1 Introduction to ntop
|
|
|
- Jacob Hardy
- 9 years ago
- Views:
Transcription
1 Introduction to ntop 1 Introduction to ntop Network management is becoming an increasingly complex task due to the variety of network types and the integration of different network media. As networks become larger, more complex, and more heterogeneous, the costs of network management rise. In this scenario, automated tools are needed to support human effort, gathering information about the status and behaviour of networked elements. According to [14], network monitoring is the most fundamental aspect of automated network management. This text provides information on the use of ntop by network managers or operators. ntop [3] is a simple, free and portable traffic measurement and monitoring tool, initially conceived by Luca Deri and Stefano Suin for tackling performance problems on the campus network of the University of Pisa, Italy. Similar to the Unix top tool that reports processes CPU usage, the authors needed a simple tool able to report the network top users (hence the term ntop) for quickly identifying those hosts that were currently using most of the available network resources. ntop then evolved into a more flexible and powerful tool [6], [8], [5]. The current version of ntop features command line and web-based user interfaces, and is available on both UNIX and Win32 platforms. It is currently developed using the concept of open source software [13]. ntop focuses on: traffic measurement, traffic monitoring, network optimization and planning, and detection of network security violations. This text is structured as follows: Section 2 presents the features mentioned above in further detail, Section 3 describes the installation procedures, Section 4 provides an example of the use of ntop, and Section 5 discusses alternative approaches to monitoring. 2 Functions This section presents in further detail ntop's main functions: traffic measurement, traffic monitoring, network optimization and planning, and detection of network security violations. 2.1 Traffic Measurement Traffic measurement consists in measuring the usage of relevant traffic activities. ntop tracks network usage, generating a series of statistics for each host in the local subnet and for the subnet as a whole. The needed information is collected by the host running ntop by simply observing the traffic on the network. This arrangement off-loads the processing requirements from operational nodes to the ntop host. All packets in the subnet are captured and associated with a sender/receiver pair. In this way, it is possible to track all traffic activities of a particular host. 1
2 Functions The following table shows the information registered by ntop for each host connected to the (broadcast) network: Data Sent / Received Used Bandwidth IP Multicast TCP Sessions History UDP Traffic TCP/UDP Used Services Traffic Distribution IP Traffic Distribution The total traffic (volume and packets) generated or received by the host. Classified according to network protocol (IP, IPX, AppleTalk, etc.) and IP protocol (FTP, HTTP, NFS, etc.) Actual, average and peak bandwidth usage. Total amount of multicast traffic generated or received by the host. Currently active TCP sessions established/accepted by the host and associated traffic statistics. Total amount of UDP traffic sorted by port. For each protocol (e.g. HTTP), a list of the last 5 clients that interacted with the host using the protocol. Local traffic, local to remote traffic, remote to local traffic (a host is local if it belongs to either the specified network card subnet or to the subnet(s) specified in the initialization [5]). UDP vs. TCP traffic, relative distribution of the IP protocols according to the host name. Table 1: Information recorded by ntop for each host ntop also reports global traffic statistics, including: Traffic Distribution Packets Distribution Used Bandwidth Protocol Utilization and Distribution Local Subnet Traffic Matrix Network Flows Local (subnet) traffic, local vs. remote (outside specified/local subnet), remote vs. local. Total number of packets sorted by packet size, unicast vs. broadcast vs. multicast and IP vs. non-ip traffic. Actual, average and peak bandwidth usage. Distribution of the observed traffic according to both protocol and source/destination (local vs. remote). Monitored traffic between each pair of hosts in the subnet. Traffic statistics for user-defined flows (traffic of particular interest to the user) In addition to the information provided above, the current version allows the installation of plug-ins to provide detailed statistics about particular protocols not present in the standard version. Examples of these are the NFS and NetBIOS plug-ins. ntop will also generate statistics about the host on which it is running, listing open sockets, data sent/received, and contacted peers for each process. 2.2 Traffic Monitoring Table 2: Global statistics recorded by ntop Traffic monitoring is the ability to identify those situations where network traffic does not comply with specified policies or when it exceeds some defined thresholds. In general, network administrators specify policies that apply to the behaviour of elements in the managed networked. Nevertheless, it is possible that some hosts will not comply with the policies 2
3 Installation prescribed. Typical causes of misbehaviour are related to misconfiguration of operating systems, network interfaces, software applications and others [6]. ntop provides support for detecting some network configuration problems including: Use of duplicate IP addresses. Identification of local hosts in promiscuous mode. Misconfiguration of software applications, by analysing protocol traffic data. Service misuse detection Identification of hosts that do not make use of specified proxies. Protocol misuse Identification of hosts that use unnecessary protocols. Identification of subnet routers Detection of misconfigured workstations acting as routers. Excessive network bandwidth utilization 2.3 Network Optimization and Planning Sub-optimal configuration of hosts might influence negatively the overall performance of a network. ntop allows the administrator to identify potential sources of unproductive bandwidth usage, particularly the use of unnecessary protocols and sub-optimal routing problems. Indirectly, through traffic characterization and distribution, it is possible to revise policies for the network to promote wiser bandwidth usage. 2.4 Detection of Network Security Violations In networks, most of the security attacks come from the network itself. For this reason ntop provides the users support for both tracking ongoing attacks and identifying potential security holes including IP spoofing, network cards in promiscuous mode, denial of service attacks, trojan horses (that use well known ports) and portscan attacks. When a security violation or a network misconfiguration is identified, ntop offers facilities to generate alarms for the network operator (via , SNMP traps or Short Messaging Systems) and to perform specific actions (when applicable) in order to block the attack. As it is also possible to keep traffic information stored into a database, the records can be used to understand the attack and prevent further similar occurrences. Further information on the use of ntop for security purposes is available on [7]. It is important to note that ntop, as well as other monitoring tools, might pose security threats if not installed and configured properly. Free access to ntop's web interface will allow any user with web access to read all the information provided by ntop, gaining knowledge about the network that would not be disclosed otherwise. 3 Installation ntop is currently available on version 1.3. It is distributed under the GNU General Public License [9], and can be down-loaded free of charge from ntop's official homepage [3] and other mirrors on the Internet. It supports the platforms, media and protocols shown in the table below. 3
4 Installation Platforms Media Protocols IP Protocols UNIX, Win32 Ethernet, Token Ring, PPP, FDDI, Raw IP, Loopback IP, IPX, NetBIOS, OSI, AppleTalk, DecNet, DLC Fully user configurable (NFS, HTTP, X11, DNS, FTP, SMTP, POP, IMAP, SNMP, Telnet, etc.) Table 3: Platforms, Media and Protocols supported by ntop Before down-loading the software, it is important to select the station which will host ntop. This host should have an interface to the network to be monitored, since only the traffic captured through this interface can be analysed. In switched networks (or bridged networks), when selecting ntop s host station, it is important to consider that only the segment where ntop s host is installed will be monitored. Nevertheless, modern switches (switching hubs) allow global network traffic (or virtual LANs) to be mirrored to a specified switch port. Therefore, ntop can be activated on a host that is attached to such a port. Unfortunately, this is not possible in case of different LANs interconnected via routers, for instance, in an IP inter-network. After having selected which station will host ntop, a proper down-load format should be chosen. Available formats include: source code (which should compile virtually on any UNIX and Win32 platform) application binary or binary package for different UNIX flavours (Linux, IRIX 6.2, Solaris 2.7 i386/sparc, HP-UX 11.X, FreeBSD 3.X, AIX 4.1), and binary demo for Windows 95/98/NT (limited to 1,000 packets capture). Both UNIX and Win32 versions are developed under a single source-code tree, using a systemindependent interface for user-level packet capture called libpcap. This library is available for most UNIX flavours, and has been ported to the Win32 platform by the authors of ntop. This Win32 port can also be down-loaded from the official homepage. In the supported UNIX platforms, after having down-loaded ntop's source code and installed libcap, ntop should be compiled and installed: # cd /ntops-directory/ntop-1.3 # sh./configure # make # make install # exit If ntop has been down-loaded in binary format, the installation process depends on the package manager being used. As mentioned before, ntop's full source code is available free of charge on the Internet, through the URL ftp://ftp.ntop.org/pub/local/ntop/snapshots/. In order to fund the project partially, if a Windows user is not willing or is not able to compile ntop, the full version in binary form is distributed under the payment of a US$ fee. After the installation, ntop should be executed (by a user with super-user access), and will start capturing packets from the network. When activated in web-based mode, ntop features its own 4
5 Utilization Examples internal web server (set to a specific port on the start-up). Therefore, it will be possible to access the software with a web browser through the URL The current version of ntop supports plug-ins, as an extension mechanism. The administrator is allowed to extend ntop s functionality with extra-features. Examples of plug-ins are ICMP, ARP/RARP and WAP plug-ins. Those can be installed optionally, and started-up selectively during ntop initialization. 4 Utilization Examples In this section, some examples of capabilities are presented. The examples show screenshots of ntop s web-based mode. Figure 1: Global IP Protocol Distribution The traffic statistics report general information about the observed traffic. The traffic is considered from a global perspective, with no host-specific information. In Figure 1, it is possible to view the Global IP Protocol Distribution table and graph. The data collected by ntop shows that NFS and X11 are the highest bandwidth consuming protocols currently present in the network. Together they account for 85.1% of the network usage. This sort of statistics is important for the administrator to understand the traffic, associating it to specific applications. In this way, it will be possible to manage the available bandwidth appropriately. 5
6 Utilization Examples Figure 2: Local, Remote to Local and Local to Remote Traffic The tables in Figure 2 show statistics on local, remote to local and local to remote traffic. A host is considered local if attached to the local broadcast network, or remote otherwise [5]. The local traffic table shows information on exchanged traffic between local hosts. In the example, it is possible to verify that NFS accounts for 68.4% of the local traffic. The remote to local traffic table shows the incoming traffic generated from remote (non-local) hosts. In this example, local X11 servers are being used by hosts outside the network segment. With access to this sort of information, the administrator is able to revise policies on acceptable remote X- Windows usage. As could be expected, the local to remote traffic table relates to the traffic leaving the local network boundaries. 6
7 Utilization Examples Figure 3: Throughput Statistics Figure 3 shows another global traffic statistics, displayed in throughput graphs. Those are graphs that show the evolution of the total throughput observed in the network. They are presented in different time scales, showing the throughput in the last 60 minutes and in the last 24 hours. This sort of statistics is valuable to determine peek and low usage periods. In this way the administrator will be able to better schedule traffic intensive or network disruptive activities (physical network maintenance, switch configuration, data traffic with low priority, etc.). It might also be interesting to detect unexpected throughput peeks, which could indicate excessive use of the network resources by a user or group of users, or other non-standard behaviour. 7
8 Utilization Examples The previous examples showed the use of ntop for global traffic information. Figure 4 shows some information provided by ntop for a specific host. Figure 4: Host Information The listing includes IP address, MAC address and board vendor (only for local hosts), total data sent/received statistics (local vs. remote traffic), broadcast packets sent, etc. The IP protocol distribution table provides information about protocol distribution, dividing IP traffic according to known higher-level protocols. The last contact peers table shows the last hosts that exchanged data with the host being inspected. Host information will support network operators in the proper configuration and maintenance of individual elements in the network. Moreover, hosts might be associated with specific users. These statistics could be representative of their behaviour. 8
9 Utilization Examples Figure 5: Active TCP Sessions ntop is able to analyse individual captured IP packets and relate them to active TCP sessions. This is possible because ntop implements the TCP protocol machine [5]. In Figure 5 the active TCP sessions table is showed, with an entry for each active connection. In this way it is possible to recognize specific flows and the traffic associated to them. The listing includes for each entry: calling- and called- host addresses, data sent and received, connection time, and session duration. Figure 6: ntop s WAP plug-in - accessing top receivers from a WAP device As mentioned in Section Installation, ntop s functionality can be extended using plug-ins. Figure 6 depicts ntop being accessed via a WAP device (for the example, an emulator of a WAP device [10] was used). This is possible through the installation and activation of a WAP plug-in [4], which is responsible for the generation of final statistics in WAP format. 9
10 Alternative Approaches to Monitoring Figure 7: intop - ntop in interactive text mode - Source [5] Figure 7 shows ntop in its interactive mode, also known as intop. It is a shell to ntop and presents data in textual format, organized in tables. In this example it is possible to view the list of hosts that have sent/received data. The other columns highlight host activity, considering in particular sent and received data, TCP, UDP and ICMP data. A thorough (though currently outdated) description if ntop s user interface can be found on ntop s User Guide [5]. 5 Alternative Approaches to Monitoring Simple alternatives to network monitoring are packet tracers and decoders, often-called network sniffers. Examples are tcpdump [11] and snoop [15]. These tools are responsible for capturing packets from the network and often require off-line analysis tools to correlate captured data and identify network flows. Sniffers usually provide details on packet activity and lack information on the network as a whole [8]. Protocol analysers, such as Ethereal [2], typically focus on the content of single network packets and not on global network activities. These solutions lack high-level support to management activities. More appropriate and advanced alternatives include RMON (Remote Network Monitoring) management platforms [16]. Those platforms promote a decoupling between probes and managers. Probes are devices that collect data from the network and managers are applications that provide useful higher level information for the human operator. RMON managers can be 10
11 References seen as data analysers, but will also configure probes and retrieve relevant collected data (via SNMP). In RMON, flexibility was achieved through modularity and standardization. RMON s MIB (Management Information Base) and architecture have been defined in RFCs [16]. The RMON standards define the way in which a manager can retrieve information from probes and which pieces of information are available. In an RMON configuration, a manager can collect data from several probes. Therefore, it is possible to monitor several subnets from one central manager. This possibility is also available for the latest version of ntop. Despite the fact that ntop runs as a single application, including the probe and the analyser, it provides an API for remote programs to read (and in a future version modify) traffic information. This API is called the remote interface. The remote interface has to be ported to client-side platforms that would like to interact with ntop probes (it is currently available in a limited number of programming languages and platforms). This restricts the usage of ntop's remote interface to the platforms supported. The RMON standards, on the other hand, specify a communication protocol between manager and probes. This standardization opens the path to multi-vendor management solutions. RMON-ready managers can interact with probes implemented in any platforms and RMON-ready probes can interact with managers implemented in any platforms. With ntop, specialized functions are typically implemented via new versions and optional plug-ins. As RMON is defined in a standard, it is possible to create specialized managers for different purposes (for instance, a security failure detection manager) or to use different applications for data analysis that will inter-operate with probes from different vendors. RMON-base solutions are quite powerful but unfortunately need sophisticated SNMP managers that are able to configure the probes properly, and analyse collected network statistics. Due to the complexity and costs of RMON solutions, those are basically used by advanced network managers in large institutions. Tools for network monitoring such as NeTraMet [1] and NFR [12] offer advanced programming languages for analysing network flows and building statistical event records. These languages are useful for experienced network operators. They have been designed as instrumentable network daemons more suitable for monitoring networks in a mid/long time period [8]. ntop has shown to be a valuable tool for quick access to network monitoring, with a simple to use integrated web interface, minimal requirements and lightweight CPU utilization. It is available for network administrator with minimal (installing, learning) effort and cost, as opposed to expensive and complex (yet sophisticated and flexible) management platforms. 6 References [1] Brownlee N. NeTraMet 4.2 Users Guide, Information Technology Systems & Services, The University of Auckland, New Zealand, August Available at [2] Combs, G. et al. The Ethereal Network Analyzer, available at: [3] Deri, L., Suin, S. and Carbone, R. Ntop - Network Top, available at: [4] Deri, L. Beyond the Web: Mobile WAP-based Management. Centro Serra, University of Pisa, Italy. Available at [5] Deri, L. NTOP User's Guide - Network Usage Monitor for Unix Systems. Centro Serra, University of Pisa, Italy. Available at ftp://ftp.unipi.it/pub/local/ntop/snapshots/ntop.pdf.gz [6] Deri, L. and Suin, S. Effective Traffic Measurement using ntop. IEEE Communications Magazine, 38(5), pp , May 2000 [7] Deri, L. and Suin, S. Improving Network Security Using Ntop. In Proceedings of the RAID Workshop on the Recent Advances in Intrusion Detection, Toulouse, France, October
12 References [8] Deri, L. and Suin, S. Ntop: beyond Ping and Traceroute. In Proceedings of the DSOM'99, Zürich, Switzerland, October [9] Free Software Foundation. GNU General Public License. Available at [10] gelon.net. WAP Gelon.net. Available at [11] Jacobson, V., Leres, C., and McCanne, S. tcpdump, Lawrence Berkeley National Labs, Available at ftp:// ftp.ee.lbl.gov/ [12] Network Flight Recorder, Inc. Network Flight Recorder. Available at [13] opensource.org. The Open Source Page. Available at [14] Stallings, W. SNMP, SNMPv2, SNMPv2 and RMON 1 and 2, Third Edition, Addison Wesley, Sept [15] Sun Microsystems, Inc. Snoop UNIX man pages (SunOS 5.6). [16] Waldbusser, S., Remote Network Monitoring Management Information Base, IETF STD 0059, May
How To Use Ntop
NTOP Network TOP An Overview ASSIGNMENT : Report INSTRUCTOR : Aiko Pras DATE : June 2000 COURSE : Internet Management Protocols COURSE CODE : 265310 GROUP : 2 STUDENTS[S] : João Paulo Almeida, 9816763
Ntop: beyond Ping and Traceroute
Ntop: beyond Ping and Traceroute Luca Deri 1 2 and Stefano Suin 2 The task of network management is becoming increasingly complex due to the increasing number of networked computers running different operating
Effective Traffic Measurement Using ntop
NETWORK TRAFFIC MEASUREMENTS AND EXPERIMENTS Effective Traffic Measurement Using ntop Luca Deri, Finsiel S.p.A. Stefano Suin, University of Pisa ABSTRACT Traffic measurements are becoming increasingly
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
The ntop Project: Open Source Network Monitoring
The ntop Project: Open Source Network Monitoring Luca Deri 1 Agenda 1. What can ntop do for me? 2. ntop and network security 3. Integration with commercial protocols 4. Embedding ntop 5. Work in
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Network Management & Security (CS 330) RMON
Network Management & Security (CS 330) RMON Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan November 08, 2013 CS 330 RMON 1/13 1 / 13 Outline Remote Network
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Network Management Functions RMON1, RMON2. Network Management
Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
Introduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Visio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site!
Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! This is a set of questions to help you prepared for the CompTIA Network+ certification examination. You should not exceed twenty
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
Monitor network traffic in the Dashboard tab
As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa makes it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Performance Management
Performance Management Performance Management Overview Network Monitoring RMON RMON II 6-1 Performance Management Choosing the performance metrics to monitor is difficult Too many to choose from Difficult
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips January 15, 2004 This document applies to these Xerox products: Network Packet Analyzer Tips Purpose This document contains a procedure that Xerox customers can
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
Presented by Aurang Zeb 14CS-03. Network Management System
Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
NTOP User s Guide Network Usage Monitor for Unix Systems
NTOP User s Guide Network Usage Monitor for Unix Systems Version 1.1 1998-99, Luca Deri Every effort has been made to ensure that the information contained in this book is accurate. The
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
COMP416 Lab (1) Wireshark I. 23 September 2013
COMP416 Lab (1) Wireshark I 23 September 2013 2 Before the lab Review the content of communication architecture. Review TCP/IP model and protocol suite. Understand data transferring, layering, and encapsulation/demultiplexing.
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team
Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team This document specifically addresses a subset of interesting netflow export situations to an ntop netflow collector
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Connecting to the network
5 Connecting to the network This chapter discusses the basic stages of connecting the printer to the network, provides an overview of network requirements and protocol diagrams, and describes how to physically
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Product Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
Network Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
Internetworking With TCP/IP
Internetworking With TCP/IP Application Layer Telnet Gopher NFS FTP X Win TFTP SMTP SNMP REXEC DNS RPC Transport Layer TCP UDP Network Layer ICMP IP IGMP ARP RARP Link Interface Ethernet, IEEE 802.3, Token
About the Technical Reviewers
About the Author p. xiii About the Technical Reviewers p. xv Acknowledgments p. xvii Introduction p. xix IPv6 p. 1 IPv6-Why? p. 1 IPv6 Benefits p. 2 More Address Space p. 2 Innovation p. 3 Stateless Autoconfiguration
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
Network Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Intrusion Detection, Packet Sniffing
Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?
Security Labs in OPNET IT Guru
Security Labs in OPNET IT Guru Universitat Ramon Llull Barcelona 2004 Security Labs in OPNET IT Guru Authors: Cesc Canet Juan Agustín Zaballos Translation from Catalan: Cesc Canet -I- Overview This project
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
