TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
|
|
|
- Grant Evans
- 10 years ago
- Views:
Transcription
1 Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Gestão de Redes e Serviços, Segurança - Networks and Services Management, Security 1
2 Outline TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2
3 Service Assurance process components Service Assurance process at the Network Operator targets the need to monitor and assure a high quality of the services delivered to the customers. The ambition is to move from reactivity to pro-activity, i.e. to detect and circumvent errors before they have had any impact on the service TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 3
4 Alarm Handling In a Network Operations Center (NOC), responsible for the supervision of a large network comprised of heterogeneous equipment and systems, the focal point for alarm handling is very important. Alarms are to be collected from various sources, transformed into a unified format, logged and presented to different operators depending on their defined responsibilities. The alarm console is often the tool to make a fast connection to an Element Manager to perform any required testing, diagnostic or bypass operation. The amount of alarms can be reduced by elimination of duplicates, applying correlation rules (to find primary and secondary alarms) and automatic handling of alarm on/off situations. The service and customer impact of a serious alarm should be presented, to govern the further handling of the error. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 4
5 Performance Management This is a component that normally is capable to: Auto-detect the current configuration of the infrastructure by browsing the IP network and the MIBs. Collect performance data at specified periods or intervals. MIB polling, ping, remote ping, RMON (I and II) and ftp are techniques used to obtain (and even create) measurement data. The data is normalized and stored into a common database. Here it also may be retrieved and utilized for long-term planning purposes. Perform threshold checking and generate alarms (to the Alarm handler) when thresholds are passed. Produce customized reports regularly or on demand. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 5
6 Problem Management The Problem Management (Trouble Ticketing) components are used to administrate the workflow and logistics around efforts that normally require human intervention. To send out a field engineer to perform repair or installation work, and letting him report back into the TT system when he has completed his task is a common usage. Since these tasks are often initiated by customer complaints the TT component is sometimes also used as a helpdesk tool. This component normally has interfaces towards the Alarm manager (both directions) and provides user interfaces towards the customer help desk, the operations staff and the service personnel. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 6
7 Network Management perspective TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 7
8 NM Principle of Operation TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 8
9 Internet Management - SNMP Management is done from the management station (manager) It communicates via the SNMP protocol with Agents Information from a node not being able to run an agent can be retrieved from a proxy agent running on another node The biggest part of SNMP describes the kind of information that a specific type of agent provides and the format of it Each managed node holds the information that can be retrieved by SNMP in a special information base called MIB (Management Information Base) (RFC1213) The MIB uses ASN.1 (Abstract Syntax Notation) to describe the managed information as objects. The ASN.1 OBJECT IDENTIFIER is used to uniquely identify every object TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 9
10 SNMP Management SNMP Simple Network Management Protocol Application-layer protocol for managing TCP/IP based networks. Runs over UDP, which runs over IP NMS (Network Management Station) Device that pools SNMP agent for info. SNMP Agent Device (e.g. Router) running software that understands SNMP language MIB Management Information Base Database of information conforming to SMI. SMI Structure of Management Information Standard that defines how to create a MIB. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 10
11 Management Station A Management Station is a Stand Alone system or part of shared system: interface for human network manager set of management applications data analysis fault recovery interface to monitor and control network translate manager s requirements into monitoring and control of remote elements data base of network management information extracted from managed entities TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 11
12 Management Agent Agents are found in equipment platforms and/or software e.g. hosts, bridges, hubs, routers allow their management by management station respond to requests for information respond to requests for action asynchronously supply unsolicited information TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 12
13 SNMP Architecture TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 13
14 SNMP Architecture TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 14
15 SNMP Protocol TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 15
16 SNMP Protocol The SNMP protocol is request-response based: A request is sent to an agent from the management station Normally the agent replies with the requested information or confirms the update Various errors can also be reported TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 16
17 MIB Management Information Base MIB Breakdown - OBJECT-TYPE - String that describes the MIB object. - Object IDentifier (OID). - SYNTAX - Defines what kind of info is stored in the MIB object. - ACCESS - READ-ONLY, READ-WRITE. - STATUS - State of object in regards the SNMP community. - DESCRIPTION Standard MIB Object: sysuptime OBJECT-TYPE SYNTAX Time-Ticks ACCESS read-only STATUS mandatory DESCRIPTION Time since the network management portion of the system was last reinitialised. ::= {system 3} - Reason why the MIB object exists. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 17
18 MIB Management Information Base Object IDentifier (OID) - Example iso(1) org(3) dod(6) internet(1) mgmt(2) mib-2(1) system(1) Note: ~100% present. - mgmt and private most common. - MIB-2 successor to original MIB. - STATUS mandatory, All or nothing in group iso(1) 1 org(3) 3 dod(6) 6 internet(1) 1 private(4) directory(1) 4 1 mgmt(2) experimental(3) 2 3 mib-2(1) 1 tcp(6) system(1) 6 1 interfaces(2) ip(4) 2 4 TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 18
19 MIB Management Information Base system(1) group - Contains objects that describe some basic information on an entity. - An entity can be the agent itself or the network object that the agent is on. 1 system(1) 2 1 mib-2(1) interfaces(2) system(1) group objects - sysdescr(1) Description of the entity. - sysobjectid(2) Vendor defined OID string. - sysuptime(3) Time since net-mgt was last re-initialised. - syscontact(4) Name of person responsible for the entity. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 19
20 MIB Management Information Base 1 MIB - tree view mib-2(1) 1 system(1) 1 syscontact(3) 4 sysdesc(1) sysuptime(3) 3 sysobjectid(2) 2 MIB - syntax view sysuptime OBJECT-TYPE SYNTAX INTEGER ACCESS read-only STATUS mandatory DESCRIPTION The time (in hundredths of a second) since the network management portion of the system was last re-initialized. ::= {system 3} TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 20
21 MIB Management Information Base SNMP Instances - Each MIB object can have an instance. - A MIB for a router s (entity) interface information iso(1) org(3) dod(6) internet(1) mgmt(2) mib-2(1) interfaces(2) iftable(2) ifentry(1) iftype(3) - Require one iftype value per interface (e.g. 3) - One MIB object definition can represent multiple instances through Tables, Entries, and Indexes. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 21
22 MIB Management Information Base Tables, Entries, and Indexes. - Imagine tables as spreadsheets - Three interface types require 3 rows (index no.s) - Each column represents a MIB object, as defined by the entry node. ENTRY + INDEX = INSTANCE iftype(3) ifmtu(4) Etc Index #1 Index #2 Index #3 iftype.1[6] iftype.2:[9] iftype.3:[15] ifmtu.1 ifmtu.2 ifmtu.3 TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 22
23 MIB Management Information Base Example MIB Query - If we queried the MIB on iftype we could get: - iftype.1 : 6 - iftype.2 : 9 - iftype.3 : 15 Which corresponds to - iftype.1 : ethernet - iftype.2 : tokenring - iftype.3 : fddi iftype OBJECT-TYPE SYNTAX INTEGER { other(1), ethernet(6), tokenring(9) fddi(15), } etc TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 23
24 Simple Network Management Protocol Retrieval protocol for the MIB. Can retrieve by: - CLI (snmpwalk), - GUI (MIB Browser), or - Larger applications called Network Management Software NMSoftware is a collection of smaller applications to manage network with illustrations, graphs, etc. NMSoftware runs on Network Management Stations, which can run several different NMS software applications. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 24
25 SNMP Commands SNMP has 5 different functions referred to as Protocol Data Units (PDU), which are: (1) GetRequest, aka Get (2) GetNextRequest, aka GetNext (3) GetResponse, aka Response (4) SetRequest, aka Set (5) Trap TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 25
26 SNMP Commands [Get] GetRequest [Get] - Most common PDU. - Used to ask SNMP agent for values of a particular MIB agent. - NMS sends out 1 Get PDU for each instance, which is a unique OID string. - What happens if you don t know how many instances of a MIB object exist? TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 26
27 SNMP Commands [GetNext] GetNextRequest [GetNext] - NMS application uses GetNext to walk down (a table) within a MIB. - Designed to ask for the OID and value of the MIB instance that comes after the one asked for. - Once the agent responds the NMS application can increment its count and generate a GetNext. - This can continue until the NMS application detects that the OID has changed, i.e. it has reached the end (of the table). TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 27
28 SNMP Commands [GetResponse] GetResponse [Response] - Simply a response to a Get, GetNext or Set. - SNMP agent responds to all requests or commands via this PDU. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 28
29 SNMP Commands [SetRequest] SetRequest [Set] - Issued by an NMS application to change a MIB instance to the variable within the Set PDU. - For example, you could issue a - GetRequest against a server asking for syslocation.0 and may get HEAVEN as the response. - Then, if the server was moved, you could issue a Set against that server to change its location to HELL. - You must have the correct permissions when using the set PDU. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 29
30 Trap SNMP Commands [Trap] - Asynchronous notification. - SNMP agents can be programmed to send a trap when a certain set of circumstances arise. - Circumstances can be view as thresholds, i.e. a trap may be sent when the temperature of the core breaches a predefined level. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 30
31 SNMP Security SNMP Community Strings (like passwords) - 3 kinds: - READ-ONLY: You can send out a Get & GetNext to the SNMP agent, and if the agent is using the same read-only string it will process the request. - READ-WRITE: Get, GetNext, and Set. If a MIB object has an ACCESS value of read-write, then a Set PDU can change the value of that object with the correct read-write community string. - TRAP: Allows administrators to cluster network entities into communities. Fairly redundant. TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 31
32 Management Tools Generic Management Tools Management Tools Development Tools Isolated Platforms Integrated Testers Protocol Analysers Documentation Management Enterprise Management MIBs Agents Applications Internet Tools Problem Management IHM TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 32
33 Monitoring and Test Tools Single Tools Lower levels Network TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 33
34 Management Platforms Integrated Tools Network TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 34
35 Enterprise Management Systems Network TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 35
36 Management Platforms Problem Management Event Correlation Management Platforms TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 36
37 Example of a broad NMS solution TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 37
38 Example of a visual Flow Manager TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 38
39 Example of a visual Fault Manager TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 39
40 Example of an Alert/Event Manager TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 40
41 Example of an Performance Manager TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 41
42 Example of an Impact Manager TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 42
43 Other Tools: Business Intelligence Costumer acquisition Costumer care Fraud detection Strategic Decision Support Segmentation & Scoring Campaign Assignment & Management Event Management Contact Management Costumer Information Management Business Intelligence Data Warehouse Business Management Operational Data Store TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 43
44 Confidentiality: Security goals Data transmitted or stored should only be revealed to an intended audience Confidentiality of entities is also referred to as anonymity Data Integrity: It should be possible to detect any modification of data This requires to be able to identify the creator of some data Accountability: It should be possible to identify the entity responsible for any communication event Availability: Services should be available and function correctly Controlled Access: Only authorized entities should be able to access certain services or information TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 44
45 What is a threat? Abstract Definition: A threat in a communication network is any possible event or sequence of actions that might lead to a violation of one or more security goals The actual realization of a threat is called an attack Examples: A hacker breaking into a computer Disclosure of s in transit Someone changing accounting data A hacker temporarily shutting down a website Someone using services or ordering goods in the name of others TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 45
46 Masquerade: Threats technically defined An entity claims to be another entity Eavesdropping: An entity reads information it is not intended to read Authorization Violation: An entity uses a service or resources it is not intended to use Loss or Modification of (transmitted) Information: Data is being altered or destroyed Denial of Communication Acts (Repudiation): An entity falsely denies its participation in a communication act Forgery of Information: An entity creates new information in the name of another entity Sabotage: Any action aiming to reduce the availability and / or correct functioning TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 46
47 Threats and technical security goals These threats are often combined in order to perform an attack! TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 47
48 Physical Security: Safeguards Against Information Security Threats Locks or other physical access control Tamper-proofing of sensitive equipment Environmental controls Personnel Security: Identification of position sensitivity Employee screening processes Security training and awareness Administrative Security: Controlling import of foreign software Procedures for investigating security breaches Reviewing audit trails Reviewing accountability controls TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 48
49 Safeguards Against Information Security Threats Emanations Security: Radio Frequency and other electromagnetic emanations controls Media Security: Safeguarding storage of information Controlling marking, reproduction and destruction of information Ensuring that media containing information are destroyed securely Scanning media for viruses Lifecycle Controls: Trusted system design, implementation, evaluation and endorsement Programming standards and controls Documentation controls TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 49
50 Safeguards Against Information Security Threats Computer Security: Protection of information while stored / processed in a computer system Protection of the computing devices itself Communications Security: Protection of information during transport from one system to another Protection of the communication infrastructure itself TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 50
51 Security Service: Communications security: Some terminology An abstract service that seeks to ensure a specific security property A security service can be realized with the help of cryptographic algorithms and protocols as well as with conventional means Cryptographic Algorithm: A mathematical transformation of input data (e.g. data, key) to output data Cryptographic algorithms are used in cryptographic protocols Cryptographic Protocol: A series of steps and message exchanges between multiple entities in order to achieve a specific security objective TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 51
52 Security Services: overview Authentication The most fundamental security service which ensures, that an entity has in fact the identity it claims to have Integrity It ensures, that data created by specific entities may not be modified without detection Confidentiality To ensure secrecy of protected data Access Control Controls that each identity accesses only those services and information it is entitled to Non-Repudiation Protects against that entities participating in a communication exchange can later falsely deny that the exchange occurred TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 52
53 TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 53
54 References and Readings TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 54
SNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
System and Network Management
- System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!
SNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
SNMP and Network Management
SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 [email protected] http://www.nixu.fi Contents Network Management MIB naming
TELE 301 Network Management
TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?
Simple Network Management Protocol SNMP
Kommunikationssysteme (KSy) - Block 7 Simple Network Management Protocol SNMP Dr. Andreas Steffen 2000-2001 A. Steffen, 12.02.2001, KSy_SNMP.ppt 1 Definitions client/server network management application
Network Management (NETW-1001)
Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Simple Network Management Protocol (SNMP) Primer
Xerox Multifunction Devices July 22, 2003 for the user Simple Network Management Protocol (SNMP) Primer Purpose This document introduces the history, purpose, basic functionality and common uses of SNMP
SNMP Simple Network Management Protocol
SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
Network Management & Monitoring Introduction to SNMP
Network Management & Monitoring Introduction to SNMP These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
TECHNICAL NOTES. Technical Notes P/N 300-013-797 REV A01. EMC ITOI VoIP Management Suite 8.1. May, 2012
TECHNICAL NOTES EMC ITOI VoIP Management Suite 8.1 Technical Notes P/N 300-013-797 REV A01 May, 2012 These technical notes contain supplemental information about EMC IT Operations Intelligence (ITOI) VoIP
Outline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Outline of the SNMP Framework Management Program
SNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
SNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
Network Monitoring & Management Introduction to SNMP
Network Monitoring & Management Introduction to SNMP Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial
Network Management - SNMP
Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow
SNMP Extensions for a Self Healing Network
SNMP Extensions for a Self Healing Network Background Patent 6,088,141: This is a self healing network depending on additional hardware. It requires a second ring of connection to handle recovery operations.
Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:
Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues
Introduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
Brocade Product Training
Brocade Product Training Introducing SNMP Web-based Training Brocade Education Services Page 1-1 Objectives Describe SNMP basics: terminology and concepts Describe the need for SNMP Describe the advantages
This watermark does not appear in the registered version - http://www.clicktoconvert.com. SNMP and OpenNMS. Part 1 SNMP.
SNMP and OpenNMS Part 1 SNMP Zeev Halevi Introduction Designed in 1987 by Internet Engineering Task Force (IETF) to send and receive management and status information across networks Most widely used network
Simple Network Management Protocol
Simple Network Management Protocol Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outlines Basic Concepts Protocol Specification Transport-Level Support SNMP Group Practical
INTERNET MANAGEMENT PROTOCOLS TUTORIAL STOCKHOLM, SWEDEN 29 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS
INTERNET MANAGEMENT PROTOCOLS THE SIMPLE NETWORK MANAGEMENT PROTOCOL 1 TUTORIAL STOCKHOLM, SWEDEN 9 OCTOBER 1999 AIKO PRAS UNIVERSITY OF TWENTE THE NETHERLANDS [email protected] http://wwwhome.ctit.utwente.nl/~pras
52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)
Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.
SNMP. 13.1 SNMP Overview CHAPTER
13 CHAPTER SNMP This chapter explains Simple Network Management Protocol (SNMP) as implemented by the Cisco ONS 15600. For SNMP setup information, refer to the Cisco ONS 15600 Procedure Guide. Chapter
Simulation of an SNMP Agent: Operations, Analysis and Results
International Journal of Electronics and Computer Science Engineering 1919 Available Online at www.ijecse.org ISSN- 2277-1956 Simulation of an SNMP Agent: Operations, Analysis and Results Pradeep Kumar
Simple Network Management Protocol
Simple Network Management Protocol This document describes how to configure the Simple Network Management Protocol (SNMP). This document consists of these sections: Understanding SNMP, page 1 Configuring
Simple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
White Paper Case Study:
White Paper Case Study: SNMP CLI Abstract: The purpose of this document is to convey to the reader the usefulness of an SNMP (Simple Network Management Protocol) CLI (Command Line Interface). This document
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
SNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
A Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
Simple Network Management Protocol
CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a
Introduction... 28-2 Network Management Framework... 28-2 Structure of Management Information... 28-3 Names... 28-4 Instances... 28-4 Syntax...
Chapter 28 Simple Network Management Protocol (SNMP) Introduction... 28-2 Network Management Framework... 28-2 Structure of Management Information... 28-3 Names... 28-4 Instances... 28-4... 28-5 Access...
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
(Refer Slide Time: 1:17-1:40 min)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 37 Network management Good day, so today we will talk about network management.
Network Management & Monitoring Introduction to SNMP
Network Management & Monitoring Introduction to SNMP Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Tik-109/110.300 Telecommunications architectures:
Tik-109/110.300 Telecommunications architectures: Network management Hannu H. KARI/Helsinki University of Technology (HUT) TML-laboratory/CS/HUT Tik-109/110.300 Fall 2000 Hannu H. Kari Page 1 Agenda Telecom
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
DC70 NETWORK MANAGEMENT JUN 2015
Q.2 a. Most of the popular host operating systems come with the TCP/IP Suite and are amenable to SNMP management. The current networks management systems, however, suffer from several limitations. Describe
log, syslog, logrotate SNMP tools for monitoring
log, syslog, logrotate SNMP tools for monitoring ASI Master M2 ASR - Luiz Angelo STEFFENEL - L Steffenel 2008 1 Syslog and Log files L Steffenel 2008 2 Outline Log files What need to be logged Logging
Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science
Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science 1 Outline Background SNMP Basics SNMP Version 1 SNMP Version 2 SNMP Management,
PA160: Net-Centric Computing II. Network Management
PA160: Net-Centric Computing II. Network Management Luděk Matyska Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Spring 2015 Luděk Matyska (FI MU) 3. Network Management Spring 2015 1
Active Management Services
Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Using SNMP for Remote Measurement and Automation
Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,
Utilizing SNMP Capabilities of EMC Disk Library
Utilizing SNMP Capabilities of EMC Disk Library A Detailed Review Abstract EMC Disk Library (EDL) provides Simple Network Management Protocol (SNMP) as part of its monitoring solution. This white paper
Advanced Guide for Configuring SNMPc to Manage Any SNMP Enabled Device
Advanced Guide for Configuring SNMPc to Manage Any SNMP Enabled Device SNMPc supports many devices straight out of the box. Its generic support for device classes such as Switches, Routers and Servers
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras [email protected]
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras [email protected] http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright
SNMP and SNMPv2: The Infrastructure for Network Management
SNMP and SNMPv2: The Infrastructure for Network Management William Stallings ABSTRACT The Simple Network Management Protocol is the most widely used protocol for the management of -based networks and internets.
Network Management Functions RMON1, RMON2. Network Management
Network Management Functions RMON1, RMON2 Network Management 30.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management
Cisco CMTS Router MIB Overview
CHAPTER 1 This chapter provides an overview of the Cisco Cable Modem Termination System (CMTS) router. This chapter contains the following topics: MIB Description, page 1-1 Benefits of MIB Enhancements,
Table of Contents. Cisco Fault Management of ONS 15454 Using Simple Network Management Protocol
Table of Contents Fault Management of ONS 15454 Using Simple Network Management Protocol...1 Document ID: 5701...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
What is it? SNMP. Agenda. Four Basic Elements
What is it? SNMP Simple Network Management Protocol A network management should... automate the process of monitoring and adjusting the performance of a network trigger alarms when special events occur
This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu
This Lecture Network management NWEN 403 Advanced Network Engineering Qiang Fu School of Engineering and Computer Science Victoria University of Wellington 22/04/2015 NWEN403: Advanced Network Engineering
A Study of Web-Based SNMP Network Management. with a Simple Java Applet Network Monitoring Tool
A Study of Web-Based SNMP Network Management with a Simple Java Applet Network Monitoring Tool Submitted to Committee Members Dr. W. Homer Carlisle(Chair) Dr. Kai H Chang Dr. Alvin S. Lim Submitted by
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Chapter 15. Network management
Chapter 15. Network management With the growth in size and complexity of the TCP/IP-based internetworks the need for network management became very important. The Internet Architecture Board (IAB) issued
SNMP Agent Plug-In Help. 2011 Kepware Technologies
2011 Kepware Technologies 2 Table of Contents Table of Contents 2 4 Overview 4 Agent Setup 5 General 6 Network Interfaces 6 Communication 7 Agent Actions 9 System Objects 10 System Objects Description
Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges
U.S. Air Force T&E Days 2010 2-4 February 2010, Nashville, Tennessee AIAA 2010-1744 Network Management Tools for Tactical Network Testing and Monitoring on Test Ranges William Brock 1 and Doug Mace 2 Tactical
Network Management Basics
F4 Network Management Basics Carol J. Sirkis [email protected] Click here Agenda to type page title Network Management Simple Network Management Protocol (SNMP) Basics Remote Monitoring (RMON) Basics IBM
SNMP a new paradigm for SCADA. By Vishal Prakash and Robert Casey
By Vishal Prakash and Robert Casey Introduction Remote Monitoring and diagnostics of industrial devices has evolved significantly over the years. In the seventies and early eighties remote monitoring was
Network Management. What is network management?
Network Management Introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for
Chapter 38 Simple Network Management Protocol (SNMP)
Chapter 38 Simple Network Management Protocol (SNMP) Introduction... 38-3 Network Management Framework... 38-3 Structure of Management Information... 38-5 Names... 38-6 Instances... 38-6... 38-7 Access...
SNMP Adapter Installation and Configuration Guide
SNMP Adapter Installation and Configuration Guide vcenter Operations Manager 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
MIB Explorer Feature Matrix
MIB Explorer Feature Matrix Lite Pro Android Standards and Protocols Supported SNMPv1 (RFC 1157), SNMPv2c (RFC 1901/1905), and SNMPv3 (RFC 3412-3417). Transport Protocols UDP, TCP, and. All transport protocols
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
Demystifying SNMP. TruePath Technologies Inc 10/5/2015 2:11:14 PM Version 1.db. p.1
Demystifying SNMP p.1 Who is? US based, leading edge IT software and services company that specializes in in-house services for new or existing IT monitoring software. We offer software with an easy to
Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System
DEPLOYMENT GUIDE Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System Version 1.0 Deploying F5 with Cacti Open Source Network Monitoring System Welcome to the F5 and Cacti deployment
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
INTRODUCTION TO SNMP AND MIB
INTRODUCTION TO SNMP AND MIB SESSION 2004 Cisco Systems, Inc. All rights reserved. 1 Objectives This is an introduction on SNMP and MIB For beginners Will not delve into the technical details SNMPv3: only
Vital Security Web Appliances NG-1100/NG-5100/NG-8100. How to Use Simple Network Management Protocol (SNMP) Monitoring
Vital Security Web Appliances NG-1100/NG-5100/NG-8100 How to Use Simple Network Management Protocol (SNMP) Monitoring Introduction The Simple Network Management Protocol (SNMP) is an application layer
Dave Perkins. September, 1993. SNMP MIB User,
September, 1993 SNMP MIB User, The article Understanding SNMP MIBs which follows contains information and conventions that were state of the art as of the spring of 1992. Since then, the SNMPv2 working
Network Monitoring with SNMP
Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple
Vanguard Applications Ware Basic Protocols. SNMP/MIB Management
Vanguard Applications Ware Basic Protocols SNMP/MIB Management Notice 2008 Vanguard Networks 25 Forbes Boulevard Foxboro, Massachusetts 02035 (508) 964-6200 All rights reserved Printed in U.S.A.. Restricted
Oracle WebLogic Server
Oracle WebLogic Server WebLogic SNMP Management Guide 10g Release 3 (10.3) July 2008 Oracle WebLogic Server WebLogic SNMP Management Guide, 10g Release 3 (10.3) Copyright 2007, 2008, Oracle and/or its
BEA WebLogic Server. and BEA WebLogic Express. SNMP Management Guide
BEA WebLogic Server and BEA WebLogic Express SNMP Management Guide BEA WebLogic Server Version 6.1 Document Date: December 19, 2001 Copyright Copyright 2001 BEA Systems, Inc. All Rights Reserved. Restricted
SNMP Monitoring and SWG MIB
SNMP Monitoring and SWG MIB Secure Web Gateway Release 10.0 Manual Version 1.01 M86 SECURITY SNMP MONITORING AND SWG MIB 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
