Detecting Embedded Devices using Network Discovery
|
|
|
- Arron Nigel Webb
- 10 years ago
- Views:
Transcription
1 International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: , Volume-2, Issue-5, April 2014 Detecting Embedded Devices using Network Discovery Rajula Aravinda Reddy, J C Narayana Swamy, R Govardhana Reddy Abstract Modern heterogeneous networks present a great challenge for network operators and engineers from a management and configuration perspective. The Network Discovery System is a network management framework that addresses these challenges. NDS offers centralized network configuration management functionality, along with providing options for extending the framework with additional features. The devices managed by NDS are stored in its Configuration Database (CDB). However, currently there is no mechanism for automatically adding network devices to the configuration of NDS, thus each device s management parameters have to be entered manually. The goal of this paper is to develop a software module for NDS that simplifies the process of initial NDS configuration by allowing NDS to automatically add network devices to the ND CDB Apart from developing the software module for discovery, this paper aims to summarize existing methods and to develop new methods for automated discovery of network devices with the main focus on differentiating between different types of devices. A credential-based device discovery method was developed and utilized to make advantage of known credentials to access devices, which allows for more precise discovery compared to some other existing methods. The selected methods were implemented as a component of NDS to provide device discovery functionality. Python language is used as tool to develop code. Index Terms Discovery Protocols, Embedded Device Discovery, Embedded Device Configuration, Network Discovery System, Network Management. I. INTRODUCTION Network management became a non-trivial task, as networks grew and incorporated different types of devices. Manual network management of large scale networks is unfeasible due to the need for engineers specialized in different aspects and types of network devices and their management, limited time, need to define a strategy for configuration management, and the effort to track the configuration state of large number of different devices. These factors obviously increase the costs and effort required for network management. To overcome these difficulties Network Discovery system (NDS) were developed. An NDS is a tool for network operators and engineers. Such a tool enables centralized configuration management of many different network devices, consolidates the storage of device configuration and state information, pushes and pulls the configuration changes to and from the devices. Manuscript received April, Rajula Aravinda Reddy, M.tech in VLSI Design and Embedded Systems, Bangalore Institute of Technology, Bengaluru, Karnataka, India. J C Narayana Swamy, Associate Professor, Department of Electronics and Communication Engineering, Bangalore Institute of Technology, Bengaluru, Karnataka, India. R Govardhana Reddy, Senior Technical Lead, Communication Business unit, TATA-Elxsi, Bengaluru, Karnataka, India Additionally, an NMS may provide visualizations of the network topology and state, provide an alert system with notifications, and automate network service deployment. However, designing and developing such a system is a non-trivial task. The reasons for this are the presence of different vendors in the network equipment market, the existence of different configuration interfaces to these network devices, and the lack of a single generic interface for configuration management. Designing and developing such interfaces for every possible device type becomes impractical due to both the number of different devices and the evolution of their interfaces. A possible solution is to define a model for the device configuration structure which serves as a structured representation of the device configuration and a protocol which provides an interface to access this model and to perform configuration changes. The rest of the paper is originated as follows: section II discusses relevant background and summarizes the results of our literature study; section III describes the implementation of the network device discovery component; and section IV concludes the thesis project, discusses the goals which have been reached, suggests future work, and describes the ethical considerations related to this project. II. BACKGROUND OF NETWORK DISCOVERY Several topics covered in our literature study are discussed in this chapter. Protocols, as these are essential to understand any work in the area of network management. As one of the goals of this thesis project is to develop a device discovery component for NDS A. Network Management Protocols Network Management Protocols define a means to access the configuration data of a managed device, as well as a means to change this data. This section will focus on the protocols which are essential in the context of working with NDS, namely: ICMP, SNMP, NetBIOS, and TCP, Full These methods actively scan predefined networks and probe IP addresses. 1) ICMP The Internet Control Message Protocol (ICMP) is one of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and trace route). This method detects active hosts on a network by sending ICMP echo request packets and listening for ICMP echo responses. The ICMP discovery is a simple and fast 27
2 Detecting Embedded Devices using Network Discovery discovery that detects whether an IP address exists or not. It returns only the IP address and MAC address of a detected host. The ICMP packet format is shown in below figure Figure 1:- ICMP packet Format 2) SNMP SNMP is a protocol for network management developed in late 1980s. The standard describes a protocol for exchanging management data between a management station and a managed device, the structure of a MIB, and a simple network management system architecture. a) Understanding of SNMP You can use SNMP (Simple Network Management Protocol) to manage network devices and monitor their processes. An SNMP-managed device, such as a NIOS appliance, has an SNMP agent that collects data and stores them as objects in MIBs (Management Information Bases). The SNMP agent can also send traps (or notifications) to alert you when certain events occur within the appliance or on the network. You can view data in the SNMP MIBs and receive SNMP traps on a management system running an SNMP management application, such as HP OpenView, IBM Tivoli NetView, or any of the freely available or commercial SNMP management applications on the Internet. Figure 2: - SNMP Overview b) About SNMPv1 & SNMPv2 SNMPv1 is the initial implementation of SNMP. It operates over protocols such as UDP (User Datagram Protocol) and IP (Internet Protocol). SNMPv2 includes improvements in performance and security. It adds new protocol operations such as GetBulk and Inform, which allow the management system to request larger blocks of data from the agent. Both SNMPv1 and SNMPv2 use common strings that are sent in clear text to authenticate clients. The NIOS appliance supports SNMPv1 and SNMPv2 in which the SNMPv2 agent acts as a proxy agent for the SNMPv1 management systems. When a SNMPv1 management system sends a query to the appliance, the SNMPv2 proxy agent forwards the request to the SNMPv1 agent. The proxy agent maps the SNMPv1 trap messages to the SNMPv2 trap messages, and then forward the messages to the management system. 3) NetBIOS NetBIOS (Network Basic Input/output System) is a program that allows applications on different computers to communicate within a local area network (LAN). It was created by IBM for its early PC Network, was adopted by Microsoft, and has since become a defacto industry standard. NetBIOS is used in Ethernet and Token Ring networks and, included as part of NetBIOS Extended User Interface (NetBEUI), in recent Microsoft Windows operating systems. It does not in itself support a routing mechanism so applications communicating on a wide area network (WAN) must use another "transport mechanism" (such as Transmission Control Protocol) rather than or in addition to NetBIOS The NetBIOS method queries IP addresses for an existing NetBIOS service. This method detects active hosts by sending NetBIOS queries and listening for NetBIOS replies. It is a fast discovery that focuses on Microsoft hosts or non-microsoft hosts that run NetBIOS services. This method returns the following information for each detected host such as IP address, MAC address, OS, and NetBIOS name (A NetBIOS name is a 16-byte address that is used to identify a NetBIOS resource on the network) 4) TCP The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP). TCP provides reliable, ordered and error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. In this discovery it return the IP address, MAC address, and OS TCP is known as a connection-oriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP is responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets back into the complete message at the other end. In the Open Systems Interconnection (OSI) communication model, TCP is in layer 4, the Transport Layer. 5) Full The full discovery method is a combination of an ICMP discovery, a NetBIOS discovery, a TCP discovery, and a UDP scan. This method starts by sending an ICMP echo request. If no IP address on the network responds to the ICMP request, the discovery ends. If there is at least one response to the ICMP echo request, a NetBIOS discovery starts. A TCP discovery then follows by skipping through the active hosts that the NetBIOS discovery detects. The TCP discovery also handles the NetBIOS-detected hosts that have no MAC addresses. This method also performs a UDP scan to determine which UDP ports are open. The full discovery method returns the following information for each detected host: IP address MAC address OS NetBIOS name The following is a summary of the supported IP discovery methods: 28
3 International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: , Volume-2, Issue-5, April 2014 chapter will describe the requirements defined for the device discovery module and the process of developing this module. Figure 3:- Table for Different Discovery Protocols B. Overview of Network Discovery The appliance provides discovery tools for detecting active hosts on predefined networks and on specified servers. You can use the discovery feature to obtain and manage information about your network hosts. Depending on which discovery method you use, the appliance returns information, such as IP addresses, MAC addresses, and operating systems, about the detected hosts and virtual entities Figure 4: - Overview of Discovery Process NDS is comprised of three major parts: the service manager, the device manager, and the Configuration Database (CDB). Figure 3 provides a representation of NDS overview. The device manager functions as an interface to managed devices. It provides a means to add a new device to the CDB (a device may be added manually from a device template or from an existing device configuration); to deploy configuration changes to managed devices in a fail-safe way, so that the changes can be applied simultaneously to any number of devices; to perform a configuration rollback and to synchronize the NDS running the CDB with the actual configuration of the managed devices, which works in two ways (both to and from the devices). III. NETWORK DEVICE DISCOVERY IMPLEMENTATION The first task for this master s thesis project was to develop a module for NCS which performs network device discovery. The module should be able to identify which devices in the specified address space are alive and be able to provide some information about the device, such as device vendor, device model, and OS running on the device. This A. Network Device Discovery Module Description An important part of the requirements for the module was to focus on the devices that can be managed by NDS, as opposed to finding all devices that are online. Also, as the module is a legitimate search tool, it was assumed that network security systems are properly configured to allow the operation of this tool, therefore the solution proposed should not contain any techniques of firewall, or other network security systems bypass. Since the discovery process is assumed to be run by the network administrator or in coordination with the network administrator, it is also assumed that the user of the network device discovery module knows the credentials to access the legitimate devices. B. Data Model Description The data model of the network device discovery component augments the NDS data model and adds a module that defines a set of actions with associated input and output parameters as well as a structure for storing the data collected when a specific action is executed. An action, in this context, is an interface to call and execute specific code defined for that action. The input parameter for the discovery launch actions is a definition of the discovery target, which may be a single IP address (e.g ) an IP subnet specification (e.g /28). The output parameter for these actions is a status line which indicates if the run was successful or if there were any errors. During the discovery process reports the discovery status, such as Completed, Running, Paused, Stopped, or Error. The output parameter for each of the actions is a status line which is used to inform the user as to whether the operation was successful or some error occurred. C. Implementation based on NetMRI The first version of the network device discovery module was essentially a wrapper for NetMRI. This module operates as follows: receive the input parameters, execute NetMRI with predefined flags and the specified target, wait for NetMRI to finish, parse the results of the NetMRI scan, and store the results in the NetMRI database according to the model. The output generated by the module contains informational messages, such as the number of devices found and the success or failure of the execution. The execution is considered successful when there are no errors while running NetMRI and no errors while processing the results or loading them into the database, even if no devices are found in the specified address space. After NetMRI finishes the scan, the device discovery module processes the XML file produced by NetMRI and fetches the scan results. These results are then stored in memory for further processing. For this purpose a Device class was defined which consists of a set of properties describing a network device found during the device discovery process. Additionally, this class contains methods for storing and loading the information about the device into the NDS database according to the defined data model. 29
4 Detecting Embedded Devices using Network Discovery When the list of discovered devices is fetched, the latest-run sub-tree of the data model is replaced with the new list of discovered devices. The information is stored as operational data, which means that it will be reset when NDS is restarted. This information is displayed to the user and can be further processed by another application 1) Description of NetMRI As networks become larger and more dynamic, the need for detailed, up-to-date network device information becomes more critical. Many organizations are hindered by manual documentation and the lack of detail provided with simple ping sweeps. The NetMRI Discovery Module automates normal manual tasks and provides detailed views lacking in other tools. The NetMRI Discovery Module also ensures you have the most current information with continuous discovery, monitoring and updating. In addition, NetMRI automatically identifies critical network information and components such as VLANs, ports, device properties, OS versions, topology, layer 3 subnets and routes. The days of out-of-date spreadsheets are over with NetMRI D. Device Discovery Engine The device discovery engine is implemented in Python as a separate action within the network device discovery module. It provides discovery of network devices and provides information about the device (make, model, and OS the device is running) in a way that is more efficient, more precise, and better satisfies the requirements of NDS than a NetMRI based solution. 1) General Logic Device Discovery Engine The general logic of this engine is the following. First, the input parameter, which is a target specification, is processed by the Parser object, which forms a list of Device objects with only the IP address or addresses selected. Then a Scanner object is created for each of the devices in a separate thread. This Scanner object performs the scanning process, i.e. applies the scanning techniques to the defined IP address(es). If a device is discovered to be offline, it is removed from the list of devices, otherwise the Scanner populates the data fields in a Device object with all the information that it is able to discover about the device. Lastly, the list of discovered devices is stored in the NCS database as operational data for further processing a) IP Discovery Process When an IP discovery starts, the appliance divides the IP addresses in a network into chunks, with each chunk containing 64 contiguous IP addresses. The discovery process probes each IP address in parallel and in ascending order, reports the detected information, updates the progress report, and then moves on to the next chunk until it hits the last chunk of IP addresses. The appliance then updates the database with the discovered data. An IP discovery scans the selected networks in the order the networks appear in the Discover Manager wizard Figure 5: - IP Discovery Process b) TCP Port Scanning The Scanner object takes a Device as an input. The Scanner has a set of predefined TCP ports to scan. Some of the TCP ports are assumed to run specific services, for example the Scanner expects SSH to be on port 22 and HTTP on port 80. Initially the Scanner performs a port scan iterating through the set of expected TCP ports. To scan a TCP port the Scanner tries to initiate a connection using a socket whose remote endpoint is defined by the Device s IP address and the port to be scanned c) SNMP Scanning In contrast to TCP port scanning, UDP port scanning is different due to the connectionless nature of the UDP protocol. However, in the context of our NDS discovery module we are most interested in only one UDP based protocol, namely SNMP (as NCS can manage SNMP enabled devices when certain conditions are met). For the purposes of the device discovery module, we are particularly interested in obtaining the system description string, which is available in MIB-II and is usually present in most devices that are SNMP enabled. d) Sorting Device Type and Description After the scanning is completed and a list of Device objects (which contains devices that were discovered along with their associated information which the Scanner was able to retrieve) is created, then the type, description, and vendor of the device are determined. This information is extracted from the data that was discovered during port scanning. Each port information field in a Device object is processed and matched to a regular expression set that matches expected SSH Communicator module output as well as some of the well-known SNMP system description formats; in this way the hardware platform and the OS information are obtained and stored in the respective fields of the object. Once these fields are set, the device type is determined. Determining the device type and setting appropriate management port and management protocol are essential requirements for a device to be successfully stored in the NDS CDB, as well as to enable the NDS to be able to subsequently manage that device. E. Loading Devices into NDS The pick action implements the functionality of fetching the full set of information related to a discovered device 30
5 International Journal of Innovative Science and Modern Engineering (IJISME) ISSN: , Volume-2, Issue-5, April 2014 from the operational data and storing the device into the NDS configuration database. Once a device is stored in the CDB as a managed device, NDS can connect to the device and manage it. The pick action is defined within the device list structure of the discovery component data model. Thus, the action is bound to a specific device in the list of discovered devices. Calling the action from the context of a device allows us to offer an NDS operator the option to provide additional parameters when they select a device, such as assigning a new name or authentication group F. Results and Analysis The outcome of the device discovery component design and implementation is an optional package for NDS. This package provides automated network discovery functionality and the possibility to add newly discovered devices to the NDS CDB. The package s functionality minimizes the effort of the network operator when adding a device by automatically loading the set of parameters that were obtained during the discovery process (device type, management port, management protocol, etc.). The device discovery module implementation utilizes NetMRI based device discovery module approach The NetMRI based implementation uses the following techniques to identify the type of the scanned device: Port scanning; Service probing and banner grabbing; and OS fingerprinting. A significant condition of the NetMRI based module is the need for an extended license for NetMRI usage, as the default NetMRI license does not allow using any of the NetMRI source code nor executing NetMRI and parsing the results in a non-general Public License (GPL) product. IV. CONCLUSIONS AND FUTURE WORK This chapter concludes the project. The following sections give a general summary of the work; discuss the initial goals that were defined for the project and compare them with the outcome of this work. The chapter also discusses some ethical aspects related to this project, and the future work that could built upon the results of this project. A. Project summary and Results The result of this project is two optional NDS packages that provide network device discovery and network topology discovery functionality. This result reflects the goals originally defined for this project. The device discovery package provides network device discovery of devices in the specified IP address range, while also determining the type (software and hardware platform) of the devices whenever possible and collecting all the additional parameters required to add the discovered device to NDS s managed devices tree. This package minimizes the effort required by an NDS operator by allowing the operator to automatically save the discovered device(s) into the NDS configuration database together with the relevant parameters and provides an option to add multiple devices with a single command. The device discovery package meets the requirements initially set for the package. The package includes both requested NetMRI based device discovery engine which utilizes a credential based approach to device discovery and is better suited for use by an NDS operator. The package s data model and the structure of the package meets the requirements for an NDS package. The following section describes the ethical considerations behind this work. The section also discusses the authors view of the intended use of software which was developed and the use of the material presented in this Project B. Ethical Considerations Network scanning is a highly debated topic from an ethical perspective and especially from a legal perspective. This project covers some aspects and methodologies used for network scanning and discovery, additionally the software developed during this project provides network scanning functionality. The content of this Project is intended to provide research based insight into network scanning and should be useful for other research, educational, or other legitimate purposes. The usage of components is controlled by NDS s access control and security mechanisms; the components themselves do not implement any additional usage restrictions. Thus, in multiuser NDS environments, the NDS administrator should configure suitable usage policies for these new components. The only security feature implemented for these new components is the encryption of the credentials stored in the configuration database and the valid credentials that worked on a specific device when stored into the operational database. Encrypting strings is a built-in feature of NDS, which is controlled by the NDS configuration. The NDS administrator can specify the encryption algorithm to be used and the associated parameters (encryption keys, initialization vectors, etc.). The NDS administrator is advised to select an appropriate encryption algorithm and associated parameters, while adhering to the general practice of securing access to the encryption keys. The following section describes some potential future work related to this project. It also discusses some possible future work in the area of network discovery from the perspective of this thesis project. C. Future Work The device and topology discovery packages provide the required discovery functionality - as this functionality was defined within the scope of this thesis project. However, these packages are still an experimental feature and do not provide the functionality which might be ultimately required. Future work should make these new discovery components more complete in order to provide a feature rich network discovery solution to NDS customers. REFERENCES [1] J. Case, R. Mundy, D. Partain, and B. Stewart, Introduction and Applicability Statements for Internet-Standard Management Framework, RFC 3410 (Informational), Internet Engineering Task Force, Dec [2] K. McCloghrie, D. Perkins, and J. Schoenwaelder, Structure of Management Information Version 2 (SMIv2), RFC 2578 (INTERNET STANDARD), Internet Engineering Task Force, Apr [3] R. Stadler, lectures notes for the course EP2300 Management of Networks and Networked Systems, KTH Royal Institute of Technology, Aug.-Oct. 2012, unpublished. [4] J. Yu and I. Al Ajarmeh, An Empirical Study of the NETCONF Protocol, in Sixth International Conference on Networking and 31
6 Detecting Embedded Devices using Network Discovery Services (ICNS), March [5] R. Enns, M. Bjorklund, J. Schoenwaelder, and A. Bierman, Network Configuration Protocol (NETCONF), RFC 6241 (Proposed Standard), Internet Engineering Task Force, Jun [6] J. Schönwälder, M. Björklund, and P. Shafer, Network configuration management using NETCONF and YANG, in IEEE Communications Magazine, vol. 48, no. 9, September [7] M. Wasserman, Using the NETCONF Protocol over Secure Shell (SSH), RFC 6242 (Proposed Standard), Internet Engineering Task Force, Jun [8] M. Badra, NETCONF over Transport Layer Security (TLS), RFC 5539 (Proposed Standard), Internet Engineering Task Force, May [9] T. Goddard, Using NETCONF over the Simple Object Access Protocol, RFC 4743 (Historic), Internet Engineering Task Force, Dec [10] E. Lear and K. Crozier, Using the NETCONF Protocol over the Blocks Extensible Exchange Protocol (BEEP), RFC 4744 (Historic), Internet Engineering Task Force, Dec [11] M. Bjorklund, YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF), RFC 6020 (Proposed Standard), Internet Engineering Task Force, Oct [12] J. Schönwälder and H. Langendörfer, How to Keep Track of Your Network Configuration, in Proceedings of the 7th USENIX conference on System administration (LISA 1993), [13] G.G. Richard, Service advertisement and discovery: enabling universal device cooperation, Internet Computing, IEEE, vol. 4, no. 5. [14] IEEE std , Standard for Local and Metropolitan Area Networks: Overview and Architecture, February [15] Luo Junhai, Fan Mingyu, and Ye Danxia, Research on Topology Discovery for IPv6 Networks, in Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007, SNPD th ACIS International Conference, vol. 3, [16] U. Blumenthal and B. Wijnen, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), RFC 3414 (INTERNET STANDARD), Internet Engineering Task Force, Dec. [17] S. Thomson, T. Narten, and T. Jinmei, IPv6 Stateless Address Autoconfiguration, RFC 4862 (Draft Standard), Internet Engineering Task Force, Sep
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Device Discover: A Component for Network Management System using Simple Network Management Protocol
Device Discover: A Component for Network Management System using Simple Network Management Protocol Garima Gupta, Daya Gupta Abstract Virtually all existing networked system management tools use a Manager/Agent
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
DISCOVERING DEVICES CONTENTS. using HP Web Jetadmin
DISCOVERING DEVICES using HP Web Jetadmin CONTENTS Overview... 3 New in HP Web Jetadmin discovery... 3 Part 1 How discovery works... 3 Discovery settings... 4 Network device discovery vs. PC-connected
Rapid Assessment Key v2 Technical Overview
Rapid Assessment Key v2 Technical Overview Overview The Rapid Assessment Key v2 is an extremely easy to use USB device that quickly collects data on networked imaging devices. The key allows office equipment
These options allow you to define baseline settings for how scanning will occur on your network
Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
An Overview of SNMP on the IMG
An Overview of SNMP on the IMG Description SNMP The SNMP provides a way to control and monitor a variety of equipment using one network management protocol. To do this, SNMP uses a number of common Management
SNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Visio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
MIB Explorer Feature Matrix
MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
Outline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Outline of the SNMP Framework Management Program
Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture
Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges
U.S. Air Force T&E Days 2010 2-4 February 2010, Nashville, Tennessee AIAA 2010-1744 Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges William Brock 1 and Doug Mace 2 Tactical
The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:
Using Discovery 1/3 Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
HP Insight Management Agents architecture for Windows servers
HP Insight Management Agents architecture for Windows servers Technology brief, 2 nd edition Introduction... 3 A first look at the Insight Management Agents architecture... 3 HP Insight Management agents...
Simple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative
Network Monitoring By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative Overview of network Logical network view Goals of Network Monitoring Determine overall health
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Pre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
SNMP Diagnostics. Albert Kagarmanov, Matthias Clausen (DESY)
SNMP Diagnostics Albert Kagarmanov, Matthias Clausen (DESY) Content: What is SNMP? SNMP device support and soft IOC EPICS-SNMP for workstations EPICS-SNMP for switches/routers Conclusion Archamps-2005
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
SNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Active Management Services
Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:
Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
Understanding Layer 2, 3, and 4 Protocols
2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Firewalls. Network Security. Firewalls Defined. Firewalls
Network Security Firewalls Firewalls Types of Firewalls Screening router firewalls Computer-based firewalls Firewall appliances Host firewalls (firewalls on clients and servers) Inspection Methods Firewall
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Interconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
New Products and New Features May, 2015
NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.
Brocade Product Training
Brocade Product Training Introducing SNMP Web-based Training Brocade Education Services Page 1-1 Objectives Describe SNMP basics: terminology and concepts Describe the need for SNMP Describe the advantages
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Version 4.1 June 2013. Xerox Device Agent (XDA) Lite Security and Evaluation Guide
Version 4.1 June 2013 Xerox Device Agent (XDA) Lite Security and Evaluation Guide 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design, WorkCentre, and Phaser are trademarks of Xerox
