NETWORK FLOW ANALYSIS
|
|
|
- Michael Bryan
- 10 years ago
- Views:
Transcription
1 NETWORK FLOW ANALYSIS DefCon 2008 Bruce Potter
2 INTRODUCTIONS Bruce Potter Founder of Ponte Technologies Focus on advanced defensive technologies Founder of The Shmoo Group We run ShmooCon as well as other events Co-author of several books and other stuff Security Mastering FreeBSD and OpenBSD Security Mac OS X Security Don t believe anything you hear in Vegas It s mostly made up for publicity, either personal or corporate We re not formally trained we shoot from the hip
3 FIRST, A PLUG No, I don t get paid for this We ll be talking a lot about data representation and visualization This is not something to be entered into lightly there s a lot of science and theory behind data visualization Unfortunately it s hard to bring analysis and visualization concepts to the lay person in a reasonable amount of time
4 EDWARD TUFTE Probably best know for his slagging on PPT Created the Gettysburg Address as a PPT amusing Published a series of books on data representation and visualization Visual Explanations Envisioning Information The Visual Display of Quantitative Information Beautiful Evidence Teaches 1 day classes around the country on data representation and visualization. Again, I m not paid for any of this, but I seriously recommend you go if you can It s darn near a religious experience for some
5 LET S HAVE SOME STRUCTURE TO OUR DISCUSSION Academic / Engineering IT Security Operations Software Network IT Operations Honeypots IDS, IR & Flow Analysis Software Security & Software ACL s Firewalls & AAA Services Patch management, procedures, policy Sophistication and Operational Cost
6 WHAT IS NETWORK ANALYSIS? Quite simply, looking at evidence on or from the network in order to determine information regarding any of the following: Security Availability Performance Capabilty Integrity really, any of the ilities (yes, performance is an ility )
7 MEANS FOR EXECUTING NETWORK ANALYSIS Basically, analysis involves Collecting and storing data Distilling and stirring the data around Analyzing the results Lots of ways to get evidence from the network SNMP data from routers and switches Raw packet captures Auditing information from existing network infrastructure (IDS, Firewalls, VPN gateways Network Flows Each has various advantages and disadvantages Many existing products However, doing analysis with these products takes work and do you really have time to do analysis or should you be configuring your firewall and fighting other fires in your network?
8 A VIEW OF CURRENT THREAT SPACE Highly Targeted Insider Threat Skilled, Motivated Org Crime, Nation State General Purpose Worms, virus, kiddies... Written Off Or at least basically ignored. Very difficult with today s technology. Solved Problem AV, AS, IDS, Firewalls. These tools are highly automated and geared towards compliance.
9 A VIEW OF CURRENT THREAT SPACE Highly Targeted Insider Threat Skilled, Motivated Org Crime, Nation State General Purpose Worms, virus, kiddies... Written Off Or at least basically ignored. Very difficult with today s technology.??? Requires some manual work as well as a different set of tools than is currently available. Solved Problem AV, AS, IDS, Firewalls. These tools are highly automated and geared towards compliance. Need to make analysts more effective Collect, distill, and analyze the data. Not complicated, and lots of prior art. However for the public security product space, it might as well be rocket science
10 TYPES OF SECURITY ANALYSIS TO BE PERFORMED - DEPTH FIRST VS. BREADTH FIRST Depth first Depth first security analysis is what forensic analysts usually do This type of analysis makes sense when you already know what you re looking for or where you re going to find it Unfortunately it s also the type of analysis that many ad hoc security analysts end up doing Tools like grep and normal shell scripting foo lead to this type of analysis Breadth first Much more useful when you don t know what you re looking for or where to look The reality for most enterprises Requires more specialized tools to help distill the data first
11 WHAT DO THESE GRAPHS HAVE IN COMMON?
12 TYPES OF SECURITY ANALYSIS TIME DOMAIN VS. FREQUENCY DOMAIN Time Domain analysis is common with most enterprise management tools. Most operators care about what s going on minute to minute and how that compares what happened a minute/hour/day/week ago OSS tools like MRTG have made a lot of ppl very happy over the years. Unfortunately tools like MRTG have created blinders on most operators who end up believing time series analysis is THE ONLY analysis
13 LIMITATIONS OF TIME DOMAIN ANALYSIS There are others aspects of the data that get lost in the process of rolling everything together to make a pretty graph that varies over time Per host, who is sending the most data outbound? Who is pulling in the most data? Per host, who is talking to the most DSL hosts? The most Asia-Pacific hosts? How many hosts are speaking more than 3 protocols? 4? 5? 100? Time domain analysis won t tell you any of these answers MRTG and the other tools are NOT geared up towards this.
14 WHAT IS THIS GRAPH? Could be anything. Size of s? Traffic sent per host? Number of hosts spoken to per host? Documents printed per day?
15 WHAT IS THIS GRAPH? Probably OK data Could be anything. Size of s? Traffic sent per host? Number of hosts spoken to per host? Documents printed per day?
16 WHAT IS THIS GRAPH? Might not be OK data Need to have a closer look. Could be anything. Size of s? Traffic sent per host? Number of hosts spoken to per host? Documents printed per day?
17 WHAT IS A FLOW? Data regarding a unidirectional flow of information through a network Nothing more complicated than that
18 REASONS TO CARE ABOUT NETWORK FLOWS Great visibility into a network without a ton of processor power required on the collection and analysis hosts More detail than SNMP Less complicated than full packet dumps Relatively cheap for the routers to export Your network infrastructure is already inline and sees all your data Netflow records take up little bandwidth Advanced statistical analysis can undercover policy violations, bot nets, malware, etc.. Come to my BlackHat USA 2008 talk to learn more
19 FREQUENCY DOMAIN ANALYSIS Looking at how often an event occurred per a given metric (per host, per subnet, per protocol, etc) rather than when an event occurred in relation to other events Not a complicated concept However, it is a concept geared more toward analysts rather than operators. Few tools available today are focused on analyzing data; rather the tools are designed to fix a current problem and move on.
20 OTHER TYPES OF ANALYSIS Things can get really complicated beyond these basics Correlation within a dataset how often was traffic with >2 ratio of outbound traffic going to Asia on weekends Correlation across multiple datasets How often is a small HTTP outbound connection followed by a login from the domain controller These types of analysis get computationally expensive But certainly not impossible. Q1Labs Qradar product does a good job of correlating data as it s coming in. NetWitness does an amazing job at it, but it s really a huge product to bring in house.
21 WHAT IS A FLOW? Data regarding a unidirectional flow of information through a network Nothing more complicated than that
22 EXAMPLE Flow1: src:a:36812, dst: B:80, Host A TCP Port 80 SYN Host B
23 EXAMPLE Flow1: src:a:36812, dst: B:80 Flow2: src:b:80, dst:a:36812 Host A ACK TCP Port 80 SYN Host B
24 EXAMPLE Flow1: src:a:36812, dst: B:80 (updated) Flow2: src:b:80, dst:a:36812 (updated) Host A Data Data Host B
25 EXAMPLE Sensor Flow1: src:a:36812, dst: B:80 (final) Flow2: src:b:80, dst:a:36812 (final) Collector Database
26 EXAMPLE Analyst workstation Sensor NOTE: The analysis capability may be on another host Collector / analyzer Database
27 WHEN IS A FLOW RECORD GENERATED? Four different situations cause a flow record to be generated (general rules of thumb here, NOT set in stone!) A flow terminates normally Ie: a TCP session has a packet with the FIN bit set Only works for session based protocols The monitoring device does not see a packet in MAXIDLE time Basically, if some period of time goes by (think 1-2 minutes) where no packets are seen, the router will free up memory by flushing the flow and presuming it dead This is usually a tunable option. Low values may give false positives but keep the memory footprint small. High values give better data but can make for HUGE mem requirements
28 WHEN IS A FLOW RECORD GENERATED? Full Cache The router is getting pushed too hard The monitoring device sees active data for more than MAXACTIVE time There are times when a session might run for a LONG time. Rather than get one flow record for it at the very end that throws everything off, a flow will be expired. This does NOT mean a router closes the session just the accounting information gets flushed Again, this is usually tunable. Think 5-30 minutes It should be noted that because of these types of issues, netflow data does not make good realtime bandwidth monitoring feeds. Huge FTP downloads, with a 30 min MAXACTIVE timer will show huge spikes in bandwidth use, sometimes dramatically exceeding the maximum available real bandwidth Use SNMP traffic data instead much more accurate
29 DOING REAL TIME TRAFFIC ANALYSIS If you do want to use NetFlow to monitor bandwidth, then you ll have to futz with the timers Terminating flow accounting on a flow that s reached MAXACTIVE does not mean the flow is done Your collector should be able to put the pieces back together Either based on heuristics or on TCP flags (if it s TCP based) Example Set the active timer on your router to 1 minute Certainly, this prematurely terminate the accounting record and generate multiple flows Your collector may have MAXACTIVE set to 6 hours. Many few flows will be terminated incorrectly and most flows will be reconstructed by the collection engine This gives you 1 minute resolution on traffic Not good enough? Do port monitoring on your switches and graph that
30 HARDWARE IMPLICATIONS Check the router to see what it s got left in the CPU and memory buckets rtr#show proc cpu CPU utilization for five seconds: 37%/35%; one minute: 42%; five minutes: 41% PID Runtime(ms) Invoked usecs 5Sec 1Min 5Min TTY Process % 0.00% 0.00% 0 Load Meter % 0.05% 0.06% 0 OSPF Hello % 0.58% 0.68% 0 Check heaps % 0.00% 0.00% 0 Pool Manager % 0.00% 0.00% 0 Timers % 0.00% 0.00% 0 ARP Input Etc... router>show processes memory Total: , Used: , Free: PID TTY Allocated Freed Holding Getbufs Retbufs Process *Init* *Sched* *Dead* Load Meter CEF Scanner Check heaps Etc
31 BUILDING YOUR OWN? You ll need a box or two You want reliable boxes. It should be noted that these boxes will be inline with your network. So they should be as reliable as an ethernet cable Needs to be able to handle the flow generation software without much hassle Not really too hard. You can easily push wirespeed 100Mb/ s on a 1GHz processor with an Linux distro. Need a fair bit of memory (1GB should do fine, might get away with 512MB). Disk is not an issue because the sensor won t be storing the data Buy fail open (fail closed?) Ethernet cards that will turn into a cable upon crash or power failure. Not cheap like $200-$500 each
32 SOFTFLOWD There are a variety of NetFlow sensors available in the OSS world I m partial to Softflowd Stable, good licence Easy to configure Runs quickly and easily on Linux and FreeBSD (w00t! Go FreeBSD!) The basic idea is that you create a bridge group of two ethernet interfaces This is allows you to drop a softflow box inline without modifying any of your IP/subnet architecture Then bind softflowd to the bridge group and tell it where to export the flows That s it
33 CISCO ROUTER # Assume that fe 0/1 is the inbound from the Interenet and fe0/2 is the LAN facing interface router(config)#interface FastEthernet 0/1 router(config-if)#ip route-cache flow router(config-if)#exit #since by default this is only for inbound, repeat for the other interface router(config)#interface FastEthernet 0/2 router(config-if)#ip route-cache flow router(config-if)#exit
34 CISCO ROUTER #configure the netflow collector IP and port router(config)#ip flow-export destination #by default, the flows will be sourced from lo0.. change if needed router(config)#ip flow-export source FastEthernet 0/1 router(config)#ip flow-export version 5 #super aggressive timeout for active to keep data flowing into the collector (mins) router(config)#ip flow-cache timeout active 1 #also aggressive (seconds) router(config)#ip flow-cache timeout inactive 15
35 CHECKING UP show ip cache flow IP packet size distribution ( total packets):
36 CHECKING UP IP Flow Switching Cache, bytes 5088 active, inactive, added ager polls, 0 flow alloc failures Active flows timeout in 30 minutes Inactive flows timeout in 15 seconds last clearing of statistics never Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec) Flows /Sec /Flow /Pkt /Sec /Flow /Flow TCP-Telnet TCP-FTP TCP-FTPD TCP-WWW TCP-SMTP TCP-X TCP-BGP TCP-NNTP TCP-Frag TCP-other UDP-DNS UDP-NTP UDP-TFTP UDP-Frag UDP-other ICMP IGMP IP-other Total:
37 CHECKING UP SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts Hs9/1/0 Hs9/1/ Null Null A F K 281K Hs9/1/0 Hs9/1/ Null Null EA K 11 08EC K Hs9/1/0 Hs9/1/ Null Null K F K Hs9/1/ Null K Hs9/1/ Null K Hs9/1/ Null K Hs9/1/ Null F K Hs9/1/0 Hs9/1/ Null Null F K C K Hs9/1/0 Hs9/1/ Null Null C K 171K Hs9/1/ Null C K etc...
38 WHAT EXACTLY ARE YOU LOOKING FOR? As much fun as it is to just dig through the data, you tend to have a purpose for looking through it The purpose of your analysis will drive the mans of your analysis Bots / malware Data exfiltration Policy violations Performance / utilization
39 FINDING BOTS Look for traffic on standard bot/malware ports TCP/UDP , 6667 (IRC) Hard to find port 80 bots, but not impossible Look for large # of connections with little bandwidth used Examine destination address might want to look for data going to places you don t trust
40 DATA EXFILTRATION Heavy outbound vs inbound data 2:1 is a pretty good ratio to weed out the noise In many non-academic environments, that s sufficient May need to rule out mail hosts and VPN gateways They tend to be big outbound talkers Ex: 2000 hosts, might see 20 flows a day that hit this ratio
41 POLICY VIOLATIONS Known bad patterns Hard to track P2P/VOIP traffic Best to look for lots of src ports talking to lots of dst ports Have to get a good eye for what s in your policy and how it manifests itself in your traffic Top talkers GB of data a day, ever day starts to seem fishy Where are your sensors? If it s just on the WAN links, you ll miss internal violations be sure you know where your data is coming from
42 PERFORMANCE / UTILIZATION Check out low speed links and inter-router connections Obviously, look for pipes near capacity Get an understanding of the types of data on the links and monitor the different types over time Top talkers Figure out who and why High packet count / low packet sizes can indicate latency sensitive protocols Talk to users about their experiences
43 BUILDING A COLLECTION AND ANALYSIS HOST Analysis of flows can be very intensive Data tends to get stirred on the way in, and that takes CPU and disk The queries by the user can get pretty whacky, and that takes CPU, disk, AND memory As a point of reference, a 2000 host organization will generate about 10M flows in a day. That s about 5k flows per host/day. A decent rule of thumb ShmooCon had about 2M flows in a day and a half on about 150 machines
44 SCOPING A COLLECTION MACHINE You can do it on the sorta cheap if you want Box 1 - Quad core, 3GB RAM, 500GB disk. $750 Box 2 - Quad core, 2 GB RAM, 400GB disk. $550 Extras - 3GB RAM($60), 2x500GB disk for RAID0 ($240) $1500 == 2 super computers under my desk
45 INSTALLING PSYCHE Pretty easy. Download from and follow the directions DB == postgres. It s different than MySQL, but doesn t have the strange license issues. Primary testing is done against softflowd, but should work with any sensor
46
47
48
49
50 PARTING THOUGHTS We re really just scratching the surface here There are more tools, more views, more data to look at For more tools, take a look at Really, all of these tools have the most relevance on your own network You won t believe the number of ah-ha moments you ll have using NetFlow tools You really don t need a huge box to use the RRDbased tools Take a spare system off the rack and fire up NFSen. Shouldn t take more than an afternoon to configure
51 CONTACT INFO Bruce Potter
Lab 4.1.2 Characterizing Network Applications
Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
TEIN2 Measurement and Monitoring Workshop Netflow. [email protected]
TEIN2 Measurement and Monitoring Workshop Netflow [email protected] Passive Measurements - Netflow Netflow Setting up Netflow on a router Using Netflow Establishing exports Configuring a collector
Fluke Networks NetFlow Tracker
Fluke Networks NetFlow Tracker Quick Install Guide for Product Evaluations Pre-installation and Installation Tasks Minimum System Requirements The type of system required to run NetFlow Tracker depends
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Last Updated: November 28, 2011 This module contains the minimum amount of information about and instructions necessary for configuring
Net-flow. PacNOG 6 Nadi, Fiji
Net-flow PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools etc
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Netflow For Incident Detection 1
Netflow For Incident Detection 1 Michael Scheck / Cisco CSIRT [email protected] Introduction Netflow is often deployed for network billing, auditing, and accounting. However, Netflow can also be for incident
How-To Configure NetFlow v5 & v9 on Cisco Routers
How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Enabling and Monitoring NetFlow on Subinterfaces
Enabling and Monitoring NetFlow on Subinterfaces This module contains instructions for enabling and monitoring NetFlow on a router subinterface or a Versatile Interface Processor (VIP) controller interface.
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html
CHAPTER 54 Supervisor Engine 6-E and Catalyst 4900M chassis do not support Netflow; it is only supported on Supervisor Engine IV, Supervisor Engine V, Supervisor Engine V-10GE, or WS-F4531. This chapter
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Flow-tools Tutorial. SANOG 6 Bhutan
Flow-tools Tutorial SANOG 6 Bhutan Agenda Network flows Cisco / Juniper implementation NetFlow Cisco / Juniper Configuration flow-tools programs overview and examples from Abilene and Ohio- Gigapop Network
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Network Traffic Analyzer
Network Traffic Analyzer Configuring NetFlow or sflow on Network Devices Revision 1.2.9 - (11-03-2015)!1 Introduction This document explains how to configure network devices such as Switches to send NetFlow
HTGR- Netflow. or, how to know what your network really did without going broke
HTGR- Netflow or, how to know what your network really did without going broke Michael W. Lucas [email protected] GKN Driveline North America, Inc. Copyright 2007 Michael W. Lucas slide 1 What
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Network Operations and Network Management
Network Operations and Network Management By Aftab A. Siddiqui [email protected] Overview Network Management Network Operations Centre Network Monitoring Systems and Tools Network Management Protocol
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
Microsoft Network Load Balancing and Cisco Catalyst Configuration
Microsoft Network Load Balancing and Cisco Catalyst Configuration OVERVIEW... 2 UNICAST MODE... 2 MULTICAST MODE... 3 ANALYSIS... 4 CPU UTILIZATION... 4 CAPTURE PACKETS... 5 MICROSOFT READING... 6 MULTICAST
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Netflow, Flow-tools tutorial
Netflow, Flow-tools tutorial Gaurab Raj Upadhaya Agenda Agenda bashing Do you want to see the labs, or want to discuss issues Netflow What it is and how it works Uses and Applications Vendor Configurations/
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Does reality matter?: QoS & ISPs
Does reality matter?: QoS & ISPs Scott Bradner Harvard University s&rbn - 1 In the Beginning in the beginning (and now) there was (is) philosophy or is that religion? smart network vs. smart edges centralized
Configuring NetFlow and NetFlow Data Export
This module contains information about and instructions for configuring NetFlow to capture and export network traffic data. NetFlow capture and export are performed independently on each internetworking
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Overview of Network Traffic Analysis
Overview of Network Traffic Analysis Network Traffic Analysis identifies which users or applications are generating traffic on your network and how much network bandwidth they are consuming. For example,
Netflow, Flow-tools tutorial
Netflow, Flow-tools tutorial Gaurab Raj Upadhaya Agenda Agenda bashing Do you want to see the labs, or want to discuss issues Netflow What it is and how it works Uses and Applications Vendor Configurations/
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
isco Troubleshooting Input Queue Drops and Output Queue D
isco Troubleshooting Input Queue Drops and Output Queue D Table of Contents Troubleshooting Input Queue Drops and Output Queue Drops..1 Interactive: This document offers customized analysis of your Cisco
OBJECTIVES This paper examines how NetFlow is implemented on logical interfaces. Logical interfaces can be divided into two groups:
Configuration Guide NetFlow on Logical Interfaces: Frame Relay, Asynchronous Transfer Mode, Inter-Switch Link, 802.1q, Multilink Point to Point Protocol, General Routing Encapsulation, Layer 2 Tunneling
plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels
Scrutinizer Competitor Worksheet Scrutinizer Malware Incident Response Scrutinizer is a massively scalable, distributed flow collection system that provides a single interface for all traffic related to
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM
LISA 10 Speaking Proposal Category: Practice and Experience Reports Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM Proposed by/speaker: Wyman Stocks Information Security
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
NetFlow The De Facto Standard for Traffic Analytics
NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
[Optional] Network Visibility with NetFlow
[Optional] Network Visibility with NetFlow TELE301 Laboratory Manual Contents 1 NetFlow Architecture........................... 1 2 NetFlow Versions.............................. 2 3 Requirements Analysis...........................
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Resolving H202 Errors (INTERNAL)
Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks
IP Accounting C H A P T E R
C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter
Load Balance Router R258V
Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor
Contents CHAPTER 1 WhatsUp Flow Monitor Overview What is Flow Monitor?... 1 How does Flow Monitor work?... 2 Supported versions... 2 System requirements... 2 CHAPTER 2 Configuring WhatsUp Flow Monitor
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Firewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
HOST AUTO CONFIGURATION (BOOTP, DHCP)
Announcements HOST AUTO CONFIGURATION (BOOTP, DHCP) I. HW5 online today, due in week! Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 I. Auto configuration
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
out of this world guide to: POWERFUL DEDICATED SERVERS
out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
I cannot find the answer to my problem in the manuals, what do I need to do?
General Questions: What is SeeNet? SeeNet is a near "real-time" network and Windows-based system (Windows 2000, Windows 2003, Windows XP Professional, and workstations) performance monitor and analysis
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
