antenna a protected power source rack space These contributions are further detailed in the service specifications set by the service desk. In addition, sites also need to assign local administrators whose responsibilities include: Securing the deployed measurement infrastructure by controlling access for third party support personnel (when required by the service desk). Carrying out the initial hardware installation and assisting the remote software installation. Updating the service desk with site network topology and configuration changes. Providing End-to-End monitoring (E2Emon) status information about circuits ending at the site. Securing network access to the infrastructure. The appliances must be connected to a dedicated IP interface on the border router(s). At each site, the appliances, the terminal server and the dedicated IP interface require a dedicated subnet with 11 public IP addresses. These IP addresses must be within the LHCOPN address range, so that measurements are routed via the LHCOPN circuits. They also must be reachable by the DANTE service desk and the operation coordinators (LIPCU and E2ECU). Traffic flows on the dedicated router interfaces must be restricted to: measurement activity between the appliances at the 12 sites, management access for the perfsonar MDM service desk which is outside the LHCOPN, and monitoring data access for users of measurement data. These users are operation coordinators (LIPCU and E2ECU) and the operators at the Tier-0/1 sites. In order to collect statistics from the border router interfaces which connect the site to the LHCOPN, the appliances must be allowed to poll the IP interfaces using read-only SNMP access. Page 5

8 This document provides a detailed specification for the perfsonar Multi-Domain Monitoring. A summary of the LHCOPN monitoring requirements that were discussed recently is in chapter 3. Detailed specification of the service begins with chapter 4. Section 4.1 provides an overview of the appliance. Section 4.2 suggests ideal locations within the Tier-0 and Tier-1 sites where these appliances can be deployed. Site responsibilities mentioned above are detailed in section 4.3. Section 4.4 is discusses how these appliances and the monitoring service can work with the security policies of the sites. It also summarizes the risks that have been identified, the mitigation of these risks as well as the security controls and contingency plans that have been defined. An overview of the support provided by the service desk is in section 5. The service specification ends with chapter 6 describing the potential for future service extension and the appendices providing specifications for the hardware that the sites have to deploy to contribute to the monitoring service. Technical details for the hardware and software used for the appliance and the software that will be installed on these appliances are also included in the appendices. Page 6

9 3 LHCOPN Monitoring Requirements The table below provides a summary of the network metrics and features that are required to be monitored for the LHCOPN. The details of these requirements, which have been proposed and discussed by the LHCOPN group, are available in [1]. Network Metrics Description Features 1 Delay measurements between Tier-0 and Tier-1 sites 2 Achievable Bandwidth measurements between Tier-0 and Tier-1 sites Regularly measure one way delay and jitter experienced during high volume data transfers Regularly measure bandwidth achievable on the network using the TCP protocol Periodic and ondemand scheduling of measurements Archive measurement results for trend analysis Visualise measurement results Raise alarms when defined thresholds are crossed Periodic and ondemand scheduling of measurements Archive measurement results for trend analysis Visualise measurement results Raise alarms when defined thresholds are crossed Page 7

10 3 Status of circuits (paths) connecting Tier- 1 sites to Tier-0 4 IP interface statistics for IP connectivity between Tier-0 and Tier-1 sites 5 Traceroute information Real time status of circuits indicating at least whether the circuits are up or down Regularly measure IP link statistics such as link capacity, link utilisation, input errors, and output drops Check the routing path using traceroute Measure status Archive status for trend analysis Visualise status of all circuits Raise alarms when status changes Measure metrics various Archive measurement results for trend analysis Visualise measurement results Raise alarms when defined thresholds are crossed Archive results for analysis Visualise measurement results Raise alarms when path is outside the LHCOPN or when path is assymetric 6 Packet Loss and Reordering Actively measure packet loss and reordering (in addition to passive interface statistics collected for IP interface drops and discards) Archive results for analysis Visualise measurement results Raise alarms when defined thresholds are crossed Page 8

11 4 Managed Service specification 4.1 Appliance specification Hardware In order to deploy perfsonar software, hardware with recommended configuration is necessary. For this purpose, the following hardware will be deployed at Tier-0 and the 11 Tier-1 sites Two servers provided by Sun Microsystems Another server provided by Bee Systems [10] The complete hardware specifications for the above items are available in 8Appendix A Operating System The Operating system installed on the servers is Red Hat Enterprise Linux 5. The Operating System will be updated with the latest patches available at the time of deployment. This Linux Operating System installed on the servers is of enterprise quality supplied and supported by the Red Hat Corporation. If any security vulnerabilities are found, the Red Hat Corporation, as per the RHEL 5 licensing agreements, promises to fix such issues and prepare necessary patches and software upgrades. Whenever any security patches and software updates are available, Red Hat notifies its users (i.e. the service desk). The service desk will upgrade the Operating System by installing the latest patches and software updates whenever Red Hat makes them available. Software upgrades and all other necessary maintenance of Operating System will be done remotely with the help of the servers remote management capabilities. Page 9

12 4.1.3 Software suite The software suite that meets the monitoring requirements of LHCOPN consists of various software products. These products can be grouped into three main categories. Measurement tools and scripts perfsonar software (i.e., web service software) for providing multi domain access to data gathered by measurement tools and scripts perfsonar visualisation tools for viewing data accessed via the perfsonar software The third category of products in the list above includes visualisation tools that are web based and do not need to be deployed at the Tier-0 or any of the Tier-1 sites. All software products belonging to the first two categories (i.e., measurement tools and perfsonar software) will need to be deployed at the Tier-0 and all the Tier-1 sites. The list below introduces all the products belonging to these two categories. The service desk will install all necessary software including measurement tools, perfsonar suite and the required dependency software. The service desk will maintain the software that they have installed on the appliances. This maintenance includes applying patches and upgrading software to newer versions whenever updates are available. Software maintenance will be done in maintenance windows unless urgent maintenance is required Measurement Tools The following is a list of the Measurement Tools that will be deployed at the Tier-0 and Tier-1 sites. Further information for these tools is available in the annex. BWCTL and Iperf Tool TCP Achievable Bandwidth measurements CACTI Open source tool to gather and store IP interface statistics via SNMP HADES System One Way Delay Measurement system OWAMP One Way Delay Active Measurement tool perfsonar software with multi domain capabilities The following is a list of perfsonar software that will be deployed at the Tier-0 and Tier-1 sites. Further information for these tools is available in the annex. Authentication Service Stores user identities and attributes, provides Authentication BWCTL Measurement Point Capability to schedule TCP throughput measurements HADES Measurement Archive Access to one way delay measurement results Lookup Service XMLDB Discovery of capabilities of appliances Page 10

13 perfsonobuoy Active measurement scheduler and measurement archive Pinger Measurement Point Capability to make measurement a ping measurement Pinger Measurement Archive Access to Ping Measurement results RRD Measurement Archive Access to IP Interface statistics SQL Measurement Archive Access to circuit status information 4.2 Deployment Location The primary objective of the Multi Domain Monitoring service is to monitor the LHCOPN network connectivity. Therefore, the monitoring hardware specified in the previous section will be deployed at the Tier-0 and all Tier-1 sites. The monitoring hardware, at all sites, has to be connected to the links that are part of the LHCOPN. This is required to ensure that any active measurements made by the monitoring hardware will use the links that are used for data transfer between Tier-0 and Tier-1 and also between any two Tier-1 sites. The figure below provides an abstract view of the connectivity between Tier-0 and Tier-1 sites and illustrates some of the active measurements that will be made by the appliances deployed at these sites. Fig. 1: Illustration of active measurements over network connections between Tier-0 and Tier- 1 sites Page 11

14 Connecting the appliances via a dedicated LAN to a separate interface on the router(s) helps in monitoring the characteristics of the network connectivity between the Tier-0 and Tier-1 sites. As the appliances are connected to a separate LAN, measurements made by these appliances are not affected by any of the problems in the LANs on which the server farms (or cluster elements) are connected. Such a setup also allows the server farms to be firewalled from these appliances thus making it easier to work with existing security policies of the site. The appliances should be connected as close as possible to the border router(s) of the Tier-0 and Tier-1 sites. A dedicated switch should be used to connect these appliances to the network. This dedicated switch should be connected to a dedicated interface on the border router(s). The sections below list out common scenarios that describe border router network topologies used to connect Tier-0 and Tier-1 sites to the LHC Optical Private Network. Each scenario also identifies the location where MDM appliances can be deployed and lists out sites that have been preliminarily identified as candidates for that scenario. Scenario 1: Sites with one border router with primary and backup links This scenario describes a straightforward scenario where a Tier-1 site makes use of a single border router to connect to Tier-0 and Tier-1 sites using the LHCOPN. The border router typically contains outward interfaces connecting to a primary and zero or more backup links. The inward interfaces are connected to various LANs used by server farms. Figure 2: Illustration of Scenario 1 - appliances are connected to dedicated interfaces on the border router Page 12

15 Figure 2 is an illustration of this scenario where MDM appliances are connected via a dedicated switch to a dedicated interface on the border router of the Tier-1 sites. The Tier-1 site in the figure consists of one border router with a few interfaces. One of the interfaces (green in colour) is dedicated to the monitoring appliances connected via a dedicated switch. The LANs on which the server farms (or cluster elements) are present, can be seen connected to the router via separate interfaces. Sites suitable for Scenario 1: BNL CNAF FNAL IN2P3 NDGF PIC RAL TRIUMF Scenario 2a: Sites with two border routers with primary and backup links In this scenario, Tier-0 and Tier-1 sites could make use of two border routers to connect to other sites via the LHCOPN. The primary link used for this connection is connected to one of the routers while the backup link is connected to the other. The site s LAN connections connect to the LHCOPN via one of the routers. In case the primary link fails, the backup links, usually on a different router, are used by the LANs to communicate with Tier-0/ other Tier-1 sites. In case of failure of one of the routers, Figure 3: Illustration of scenario 2a - appliances are deployed in sites with two border routers Page 13

16 Figure 3 illustrates scenario 2a where site s LANs are distributed across the two border routers in order to connect to the LHCOPN. One of the routers contains the primary link which is used for data transfer unless there are link/router failures. The MDM appliances can be seen connected to a dedicated interface on one of the routers via a dedicated switch. The primary link to the LHCOPN can be seen connected to this chosen router as well. In case the primary link fails, the routers send all traffic via the backup links and this would include active measurement traffic as well. In case the primary router fails, the MDM appliances would loose connectivity to LHCOPN. Candidate sites suitable for Scenario 2a: GRIDKA Scenario 2b: Sites with two border routers using Hot Standby Routing Protocol or other similar protocols (Virtual Router technique) In this scenario, some of the Tier-0 and Tier-1 sites could also make use of two border routers to connect to the LHCOPN network but with one of these routers acting as a Hot Standby. This is achieved with the help of popular techniques such as Cisco s Hot Standby Routing Protocol or the Virtual Routing technique. These techniques make use of a third virtual router that acts as the recipient of all the traffic being sent by the server farms in the site s LANs. One of the border routers, assigned as primary, will play the role of the virtual router as well. The other router constantly monitors the status of the primary/virtual router. In case of router failures, the standby router assumes the role of the virtual router and traffic gets routed via the standby router instead. Figure 4: Illustration of scenario 2b - Appliances being connected to interfaces on two dedicated routers Page 14

17 In figure 4, the appliances can be seen connected to the virtual router via a switch. Effectively, the appliances are connected to both the border routers via dedicated interfaces. Ideally the switch used is dedicated to the MDM appliances but it is important to note that the appliances have been deployed and connected to the LHCOPN network in a manner that ensures that the active measurement traffic get treated the same way as the actual data traffic between the Tier-0 and the Tier-1 site. Sites suitable for Scenario 2b: SARA Scenario 2c: Sites with two border routers arranged in a Triangle along with an internal router In this scenario, two border routers of the site are connected using primary and backup links to the LHCOPN. A third internal router is then used to route the site s LHCOPN destined traffic towards a particular border router. In some cases, the decision on which border to use could be made based on the destination of the site s traffic. In case of failure of one of the routers, traffic would automatically get diverted to the other router. Figure 5: Illustration of scenario 2c - Appliances deployed at sites with two border routers connected to form a Triangle with an internal router In this scenario, the best deployment location for MDM appliances would be next to the internal router that decides the flow of traffic from the site towards the border routers. This is to ensure that the active measurement traffic from MDM appliances are treated the same way as the site s server farm traffic (bound for LHCOPN). Figure 5 illustrates such a deployment. Like in previous scenarios, the appliances can be seen connected to a dedicated switch which is then connected to a dedicated interface on the internal router. Page 15

18 Sites suitable for scenario 2c: ASGC CERN 4.3 Site Responsibilities In order to deploy the appliances, each Tier-1 site will need to provide the following: Hardware A dedicated Gigabit Ethernet switch and necessary cat 6 cabling o This switch allows a dedicated LAN to be set up for monitoring equipment within each site Terminal server according to the make and model specified in the appendix o The appliances have been tested to work with the specified terminal server model A PSTN or ISDN line for out-of-band access via the terminal server Electricity 9 power sockets, each providing v of power supply o Includes power socket for terminal server Total power consumption of 2 Kilo Watts o Includes power consumption by terminal server Connection via UPS (Uninterrupted Power Supply) to all the servers and the terminal server o o UPS Option 1: Provide UPS backup for at least 60 minutes and site administrators will notify MDM service providers of power failures well within this time period so that remedial measures can be undertaken. UPS Option 2: Make use of advanced UPS systems that are capable of notifying power failures to the servers. Note: There are additional power requirements for a terminal server if there isn t one already present at the site. The sub-section on Terminal Server below explains these requirements. Rack space Rack space of 8 units for servers in a standard19 rack o Includes ventilation space between servers 1 Additional unit of rack space for the terminal server Page 16

19 Network Connections 11 ports on the dedicated switch for data connectivity o Includes port for terminal server and net management cards on servers 3 ports on the specified terminal server for remote management o Terminal Server has to be connected to a switch for in-band access and to an ISDN line and/or PSTN line for out-of-band access 11 Public IP addresses and DNS entries per site (DNS entry managed by the Tier-0 and Tier-1 sites) o IP addresses assigned to the appliances must be within the public LHCOPN Address range o Furthermore, at each site, a dedicated a subnet within the LHCOPN address range must be assigned for the monitoring infrastructure. This subnet must be part of a /27 address range within the LHCOPN address range and must be dedicated to the servers, the terminal server and the dedicated IP interface. Network Firewall and traffic flow restrictions In order to secure the network access of the appliances as well as the site equipment, the following restrictions are important Monitoring and management related traffic from the appliances do not enter the local or remote sites LANs. This is to protect the sites sensitive equipment such as data stores and server farms. The only exception is traffic related to measurement data access from within the local or remote site, no other traffic from the site or any of the remote sites enters the LAN dedicated to the perfsonar MDM appliances. The list below details characterises the traffic flows to and from the appliances. It identifies the minimum set of firewall and access configurations required to deliver the MDM Service. The list has been drawn up based on the assumptions that the appliances make measurements with other appliances located in Tier-0 or Tier-1 sites, the data is accessed by Service desk at DANTE, the Operations groups LIPCU and E2ECU and the Tier-0 and Tier-1 personnel, and the service desk at DANTE along with DFN and Internet2 will carry out remote management of the boxes. The list is: SSH access to and from the servers and the terminal server o Access must be limited to set of address ranges that includes at least DANTE/GEANT2 and DFN and Internet2. o This is used for the management of the workstations. Telnet is not permitted. Page 17

20 HTTP traffic to and from the servers to all other appliances, to Tier-0/Tier-1 sites wishing to access data, the service desk at DANTE and other co-ordinating groups such as End to End Co-ordination Unit (E2ECU) and LHC IP operations Co-ordination Unit (LIPCU). o o Includes traffic originating from the site as well Ports in the range 8000:8200 will be receiving and sending http traffic SNMP read-only access to (at least) the border router(s) of the site connected to the LHCOPN network o o Access can be limited to the address range assigned to the servers deployed on the site Access can be limited to MIBs storing Interface statistics such as counts, drops, errors and others. ICMP packets received and sent by the servers to Tier-0/Tier-1 sites wishing to access data, the service desk at DANTE and other co-ordinating groups such as E2ECU and LIPCU TCP and UDP traffic to be allowed on the following ports to and from all other Tier-0 and Tier-1 sites, the service desk, the E2ECU and LIPCU o BWCTL requires TCP - ports 4823, 9910:9950, 5001 o BWCTL requires UDP port 5001 o OWAMP requires TCP 861 o OWAMP requires UDP 9800:10000 o perfsonobuoy requires TCP o HADES requires UDP ports 60000:61000 No restrictions on traffic exchange between perfsonar MDM servers located at the same site Local Administrators Each site is required to appoint local administrator(s) who can assist the service desk in carrying out installation, configuration and maintenance tasks. The administrators must follow the instructions provided by the service desk. Some such tasks are: Taking delivery of the servers, installing them and connecting them with other equipment such as terminal server, GPS antenna, Gigabit switch and IP interface Page 18

21 Providing network information such as topology and network configurations o Updating the service desk whenever there is any change. o Failure to do so could result in the appliances not being able to make any measurements o For example, if the capacity of an IP interface on the border router is changed or the interface itself is changed but the service desk is not updated about such changes, measured data could be inaccurate or measurement may not be possible at all. In such cases, it remains the responsibility of the local system administrators to ensure that such information is accurate and is provided to the service desk at the earliest. Assisting the service desk in maintenance procedures by doing tasks such as removing, shipping and replacing faulty hardware Notifying the service desk of scheduled maintenance and unscheduled events. In case of power failure, the service desk must be notified as soon as possible but definitely within 60 minutes (time before the UPS shuts down). Circuit Status Information for SQL Measurement Archive: The LHCOPN network connectivity between Tier-0 and Tier-1 sites is seen as a set of end-to-end circuits (also known as lighpaths). Each end-to-end path can be seen as a concatenation of multiple circuits. Each circuit is provided by one of the many network providers or administrative domains that are part of the LHCOPN (for example: Tier-0 and Tier-1 sites, GEANT2, ESnet, NRENs, USLHCnet, etc). A change in the status of one of the circuits impacts the status of the end-toend circuit that it is a constituent of. From the operational point of view, reliable status information about the end-to-end circuits as well as the status of the constituent circuits is important. For the circuits managed by the Tier-0 and Tier-1 sites, the manner in which this circuit status information can be gathered depends on the network equipment in use by the Tier-0/Tier-1 site. This is because each equipment manufacturer makes use of proprietary non-standardized interfaces to gather such information from the equipment and these interfaces are usually accessible only by the site s network operators. The MDM appliances provide the capability to access detailed information as well as the current and historical status (up, down, etc) of the circuits that are managed by the Tier-0 & Tier-1 sites. This capability is provided with the help of the SQL Measurement Archive software. In order to do this, the SQL Measurement Archive requires certain information about the circuits (local name, global name, etc) to be registered with it. Whenever there is any change to the status of any of the configured circuits or any change to the circuit information itself, the SQL Measurement archive needs to be updated at the earliest. The reliability of the information provided by the SQL Measurement Archive depends on the information that has been configured into it and also the promptness with which it is updated of any change in such information. The Tier-0/Tier-1 site administrators are expected to provide information about the circuits as well as their status to the SQL Measurement Archive. They are also expected to update the information whenever there is a change in status of the circuit or any other information related Page 19

22 to the circuit itself. Standardized perfsonar interfaces are available on the SQL Measurement Archive that can be used to provide such updates. Specialized software that can be used the Tier-0/Tier-1 site administrators in order to easily update such information can also be provided. While the SQL Measurement Archive software and the data stored in the archive is maintained by the service desk, the Tier-0/Tier-1 site administrators will be responsible for the accuracy of the circuit information provided. The administrators can approach the service desk for assistance in using the interfaces on the SQL Measurement Archive or in using the specialized software. Accurate Time Signal One of the MDM servers requires an accurate time source to be available at the deployment location in order to carry out one way delay measurements of high precision. The lack of an accurate time source at the site will result in drifting clocks that reduce the reliability of the measurements. A GPS antenna that receives time signals from the satellites has to be installed on site. There are a couple of options available for configuration of a GPS antenna and the receiver card required for interpreting the signals from the satellite. Option 1 (Recommended) - GPS Antenna: A GPS antenna with the make and model similar to the one listed in the appendix A has to be available at the Tier-0 and Tier-1 sites for this purpose. The time signal has to be delivered to one of the MDM servers via a co-axial cable (RG58). In this case, the server connected to the time signal acts as an NTP stratum-1 server. The figure 6 illustrates the connection between the one of the MDM servers (green box) and a GPS antenna. Other key points to note in this figure are the use of a splitter, a lightning protector and the GPS receiver card on the server. If a GPS antenna is not already present at the site, the site will need to install a GPS Antenna of the same make and model and also the necessary co-axial cable (RG58) connections. Ideally a splitter should be used to allow re-use of the signal by multiple servers/cards. If a similar GPS antenna is already present at the site, a co-axial cable (RG58) connection between a splitter connected to the antenna and the GPS card on one of the deployed servers is required. Page 20

23 Figure 6: Illustration of connections between GPS time source and a monitoring appliance Option 2 - PPS or NTP signal: If a GPS antenna is already available and is connected to an existing GPS signal receiver card, it is possible to re-use the clock on this card via a PPS signal (if the existing GPS card supports PPS) or by configuring the server with the GPS receiver card as an NTP stratum-1 time source. The PPS signal has to be delivered to the MDM appliance via a serial cable. However, device driver limitations and difficulties in modifying the Operating System Kernel of Red Hat Enterprise 5 create some constraints to this solution. As a result it is not the preferred solution and its use will have to be decided on a case-by-case basis. If the existing GPS signal receiving server can be configured as an NTP time source (stratum- 1), it can be used as a time source for MDM appliances provided: The Stratum-1 server (i.e. server receiving the GPS signal) is located adjacent to the MDM appliances and is connected to the same LAN switch as the MDM appliances The network path connecting the stratum-1 server and the appliances are less than 50% loaded at any time in order to avoid network congestions to reduce the accuracy of the time signal The delay and delay variation on the network path between the stratum-1 server and the MDM appliances are extremely low (<2 micro seconds of delay variation) in order to ensure accuracy of the time signal Since the network related constraints are difficult to predict or control, this option is not highly recommended and has to be decided on a case-by-case basis. Installations of GPS antenna and all necessary cabling work will have to be carried out by a local company/contractor and has to be chosen by the site management. Installation instructions and information on how to test installations will be available. Page 21

24 Site Security and physical access control All sites are required to secure the measurement infrastructure against unauthorized access. Personnel with authorization from the perfsonar MDM service desk at DANTE should be allowed to access the infrastructure. 3 rd party hardware support personnel will be required to visit the site on behalf of DANTE to carry out hardware repair or upgrade tasks. Such visits will be planned with a short notice as hardware repairs and replacements have to be carried out as soon as possible. The personnel will be given details about the site location and site security procedures that are required to be followed. In case of a security breach, the sites must follow their contingency plans and they must immediately inform the service desk. 4.4 Security Risk Management overview This sub-section provides an overview of some of the risks associated with the service. These risks threaten the normal operation of the monitoring service and in some cases, it could affect other LHCOPN operations. Mitigation of such risks is explained in each category. Network related vulnerabilities The service desk at DANTE along with DFN and Internet2 will require remote access to the appliances at all times for administration tasks. Remote access will also be required for the visualisation tools used by Operational groups and for measurement data and information exchange between appliances. The need for remote access to the appliances requires that the appliances be secured against network related vulnerabilities. The lack of network security can expose the machine to several threats. An immediate threat is attack from unauthorised IP addresses. Without firewalls protecting the servers anybody can probe the servers for vulnerabilities or information leading to a compromise of the servers. This risk can be mitigated by the correct use of firewall filters on the site s border routers and the servers. These filters limit access to a specific set of ports on the servers and also the IP addresses that are permitted to contact these ports. For the perfsonar MDM service, the list of ports and protocol types required by the monitoring applications and the user groups permitted to access these ports have already been specified in this document. The service desk will apply this list to the firewalls on the servers. The local administrators of the site will have to apply this list on the security firewalls in the site s routers (border routers) to protect the servers and also the Tier-0/1 site equipment. Page 22

25 A denial of service attack whether distributed or not would cause significant harm to the services the servers provide. Simply overloading the HTTP server with requests would greatly impact the users accessing the HTTP service. This risk is also mitigated by the previously described measure of restricting access to the HTTP ports on the servers to a limited group of users. Legitimate users of the service will be advised about fair use policies so that they don t overload the service on purpose. To mitigate the threat of a smurf attack [11] or ping flood the routers should be configured to enforce strict rate limiting policies. A router has far more capability than a server to filter this traffic without impact and by dropping the unwanted traffic closer to the source there is less of a congestion risk. Software vulnerabilities Any vulnerability in the software such as operating system or the applications, especially the ones listening on open ports such as SSH daemon, could end up with the system being compromised. This will pose a considerable risk to the normal operation of the appliances, to the stored data and possibly to other local and remote devices to which the compromised appliance has network access. As the appliances have SNMP read access to border routers of the site, there is a risk that large amounts of SNMP read requests could be made to the border routers. As part of risk mitigation, the operating system used on the servers is Red Hat Linux Enterprise Server 5.0. This operating system comes with a licensing agreement with Red Hat Corporation. As per the agreement, the Red Hat Corporation provides patches and updates for any discovered vulnerabilities. Alerts are sent on subscription channels whenever vulnerabilities are discovered and patches are available. The service desk at DANTE will promptly update the Operating System whenever such patches are made available. If a known vulnerability is expected to affect the appliances, appropriate measures will be taken, which could include shutdown of some of the monitoring tasks. Furthermore, the appliances are exposed to limited user groups with the help of network firewalls as detailed previously. The operating system will also be bolted down to run with only the necessary set of services. As a result, the risk of exploiting operating system vulnerabilities is reduced considerably. Restricted user access to the applications on the appliances with the help of network firewalls and in-built authentication mechanisms reduces the level of risk associated with application vulnerabilities. All applications required for monitoring purposes will be run in a low-privilege user account on the appliances. As a result, exploits would have very limited access to system commands. Security vulnerabilities in the applications will be handled with the help of agreements (contractual or MoU) between the service desk and many of the developers of such applications. Developers would be asked to prioritise working on patches for known vulnerability. Physical access vulnerabilities The appliances deployed within each site are susceptible to loss of connectivity and power supply as well as damage due to negligence or intentional acts from authorized or unauthorized personnel with physical access to the machines. Page 23

26 As mentioned in the site requirements previously, each site is expected to secure the monitoring infrastructure deployed within their site and control access to the infrastructure as per the requirements of the Service Desk at DANTE Security Controls and contingency planning Apart from the risk mitigation procedures mentioned previously, security control procedures such as periodic audits of appliances and internal procedures will be used to enhance security related aspects of the service and to ensure that the appliances are working as expected. Whenever a change is planned to be introduced into the service, change management procedures include identification of any new security related risks that could arise as a result of this change. In such cases, risk mitigation procedures would be carried out before the change is introduced into the service. Although the servers are operated and controlled legitimately, emergency procedures which include adding special rules in the firewalls of border router(s) and workstations will be prepared. These procedures are designed to help the service desk in situations where one or more of the servers are compromised or if a legitimate user causes network and monitoring service degradation. If a compromised server is detected by the service desk, either via security audits or via other means such as loss of connectivity, data loss and any other abnormal behaviour, emergency procedures will be followed. Local administrators might be requested to apply special rules in the site s border routers to which the servers are connected. Depending on the severity, the service desk may request the affected sites to remove power supply until the incident is resolved and integrity is restored. Removal of power or network access will result in some level of service degradation depending on the appliance(s) involved. Detailed contingency plans define the procedures to be followed by the service desk in order to restore normal or partial service operation. They also define the assistance expected from the local site administrators. Other contingency plans used by the service desk for the perfsonar MDM service for LHCOPN include procedures for situations such as restoring from backed up data in case of problems with the primary data source and rebuilding components or the complete appliance in case of hardware failures Measurement data access restrictions Many administrative domains (example: the CERN domain, the GEANT2 domain) make use of technologies such as digital certificates, etc. in order provide credentials to its users. Users make use of these credentials to access resources such as measurement data within their domain. The edugain framework makes it possible for users of domains with compatible authentication technologies (for example: Shibboleth [3]) to use their existing credentials in order to access resources made available by other domains. Such domains will however need to be part of the edugain federation. For domains that do not use edugain compatible authentication technologies, edugain and GIdP [4] can provide credentials to the users these Page 24

27 domains. edugain is also investigating the compatibility of VOMS (Virtual Organisation Membership Service) [5] with its framework. The perfsonar software provides the capability to restrict access to measurement data and the usage of measurement tools to authenticated and authorized users only. These capabilities are available via the edugain framework [2] with which the perfsonar framework is compatible. If access to the measured data and the measurement capabilities of the deployed perfsonar software has to be restricted to a selected group of users, then it is necessary for all these users to possess credentials compatible with the edugain framework. 4.5 perfsonar MDM Service in beta The perfsonar Multi Domain Monitoring service began as a beta service (i.e., public trial) during the 2 nd quarter of A dedicated service desk to support its users has been available since then. During this beta phase, the roll out of the service is limited to a specific number of users in order to carry out a controlled evaluation of the service so that suggestions and improvements can be gathered and quality and scope of the service can be improved before the service is made available to a wide community of users. During the first stage of the trial phase (called the MDM pilot) the service has been successfully rolled out to six backbone network providers. During the second stage (the MDM prototype), which begins during the first quarter of 2008, the number of users will almost be doubled to eleven. To meet the requirements of LHCOPN monitoring, the perfsonar MDM service has been customised and the trial phase is being extended to include the Tier-0 and the Tier-1 sites as well so that the feedback from the LHC community can be used to further enhance the MDM Service. Page 25

28 5 Support The Multi Domain Monitoring Service offered by DANTE is supported by a dedicated service desk located at DANTE. The service desk acts as the Single Point Of Contact (SPOC) that can be reached via telephone and . It provides support to the users with the help of underpinning contracts and support agreements with providers of hardware, Operating System and various development teams responsible for monitoring tools and perfsonar products. The service desk makes use of a Trouble Ticket System in order to acknowledge reported incidents (usually by users). In order to help the service desk in detecting incidents even before they are reported, special tools are in use that monitors the health of deployments and raise alerts if it detects problems with any of the deployments. Such proactive incident detection helps the service desk in speedy acknowledgement and resolution of certain incidents. The service desk also maintains an information repository designed to meet the needs of correlating and storing information related to the Multi Domain Monitoring Service. This repository, called as the Configuration Management Database, provides quick and detailed access to information related to any case being handled by the service desk. The service support structure and procedures that have been defined for the MDM service make use of the Information Technology Infrastructure Library (ITIL) standards. The IT Infrastructure Library (ITIL) is a framework definition that specifies a set of processes and functions to be used for the management of any IT Service. These definitions are based on best practices gathered from public and private sector industries world wide. Page 26

perfsonar Multi-Domain Monitoring Service Deployment and Support: The LHC-OPN Use Case

perfsonar Multi-Domain Monitoring Service Deployment and Support: The LHC-OPN Use Case perfsonar Multi-Domain Monitoring Service Deployment and Support: The LHC-OPN Use Case Fausto Vetter, Domenico Vicinanza DANTE TNC 2010, Vilnius, 2 June 2010 Agenda Large Hadron Collider Optical Private

More information

Introduction to perfsonar

Introduction to perfsonar Introduction to perfsonar Loukik Kudarimoti, DANTE 27 th September, 2006 SEEREN2 Summer School, Heraklion Overview of this talk Answers to some basic questions The need for Multi-domain monitoring What

More information

perfsonar MDM release 3.0 - Product Brief

perfsonar MDM release 3.0 - Product Brief perfsonar MDM release 3.0 - Product Brief In order to provide the fast, reliable and uninterrupted network communication that users of the GÉANT 2 research networks rely on, network administrators must

More information

perfsonar MDM updates for LHCONE: VRF monitoring, updated web UI, VM images

perfsonar MDM updates for LHCONE: VRF monitoring, updated web UI, VM images perfsonar MDM updates for LHCONE: VRF monitoring, updated web UI, VM images Domenico Vicinanza DANTE, Cambridge, UK perfsonar MDM Product Manager domenico.vicinanza@dante.net LHCONE Meeting Oslo 20-21

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Operational Model for E2E links in the NREN/GÉANT2 and NREN/Cross-Border-Fibre supplied optical platform

Operational Model for E2E links in the NREN/GÉANT2 and NREN/Cross-Border-Fibre supplied optical platform Operational Model for E2E links in the NREN/GÉANT2 and NREN/Cross-Border-Fibre supplied optical platform 0 Background In the GÉANT2 project plan it is foreseen that end-to-end (E2E) links (essentially

More information

How To Set Up A Network Measurement Toolkit For A Network Performance Test On A Network With A Network (Networking) On A Microsoft Ipa 2.5 (Netware) On An Ipa2 (Netcom) On Your Computer

How To Set Up A Network Measurement Toolkit For A Network Performance Test On A Network With A Network (Networking) On A Microsoft Ipa 2.5 (Netware) On An Ipa2 (Netcom) On Your Computer Firewall Port Recommendations for the ps Performance Toolkit Prepared by the NTAC Performance Working Group November 2014 Edited by J. Zurawski (ESnet), A. Brown (Internet2), A. Lake (ESnet), K. Miller

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Deploying distributed network monitoring mesh

Deploying distributed network monitoring mesh Deploying distributed network monitoring mesh for LHC Tier-1 and Tier-2 sites Phil DeMar, Maxim Grigoriev Fermilab Joe Metzger, Brian Tierney ESnet Martin Swany University of Delaware Jeff Boote, Eric

More information

Path Monitoring Tools Deployment Planning for U.S. T123. Jeff Boote Internet2/R&D. July 22, 2008 Jt Techs, UNL, Lincoln NE

Path Monitoring Tools Deployment Planning for U.S. T123. Jeff Boote Internet2/R&D. July 22, 2008 Jt Techs, UNL, Lincoln NE Path Monitoring Tools Deployment Planning for U.S. T123 Jeff Boote Internet2/R&D July 22, 2008 Jt Techs, UNL, Lincoln NE Implementation Considerations Constraints 1. Different LHC participants are interested

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

SURE 5 Zone DDoS PROTECTION SERVICE

SURE 5 Zone DDoS PROTECTION SERVICE SURE 5 Zone DDoS PROTECTION SERVICE Sure 5 Zone DDoS Protection ( the Service ) provides a solution to protect our customer s sites against Distributed Denial of Service (DDoS) attacks by analysing incoming

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

perfsonar MDM updates: New interface, new possibilities

perfsonar MDM updates: New interface, new possibilities perfsonar MDM updates: New interface, new possibilities Domenico Vicinanza perfsonar MDM Product Manager domenico.vicinanza@dante.net GÉANT Multi-Domain Service Desk http://mdsd.geant.net perfsonar MDM

More information

BT Assure DoS Mitigation UK

BT Assure DoS Mitigation UK BT Assure DoS Mitigation UK Annex to the Internet Connect UK Schedule Contents A note on we and you... 2 1. Service Summary... 2 2. Service Standard Components... 2 3. Service Options... 2 4. Service Management

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

LHC Path Monitoring Tools. Jeff Boote Internet2/R&D. May 27, 2008 US ATLAS T2/T3 Workshop at UM

LHC Path Monitoring Tools. Jeff Boote Internet2/R&D. May 27, 2008 US ATLAS T2/T3 Workshop at UM LHC Path Monitoring Tools Deployment Planning Jeff Boote Internet2/R&D May 27, 2008 US ATLAS T2/T3 Workshop at UM Overview Value of network performance monitoring and diagnostic tools Recommended tools

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations

Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contract Number: IST-2000-26417 Project Title: Deliverable D8 : Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contractual Date: 31 May 2002 Actual Date: 14 August

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre

More information

Cisco Expressway Basic Configuration

Cisco Expressway Basic Configuration Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

Infrastructure for active and passive measurements at 10Gbps and beyond

Infrastructure for active and passive measurements at 10Gbps and beyond Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA

More information

Managed Appliance Installation Guide

Managed Appliance Installation Guide Managed Appliance Installation Guide Introduction The CrashPlan PROe managed appliance is a fully managed system that requires minimal user maintenance. This guide is intended to assist you in installing,

More information

Application of perfsonar architecture in support of GRID monitoring

Application of perfsonar architecture in support of GRID monitoring Application of perfsonar architecture in support of GRID monitoring Binczewski A, Lawenda M, Łapacz R, Trocha Sz INGRID 2007, S.Margherita Ligure, Italy Agenda Start point Network monitoring perfsonar

More information

Implementing Secure Converged Wide Area Networks (ISCW)

Implementing Secure Converged Wide Area Networks (ISCW) Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Cisco Bandwidth Quality Manager 3.1

Cisco Bandwidth Quality Manager 3.1 Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

LHCONE Site Connections

LHCONE Site Connections LHCONE Site Connections Michael O Connor moc@es.net ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes

More information

Mitel Performance Analytics

Mitel Performance Analytics Mitel Performance Analytics For Enterprises May 2016 Summary Mitel Performance Analytics: Service Quality Matters MPA Plus: Advanced Enterprise Features Fault & Performance Management Features MPA Service

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Managed Services OVERVIEW

Managed Services OVERVIEW Managed Services OVERVIEW overview 24/7 Support Services Tailored for large and small businesses MANAGED SERVICES 3 MONITORING AND ALERTING SERVICE 4 SUMMARY 4 DESCRIPTION 4 MONITORING 4 ALERTING 4 RESPONSIBILITY

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

perfsonar MDM Deployment PERT workshop, TNC2012

perfsonar MDM Deployment PERT workshop, TNC2012 perfsonar MDM Deployment PERT workshop, TNC2012 Szymon Trocha, Poznań Supercomputing and Networking Centre Reykjavik, 21 May 2012 The research leading to these results has received funding from the European

More information

Cisco Unified Communications Remote Management Services

Cisco Unified Communications Remote Management Services Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Configuration Management: Best Practices White Paper

Configuration Management: Best Practices White Paper Configuration Management: Best Practices White Paper Document ID: 15111 Contents Introduction High Level Process Flow for Configuration Management Create Standards Software Version Control and Management

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

LHCONE Operational Framework

LHCONE Operational Framework LHCONE Operational Framework Part 1 : principles and ideas for the operational model Part 2 : LHCONE VRF operational handbook Part 3 : Next step Xavier Jeannin RENATER 2013/01/28 Part 1 : principles and

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Distributed Denial of Service Attack Tools

Distributed Denial of Service Attack Tools Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily

More information

Ixonos Cloud Solutions - A Review

Ixonos Cloud Solutions - A Review Capacity Services Ixonos Plc 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1 Service description... 3 1.1 Environment... 3 1.2 Security services... 4 1.3 Data Center facilities... 5 2 Service levels...

More information

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services 1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Cisco Unified Computing Remote Management Services

Cisco Unified Computing Remote Management Services Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

The LHC Open Network Environment Kars Ohrenberg DESY Computing Seminar Hamburg, 10.12.2012

The LHC Open Network Environment Kars Ohrenberg DESY Computing Seminar Hamburg, 10.12.2012 The LHC Open Network Environment Kars Ohrenberg DESY Computing Seminar Hamburg, 10.12.2012 LHC Computing Infrastructure > WLCG in brief: 1 Tier-0, 11 Tier-1s, ~ 140 Tier-2s, O(300) Tier-3s worldwide Kars

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Data Sheet Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security

More information

Linux MPS Firewall Supplement

Linux MPS Firewall Supplement Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2 vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring

WHITE PAPER September 2012. CA Nimsoft For Network Monitoring WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe

More information

perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015

perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015 perfsonar Overview Jason Zurawski, ESnet zurawski@es.net Southern Partnerships for Advanced Networking November 3 rd 2015 This document is a result of work by the perfsonar Project (http://www.perfsonar.net)

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information

The Role of Precise Timing in High-Speed, Low-Latency Trading

The Role of Precise Timing in High-Speed, Low-Latency Trading The Role of Precise Timing in High-Speed, Low-Latency Trading The race to zero nanoseconds Whether measuring network latency or comparing real-time trading data from different computers on the planet,

More information

Reducing the impact of DoS attacks with MikroTik RouterOS

Reducing the impact of DoS attacks with MikroTik RouterOS Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate

More information

Managed Service For IP VPN Networks

Managed Service For IP VPN Networks LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Tier3 Network Issues. Richard Carlson May 19, 2009 rcarlson@internet2.edu

Tier3 Network Issues. Richard Carlson May 19, 2009 rcarlson@internet2.edu Tier3 Network Issues Richard Carlson May 19, 2009 rcarlson@internet2.edu Internet2 overview Member organization with a national backbone infrastructure Campus & Regional network members National and International

More information

A FAULT MANAGEMENT WHITEPAPER

A FAULT MANAGEMENT WHITEPAPER ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

perfsonar MDM The multi-domain monitoring service for the GÉANT Service Area connect communicate collaborate

perfsonar MDM The multi-domain monitoring service for the GÉANT Service Area connect communicate collaborate DATASHEET Network Performance Services perfsonar MDM The multi-domain monitoring service for the GÉANT Service Area connect communicate collaborate What is perfsonar MDM? perfsonar MDM (Multi-Domain Monitoring)

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS.

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. MarWatch Fault & Performance Management SaaS REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. Detecting and resolving problems on today s increasingly complex business communications networks is a

More information

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Implementing perfsonar in the South African National Research and Education Network

Implementing perfsonar in the South African National Research and Education Network Implementing perfsonar in the South African National Research and Education Network Kevin DRAAI 1,2, Roderick MOOI 1,3 1 Council for Scientific and Industrial Research, P.O. Box 395, Pretoria 0001, South

More information

Chapter 2 Introduction

Chapter 2 Introduction Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL

More information

Print Audit Facilities Manager Technical Overview

Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information