Framework conditions and requirements for network monitoring in campus networks Best Practice Document
|
|
|
- Poppy Jennings
- 10 years ago
- Views:
Transcription
1 Framework conditions and requirements for network monitoring in campus networks Best Practice Document Produced by UNINETT led working group on network monitoring (UFS128) Authors: Vidar Faltinsen, Gro-Anita Vindheim October 2011
2 TERENA All rights reserved. Document No: GN3-NA3-T4-UFS128 Version / date: October 2011 Original language : Norwegian Original title: Rammebetingelser og krav til nettverksovervåking i campusnett Original version / date: Contact: [email protected] UNINETT bears responsibility for the content of this document. The work has been carried out by an UNINETT led working group on network monitoring as part of a joint-venture project within the HE sector in Norway. Parts of the report may be freely copied, unaltered, provided that the original source is acknowledged and copyright preserved. The research leading to the results of this report has received funding from the European Community's Seventh Framework Programme (FP7/ ) under grant agreement n , relating to the project 'Multi-Gigabit European Research and Education Network and Associated Services (GN3)'. 2
3 Table of Contents Executive Summary 4 1 Introduction The need for network monitoring Limitations Underlying technologies 6 2 Functional areas and requirements Fault management Monitoring Alarm system Alarm console Notification system Accounting management Collecting traffic counters Network equipment health checks Traffic types Machine tracking Performance management 11 3 Robust monitoring Location of the monitor Monitoring the monitor Use of SMS as a notification channel Redundant monitoring Virtual monitoring server 14 4 Secure monitoring 16 5 Acquiring a network monitoring system One complete system A set of smaller systems Summary and conclusion 19 A. SNMP 20 SNMP requirements for network equipment 22 B. NETCONF 23 References 24 Definitions 25 3
4 Executive Summary This recommendation defines the requirements and framework conditions for network monitoring in campus networks. The recommendation has been written on the basis of many years of collective experience in the HE sector with the operation and monitoring of campus networks. The document applies to the fields of fault management, accounting management and performance management. The functions which must or should be covered by the network monitoring system are specified for each field. As is evident, a large number of tasks must be handled. When choosing between a single, complete system which encompasses all requirements and a set of smaller tools which are combined to produce a total solution, the latter is recommended. It is important to place emphasis on good integration. One should prioritise a central, flexible alarm system and a general, overall portal providing joint handling of authentication and authorisation. The recommendation emphasises the need for robustness in the monitoring system. The location of the monitoring system must be carefully considered, the system itself should be monitored, its level of redundancy should be evaluated and effective routines should be in place for recovery in the event of failure of the system. It is recommended that the monitoring system is not virtualised for reasons of robustness. Security must be a high priority. In this context, the use of SNMPv3 is recommended. If this is not supported by the selected tools, it is recommended that measures be taken to ensure satisfactory security. 4
5 1 Introduction This recommendation defines the requirements and framework conditions for network monitoring in campus networks. The recommendation has been written on the basis of many years of collective experience in the HE sector with the operation and monitoring of campus networks. By way of the GigaCampus programme ( ) [1], UNINETT has co-ordinated the technical field using a specialised monitoring work group. UNINETT has also deployed monitoring servers, so-called toolboxes [2] and beacons [3], in the HE institutes campus networks. The toolboxes and beacons contain a collection of open-source applications developed by UNINETT and the HE sector [4,5,6] or other parties. 1.1 The need for network monitoring An ICT department s principal job is to support the objectives of the insitutions s activities. In the case of a university or college, this means supporting the defined objectives for teaching, research and information dissemination. The ICT department provides a set of services (and an underlying infrastructure) to employees and students. The requirements placed on these services will vary, but a general trend is that there is increasing reliance on the underlying network functioning day and night, all year-round. Not only must the network function, but it must also have adequate capacity and acceptable, reliable response time. It must be capable of handling a range of different services with different characteristics, from real-time applications such as IP telephony and video conferencing to extremely capacity-demanding data transmission as used in highperformance computing and other research functions. Such a network in itself is complex, consisting of a large amount of equipment and cabling assembled into in a system. Taking one of the major campus networks in the sector as an example, the network at NTNU consists of about 25 routers, 1100 switches and 1600 access points (with 20 controllers). Gigabyte traffic rates are in use round the clock, seven days a week, all year-round. It is important to build fault tolerance into the network, at least in the most important parts of it. Ideally one should avoid the possibility of failure of a single component paralysing the whole network or parts of it. The degree of redundancy in the network will be subject to cost-benefit analysis. We refer here to UFS 114: Faulttolerant Campus Networks [7]. However, irrespective of how much fault tolerance is built in, problems will arise. Components will fail and will need to be replaced. This calls for efficient monitoring which provides precise alarms in fault situations. Monitoring tools also play an important proactive role by providing operational personnel with indications of problems at an early stage and enabling them to solve them before they become critical. 1.2 Limitations Network monitoring is closely related to and clearly overlaps with system and service monitoring. System and service monitoring play a corresponding role, but are directed towards servers and services. A third area is 5
6 client monitoring, the focus of which is the operation and maintenance of client servers in a network. In this document we will not consider system, service or client monitoring in detail. Neither does the document deal with the underlying operational processes, i.e. the activities, methods and procedures necessary for efficient, proactive ICT operations. This is clearly described in the ITIL Best Practice framework [8]. It should be remembered that network monitoring has no intrinsic value. It is exclusively a tool to assist ICT operational personnel. The purpose of such tools is to support the ICT department s activities, methods and procedures to ensure efficient operation, maintenance and development of the ICT infrastructure. Although the tools are important, remember that organisation, personnel resources, work methods and routines are substantially more important. Let us explain precisely what network monitoring actually is. Network monitoring represents a central element of Network Management, which is defined as activities, methods, procedures and tools which support the operation and maintenance of a network. A common way of characterising network management is FCAPS 1 - Fault, Configuration, Accounting, Performance and Security [9]. Network admin fields Fault management Configuration management Accounting management Performance management Security management Explanation Monitors the network and underlying components. Detects faults and transmits alarms. Maintains an overview of all components in the network. Supports the configuration of network equipment. Maintains an archive of change logs. Maintains an overview of traffic load and traffic types. Also evaluates the state of health of network equipment (CPU load, memory use, environmental data, etc.). Evaluates the performance of the network, including delay, packet loss, throughput and jitter (variation in delay). Monitors access to the network and its components. The Configuration Management and Security Management fields are considered to be outside the scope of network monitoring and will not be considered in this document. The main focus of network monitoring is fault management, in other words the monitoring of the network and generation of alarm signals in the event of failure. According to our definition, accounting management and performance management are also included in the term network monitoring. Chapter 2 provides a detailed description of these three functional areas. 1.3 Underlying technologies The most commonly used method for obtaining data from network equipment is based on the IETF standard, SNMP (Simple Network Management Protocol), described in detail in Attachment A. In 2006, IETF produced a new standard, NETCONF, which is intended to be the successor to SNMP, although it is not yet clear if this will happen in practice. NETCONF is described in Attachment B. 1 FCAPS is a network management framework defined by ITU-T which was first introduced through ISO early in the 1980s. 6
7 2 Functional areas and requirements We will here provide a detailed description of functional areas and requirements for network monitoring, using the classification given in Section 1.2, and dealing with the fields of fault, accounting and performance management. 2.1 Fault management Fault management consists of monitoring the components in the network, detecting faults and sending alarms. These are the most fundamental and important network monitoring tasks. If a component fails, you want an alarm, and you want it immediately Monitoring A network monitoring system will consist of a range of underlying monitors. The purpose of a monitor is to check regularly that everything is in order and, if not, transmit an alarm. When the fault has been rectified, the monitor will transmit a clean bill of health. A monitor is often dedicated to a particular function: A ping monitor checks that all equipment (routers, switches, wireless devices, servers etc.) is functioning. An interface monitor checks that interfaces and communications are operating. A module monitor checks that all modules in a modular switch or router are functioning. This includes monitoring of power supplies and fan modules. A threshold module transmits an alarm if traffic load, CPU load, etc. exceeds a pre-defined limit. A ping monitor uses an ICMP echo (ping), while interface, module and threshold monitors should be based on SNMP. All these monitors send alarm signals to the alarm system. Service monitoring also includes the service monitor which checks that all services are functioning. A good service monitor simulates the communication protocol of the service and verifies that it receives a reasonable response (checking that the TCP/UDP port is open is not enough). The following coarse filtering should be carried out on the monitors: Build robustness into the monitoring so that insignificant disturbances are not reported as repeated down and up alarms which create unnecessary noise. A better approach is to report such short-term disturbances as separate flap alarms. 7
8 Keep an eye on the network s condition and do not report a given down condition to the alarm system more than once. Ensure also that the associated up message can easily be related to the down message, so that the alarm system can confirm rectification of the event. In connection with threshold alarms, use hysteresis with two defined thresholds, one for bad system health and one for good system health 2. An example is that an alarm is wanted when CPU use reaches 90 % and this alarm is not cancelled until CPU use drops below 80 %. If the alarm were also cancelled at 90 %, this could potentially result in a series of alarms if the load oscillates around 90 % Alarm system Most monitoring systems provide simple mechanisms for transmitting an alarm signal when an incident occurs, for example by sending an to pre-configured addresses. A satisfactory alarm system must provide significantly more functionality than this. In Chapter 5 we argue that you will need several different tools in your monitoring portfolio. However, we recommend combining alarm and notification functions into a single tool, in which the various tools send their alarm signals to this one system. Figure 1 shows the recommended architecture. Figure 1: Monitors, alarm system and notification system The tool which contains the alarm system usually also has its own monitors. Internal alarm reports can be achieved by different proprietary methods, via a database or similar arrangement, but in the case of external monitors a standard means of communication must be used. For reasons of flexibility it is recommended that the alarm receiver supports both SNMP traps and . The alarm system must moreover have flexible mechanisms for interpreting external alarms in order to be able to classify them. In many cases it is unrealistic to adapt the alarm format of the external system, and hence it is an advantage to be able to make systemspecific interpretations in the central system. 2 Applies to alarms for thresholds measured on the ascending flank. 8
9 The purpose of the alarm system is to handle incoming alarm signals and put the various alarms into context. This analysis phase is important to provide the best possible picture of the alarm situation to the network operator (by way of the notification system). The alarm analysis consists of the following tasks: Rank alarms according to degree of seriousness. In the event of a major failure a very large number of alarms may be received simultaneously and it will be important to be able to distinguish important alarms from less important ones. Correlate alarms transmitted by different monitors. If the alarms are related with the same incident, filter out superfluous alarms or combine them into one common alarm. This may be difficult to achieve in practice. The alarm system must not have a detrimental effect on system robustness. One alarm too many is preferable to one too few. Also correlate alarms in relation to network topology. This requires that the alarm system has knowledge of the topology of the network. In the event of a major failure, the alarm system can thus reveal the root cause. For example when an important router is down, the monitor will not be able to know whether underlying components are in fact down (unless there is a redundant path). A network operator does not want hundreds of down messages in this type of situation, but one clear message indicating which central component is down. A mechanism for distinguishing between a down message and an unknown status message is recommended (which assigns lower priority to unknown status) Alarm console Handled or aggregated alarms are forwarded to the notification system which in turn forwards them to the relevant system operators (see below). The operators are also provided with an alarm console with which to check status. An intuitive interface will indicate conditions using red, yellow and green lamps. A red lamp provides a clear message that something is wrong. If a very large number of components or incidents are being monitored, the alarm console must support the grouping and hierarchical display of alarms, using groups and subgroups. In this way the number of lamps at the highest level becomes manageable and a red or yellow alarm lamp here can be pursued to the level below, or to the level below that, in order to find the source Notification system The purpose of the notification system is to transmit alarms to the operators. Typically, different operators will have different roles and/or areas of responsibility, so possibilities for configuration of individual alarm profiles are a reasonable requirement. An individual operator should be able to adjust his or her profile based on alarm priority, equipment type or category, or the area in which the alarm originates. One should also be able to flexibly select the notification channel for different categories of alarm. and SMS, at least, should be supported, and it would also be an advantage if instant messaging (IM), including, for example XMPP or IRC, was supported. A network operator should also be able to set up different alarm profiles for different times of day or night. For example, it may be preferable not to receive alarms during the evening hours unless one is on standby duty (this applies particularly to SMS notification). Alternatively one might want to receive high priority alarms also in the evening and at weekends. The notification system must be capable of queuing messages based on priority. This is essential to ensure that the most important alarms are received and are not lost in a queue of less important alarms. 2.2 Accounting management Accounting management is understood to mean mechanisms for maintaining an overview of traffic load and traffic types, as well as the state of health of network components. 9
10 2.2.1 Collecting traffic counters In order to keep track of the traffic volume in a network, one should regularly collect traffic counters from all router and switch ports (using SNMP). As a minimum requirement, the following data should be collected: Traffic in/out in terms of bytes (octets) and number of packets Error counts (faulty packets and dropped packets) Multicast/broadcast traffic volume We recommend collecting data from all ports in the network. The vast majority will never be looked at, but when an incident occurs it is an advantage to be able to study various tables and graphs from different statistical data sets in order to establish the probable cause of the problem. Without such data, investigation will be difficult and the cause may never be found. The data must be stored in an underlying database. Adequate data collection frequency is important to enable the identification of short periods of abnormal traffic patterns. The minimum recommended frequency is five minutes 3. Data should be stored for several years to facilitate trend studies. It will be most practical to aggregate older data to ensure that the total storage requirement is manageable. When aggregating data, the maximum and minimum values must be kept. The system must be flexible enough to make it possible to define the rules (time intervals) for aggregation. As a minimum requirement, it must be easy to produce daily, weekly and monthly statistics. Flexible mechanisms for searching the data and then presenting them in table or graphic form are essential. Good response time is also a basic requirement. The following components should be included: Topological network maps providing an overview of traffic flow in the network at a given time, with the present as the default time. The network map should be hierarchical, enabling one to concentrate on a particular part of the network. A flexible reporting system enabling the production of compiled reports and summaries. It must be possible to sort the reports by any column. Good graphical visualisation using various types of graph. It must be easy to plot different data sets in the same graph or in graphs presented one under another, with the same time axis. This will facilitate the examination of a given event by the operator. Trend analysis (Capacity Management in ITIL), i.e. analysis of traffic growth with time, enabling prediction of future growth, may also be included in the network monitoring system Network equipment health checks In addition to traffic counters, information should be collected from routers, switches and other network devices to provide a picture of their state of health. This includes: CPU load Memory use Disk use (NVRAM, flash disk) Power consumption, also at the PoE interface level Temperature sensors located in the equipment (preferably both at intakes and outlets) These data are also important for determining whether the network is functioning optimally. The requirements for storage, aggregation and presentation of such data are the same as for traffic counters data. 3 When using SNMP for data collection, a 5 minute interval will require 64-bit counters for traffic volume at gigabit rates. 10
11 2.2.3 Traffic types These are data which provide an overview of what types of traffic exist in the network, including an overview of which IP addresses communicate with which (both IPv4 and IPv6), with what volume (number of packets and number of bytes), and in what time periods. It must be possible to study the data in detail down to TCP/UDP level. Because keeping data relating to all such transactions in the network is naturally resource-demanding, one will also here have to have routines in place for the aggregation and deletion of data. The storage time and access to such data must be carefully considered and adjusted according to current personal data protection legislation. It must also be possible to combine the data to provide trend overviews with regard to: Top talkers (incoming and outgoing) Most used send and receive ports (TCP and UDP) Relationships between TCP, UDP, ICMP and other traffic Multicast traffic volume Traffic at autonomous system (AS) level. A system for collecting such data may be passive measuring equipment which sees all traffic passing central points in the network. Alternatively, routers may export such data to the network monitoring system. The IETF standard IPFIX (RFC 3917) should then be used. Alternatively, Cisco s proprietary NetFlow format may be used Machine tracking Machine tracking is a special field included in accounting management. It entails collecting IP-MAC bindings from routers (ARP cache), both for IPv4 and for IPv6, and bridge table data from switches, in order to obtain an overview of when and where (at which switch port) a given machine is/was connected to the network. When compiled, these data provide trends with regard to how many machines are in use in the different subnets, as well as the proportion of machines using IPv6. These data are also very useful in the event of security incidents in which a complaint is made against a given IP address at a given time. 2.3 Performance management The last area, performance management, evaluates the performance of the network, including delay, packet loss, output and jitter (variation in delay). It can be measured using probes located in the network which send test data to echo points in the network. Ping (ICMP ECHO) is often used for this purpose, but it is also possible to use UDP ECHO or other protocols. The following data must be saved: Round trip travel time Packet loss Jitter (variation in delay). A disadvantage of measurements based on round trip travel time is that it is not possible to know if any delay occurred on the outward or return journey through the network. An improvement may be to use one-way measurements, but this entails accurate synchronisation of the sender and receiver (preferably using a GPS antenna). Another possible weakness is that one cannot know at which hop in the network the problem occurred. If measurements are made at every router in the network, it will be easier to determine where the delay occurred. A potential source of error is that some routers will give very low priority to such requests and hence give an unnaturally poor response time. 11
12 A system in which end-users can measure their performance relative to a measuring point in the network is also a useful tool. A so-called Internet speedometer performs such a function. It is recommended to use a system which is capable of providing details about network performance, including packet loss, maximum packet size, and allocated buffer space in end systems, etc. Another important field is the measurement of quality. By studying the gap between packets and correlating it with time stamps in RTP headers, it is possible to assess the quality of the network with regard to the provision of audio and video streaming. 12
13 3 Robust monitoring To make the monitoring as robust as possible, one must consider a number of important framework conditions, including the strategic location of the monitor, monitoring of the monitor, SMS configuration and redundancy in the monitoring itself. 3.1 Location of the monitor The location of the monitoring service in a network must be carefully planned. A decentralised monitor has a higher probability of becoming isolated from the rest of the network and therefore unable to fulfil its function. The monitor should be located centrally in the network, close to the central servers. The monitor will then in most situations be capable of determining which services are operating and which users have lost communication with the network. To improve reliability further, monitors should be located in a subnet with a redundant outgoing route (via a protocol such as VRRP). Moreover, the server should have redundant power supply, the different supplies receiving their current from separate sources, ideally separate UPS sources. 3.2 Monitoring the monitor In spite of everything the monitor itself may die, or processes within the monitor may cease to function. Hence it is important to monitor the monitor. This is often overlooked, but should be given high priority. A monitor which ceases to function, unnoticed, may have unfortunate consequences if some undesirable incident should occur in the network. A simple way to monitor a monitor is to check that it responds to ping. A more advanced method is to check that all the necessary processes are operating, that the file system is not full, etc. The monitor of the monitor should be located at a physically separate location and should be capable of sending SMS messages directly to operational personnel. 3.3 Use of SMS as a notification channel As mentioned in Section 2.1, an alarm system should be capable of transmitting alarms using SMS as well as . SMS transmission can be achieved in a number of ways, for example via an SMS gateway on the Internet. However, this method is not recommended. The point of monitoring is that it shall be capable of providing a warning when cut off from the outside world. Hence, the most robust method is to have a mobile phone or similar GSM unit directly connected to a serial or USB port on the monitoring server. Be aware that the degree of coverage of the GSM network may be poor in a machine room which is located in basement premises or in the centre of a building mass. An additional external antenna may solve this problem. 13
14 3.4 Redundant monitoring Monitoring servers, like all other servers, must occasionally be shut down for maintenance, and this must be taken into account. Is it acceptable to manage without monitoring during such a planned maintenance window? If not, is it possible to use the monitor of the monitor to provide at least rudimentary monitoring of the condition of the network? One must be prepared for the possibility of a monitor failing, necessitating setting up a new server. Three alternative solutions to this problem are suggested: 1. Cold standby: Re-establish the monitor as quickly as possible. In this scenario one should monitor the monitor, have a standby server in storage and maintain a backup of the monitoring database and other data collected by the monitor, such as traffic statistics, server tracking data, logs, IPFIX and network flow data, etc. One should in addition have personnel on continuous standby and clear instructions for how such personnel shall re-establish the monitor if it should fail. 2. Hot standby: Replicate the monitor in a monitor which is kept on standby. This calls for continuous replication of monitoring data and monitoring of the primary monitor so that in the event of failure an alarm is sent to network operations who can then by means of simple manual operations put the secondary machine into operation. Such a manual operation would entail the secondary server taking over the IP address of the primary server and the monitoring process being manually started up on the secondary server. It may be possible to avoid changing IP address, but this will result in many potential problems, since a great deal is associated with the IP address or DNS name, including SNMP traps from network equipment, syslogs, alarms from external systems, SNMP filters in monitored equipment and the actual web interface of the monitor. 3. Use two active monitors which are mutually synchronised. This is a more complex configuration in which two servers monitor each other and are synchronised, and can seamlessly take over from each other. They should be located in two different places and should also monitor each other. Anycast 4 may potentially be used to avoid confusion with regard to IP addresses in external systems, but many factors must be taken into consideration if such mechanisms are to function. We will not go into this in detail here. Our recommendation is that this should be done relatively simply. After all, it is more important to build in a good degree of redundancy in the central services than in the monitoring itself (monitoring has no intrinsic value). Alternative 1 will be an adequate solution in most situations. 3.5 Virtual monitoring server If you choose to virtualise the monitoring servers, several new possibilities become available. One advantage is that it is easy to re-establish the monitoring service in the event of failure, although this does depend on having several blade systems, which themselves are redundant and have redundant, virtual architecture (based on VMWare, KVM, etc.). It also requires that one can continue using the same IP address for the replaced, virtual machine, cf. Section 3.4. By constructing a server environment which takes all this into account, one approaches a very good solution for service provision in general and network monitoring in particular. However, it is important to evaluate the robustness of such a configuration. A free-standing server which does not rely on anything but itself is potentially a more robust monitor than one which is incorporated in a blade system and virtual systems. Remember that it is also important to maintain a reliable monitor if the most serious 4 Anycast is a mechanism in which the same IP address occurs in two or more machines in different parts of a network. Routing announcements are given from all instances of the IP address. Other machines in the network will communicate with the machine that is closest to them. Anycast results in a natural load balancing and gives implicit redundancy. Stateless services such as DNS resolvers are very suitable for use as anycast services. 14
15 accident happens. Quickly identifying the fault source in an ongoing incident can significantly reduce the overall down-time for users. 15
16 4 Secure monitoring The following is a description of SNMP and NETCONF. Further details can be found in Attachments A and B. It is very important to maintain security with regard to your routers, switches and other network equipment. SNMPv3 is therefore recommended for network monitoring, as it ensures secure, encrypted communication between the monitor and SNMP agent. In future, NETCONF may be a good option, but at present there are too few implementations. However, in reality, very many network monitoring systems on the market are based on SNMPv2c. This does not provide adequate security. Traffic is transmitted in plain text, including the SNMP password (community) in use. This may be sniffed by a man-in-the-middle who can potentially obtain access to the network equipment by way of SNMP. This has unfortunate effects on SNMP read access rights and catastrophic effects on SNMP write access rights. With the latter, one has the ability to restart a router or switch and to modify or delete an entire configuration. In spite of these weaknesses we consider it advisable to use SNMPv2c for network monitoring. However, we do recommend implementing the following measures: 1. SNMP access to the network equipment should be limited as strictly as possible. No machines apart from the monitoring servers shall need to communicate with the network equipment by way of SNMP. 2. Management IP addresses of switches should be in a dedicated subnet with strictly controlled access. Wireless access points located in public areas should be located in yet another dedicated subnet (not mixed with switches). 3. Access to the monitoring system itself should be restricted to authorised personnel. This applies to network access via both SSH and HTTPS, and to physical access to the machine room. In the case of both SSH and HTTPS, user log-in does not provide adequate security. In addition the subnets which are permitted access to the server must be limited strictly. See also UFS122 [10] regarding recommended ICT architecture. 4. Be careful with autodiscovery of new hardware. This will typically imply probing all machines it finds in the network using the SNMP password (community). This makes it very easy for a third party to sniff this password. Autodetection in a restricted subnet without end-user access, such as a dedicated subnet for network equipment, is acceptable. Irrespective of which SNMP version is used, the following security perimeter is also recommended: 5. The web interface of the monitoring system should have a built-in authorisation system which makes it possible to restrict access at group level to a selection of the underlying web tools. 16
17 5 Acquiring a network monitoring system The review in Chapter 2 indicates that a network monitoring system must provide a very wide range of functions. Ideally, one should acquire a complete network monitoring system which supports all these functions. The alternative is a set of systems which in combination provide the required functions. We have a choice between two alternative system models as shown in Figure 2. Figure 2: Two alternative system models for network monitoring applications Let us look more closely at the advantages and disadvantages of the two alternatives before presenting our final summary and conclusions. 5.1 One complete system An obvious advantage of acquiring a complete system is that instead of having to worry about the integration between applications, one can deal with a standard user interface. If the system is commercially produced, good support facilities will presumably also be provided, with reliable guarantees for future system development, regular software updates, and so on. The installation and updating of the system can also be very simple and user-friendly. 17
18 Before acquiring such a large system, one should consider such things as: Purchase price compared with the acquisition of a set of smaller systems (in which some or all may have open-source code and be free). Some large systems can be rather expensive. Implementation of a large system demands resources, including hiring external consultants, personnel training, and so on. The start-up costs will often be higher than the purchase price. A support agreement, as opposed to managing alone. These running costs can also be significant. Possibilities for carrying out local adaptations or expansion. This is an important aspect which should not be underestimated. Almost without exception it is necessary to adapt or adjust a system to local conditions. For many systems, such adaptation will cost more than it is worth. There may be several reasons for this, such as a lack of configurability of the software, difficulty in accessing the code, high complexity of the system itself, and so on. If modifications are made to the program code, this may in the long run lead to problems because one must maintain the programs manually and repeat one s modifications in connection with future system upgrades. Remember that working time involved in adaptation is part of the overall calculation of cost. In many cases, such local adaptations will also necessitate hiring consultants. 5.2 A set of smaller systems If one decides to use a set of smaller applications, the initial investment and annual maintenance may be low or potentially free (open-source code). Moreover, provided they are modular and well documented, the result is a set of tools which can be adapted with a reasonable amount of effort. However, this is not free either, since one must allocate personnel to local adaptation under any circumstances. Nevertheless, replacing a partial system or a single application will be simpler. A disadvantage of small applications may be that it is not possible to sign up for a support agreement and/or that support and software upgrades are unreliable. A small, open-source application also entails greater risk of failing than a tool from a major supplier. This risk must be considered seriously. On the other hand, an active, open-source project with a large user community can function very well. The system will be well tested and code contributions can come from many sources. However, it is important that the project is backed by a reliable development team which can control and co-ordinate the development. However, if development should break down, one will, thanks to the open source, potentially be able to maintain and develop the system using one s own personnel. If one decides to invest in a number of individual applications, one should always be cautious. It can be a disadvantage to have too many systems in operation. Systems put into operation by individuals, and not used by the entire operational staff should definitely be avoided. Neither should tools in the portfolio overlap, at least as regards the functions of the individual application which one chooses to use. For example, several systems may each have their own service monitor or alarm systems, but one should choose a single system for these functions. One should endeavour to reduce complexity as far as possible. If the choice is between a distributed or a hierarchical set of monitors, each covering part of the network, as opposed to centralising this in a single machine, the latter is preferable. With the server power available today, this should not be a problem. More powerful CPUs, more memory and better disk I/O are parameters which can be adjusted relatively cheaply 5. A clear disadvantage of having many systems in operation is that operational personnel have to relate to many different interfaces. If each system has its own system for authentication and authorisation, this will also increase requirements with regard to duplication of configurations for user names and passwords, and so on. One should prioritise efficient integration between the systems. A superstructure using a common portal, as shown in Figure 2, with common authentication and authorisation, is a good model. One of the applications selected should be adapted to this function. 5 Note that for very large campus networks, it can prove to be difficult to achieve traffic collection of all switch ports from a single server. Hence, if a given task is to be distributed, a simple and tidy architecture should be chosen. 18
19 Another potential trap is that one duplicates or multiplies the effort required to maintain source data. Examples of such source data are information about the equipment to be monitored (with IP address, SNMP community, location, etc.), geographical information (name, location of machine or communications room, etc.) and organisational information (who is responsible for equipment). One should make an effort to achieve a common authoritative source (cf. Figure 2) for such data, so as to simplify maintenance and reduce the probability of inconsistency Summary and conclusion Let us compare the arguments put forward in the sections above: One commercial NMS Several open-source applications Purchase price Lowest Support agreement Lowest Replacing system Simplest in practice elements Integration between No problem applications Reliable management Can have advantages Frequent updating Can have advantages 7 In practice, however, the choice is more complex. For example, the small tools do not need to be open-source applications and one may naturally choose a larger commercial system and attempt to integrate small applications with this. This is also a question of economics and budgetary limitations, as well as whether one is used to, and wishes to carry on, one s own development. The latter is normally an option only for the larger communities, and this is also the way it has been in Norway. UNINETT and the major universities have benefited from communities where creative enthusiasts have had a free rein and have in time developed systems which have gradually improved day-to-day operations. For a smaller enterprise this is not a realistic option, and buying a complete system will therefore be an attractive option. However, it is important here to learn from our own experience, meaning the collective history of the HE sector. There are examples of institutes which have tried out large, commercial network monitoring systems and been disappointed. Based on the product specifications the systems have seemed highly promising, but in an actual installation deficiencies and weaknesses have been apparent. Rectifying these, either with the help of the supplier or by one s own adaptation, has in several cases proved to be both time consuming and costly. Of course, this is not necessarily the case. Products are being developed constantly and new ones are being added, but in general one should be sceptical of large systems which make ambitious promises and offer widespread functionality. Settling for several smaller applications with each individual one having a more specialised function, has been shown to be a more viable strategy 8. 6 As an alternative or supplement to manually feeding the system with source data, new components in the network may be detected automatically. This may be an advantage, as it is a better way of ensuring that a router or switch is not overlooked by the monitoring system. On the other hand, it may happen that components which one does not wish to monitor are included automatically. A combination of automatic and manual approval is the best solution. However, be aware that autodetection based on SNMPv2c can be a security risk, cf. Chapter 4. 7 Large NMSs can be cumbersome and may not be upgraded as frequently as active open-source applications. 8 Precisely this was an important motivation behind UNINETT s toolbox product [2] which was introduced during the GigaCampus programme [1] in The fact that UNINETT, on behalf of the sector, assumed responsibility for adaptation and development, has made it possible also for smaller colleges with low risk to select this type of platform. Such a model provides clear economies of scale savings. This has also been established by an independent consultant s report [11]. 19
20 A. SNMP SNMP stands for Simple Network Management Protocol and was originally defined as SNMPv1 in the following RFCs: RFC 1155, May 1990: Structure and Identification of Management Information for TCP/IP-Based Internets. RFC 1157, May 1990: A Simple Network Management Protocol (SNMP). RFC 1213, March 1991: (Version 2 of) Management Information Base (MIB) for Network Management of TCP/IP-based Internets. A long series of RFCs have subsequently been added, such as OSPF v2 MIB (August 91), BGP v3 MIB (October 91) and RMON MIB (December 91). SNMP consists of three fundamental forms of communication (see Figure 3): snmpget: The monitoring system polls the agents and collects the requested information (required MIB variable(s)). snmpset: The monitoring system changes the MIB variable in the agent in order to change the agent s configuration. snmptrap: The agent itself sends a message to the monitoring system when a given event occurs. Figure 3: Means of SNMP communication UDP is used as the protocol for SNMP, with the disadvantages this entails (UDP is connectionless and there is no guarantee that a packet will be delivered). It is also possible to implement SNMP using TCP, but this is in practice not very common. The information which the agent (the network equipment) makes accessible via SNMP is organised in a tree structure described as a Management Information Base (MIB). The tree structure and the syntactical structure itself is a standard. Important branches of the tree structure, including MIB-II, are also standardised. The MIB structure also permits private, proprietary sub-trees, enabling the various suppliers to offer system-specific information. Parts of the tree structure are illustrated in Figure 4. 20
21 iso (1) org (3) dod (6) internet (1) directory (1) mgmt (2) experimental (3) private(4) snmpv2(6) mib-2(1) enterprises(1) system(1) interfaces(2) at(3) ip(4) RMON(16) cisco(9) hp(11) sysdescr(1) sysobjectid(2) sysuptime(3) ciscoproducts(1) local(2) workgroup(5) lenv(1) linterfaces(2) Figure 4: Excerpt from the Management Information Base (MIB ) structure The leaf nodes in the tree structure contain information which can either be read (snmpget) or written (snmpset). Figure 4 shows three leaf nodes, (sysdescr, sysobjectid and sysuptime). As an example, the following query will return the uptime for trd-gw1.uninett.no: snmpget trd-gw1.uninett.no SNMP protocol has been improved several times. The security of SNMP is debatable and the first attempt at improvement came with Version 2, but the IETF work group could not agree and in January 1996, Version 2c (RFC1901) was adopted. In this, the SNMP password (community) is still transmitted unencrypted over the network and can potentially be sniffed (unless precautions are taken). SNMPv2c made other changes to the protocol, among other things introducing getbulk, which enables the transmission of large amounts of data in a single SNMP query. SNMPv2c also supports 64-bit counters (as opposed to the original 32-bit counters), which are necessary for monitoring traffic with gigabit rates. The most recent version of SNMP is Version 3 (RFC ), which was finally approved in 2004 and supersedes versions 1 and 2c. In SNMPv3, security has finally been improved. Authentication is now encrypted and one can also choose to encrypt the data transport itself. Although SNMPv3 has been an approved standard for many years, SNMPv2c continues to dominate in actual implementations. 21
22 SNMP requirements for network equipment When purchasing routers, switches and other network electronics, it is important to consider the equipment s ability to support different MIBs. This will vary from one manufacturer to another. Most often manufacturers have their own proprietary MIBs in which data is made accessible. This is valuable as a supplement, but it is very important that the IETF standard MIBs are fully supported. The monitoring system should for its part as far as possible base itself on data from the standard MIBs. In this way the monitor can function as a generic SNMP collector which can monitor equipment from a number of manufacturers. The following is a list of minimum requirements which network equipment should support: RFC 3418: MIB II RFC 2863: IF-MIB RFC 4293: IP-MIB RFC 4133: ENTITY MIB RFC 4188: BRIDGE-MIB RFC 4363: Q-BRIDGE MIB RFC 3635: EtherLike-MIB RFC 2368: MAU MIB (system data) (interface, including 64-bit traffic counters) (IP interface and ARP; IPv4 and IPv6) (modules, optics, software version, serial number) (bridge table for switches) (bridge table for VLAN, VLAN configuration) (duplex data for switch ports) (physical medium for ports, for example twisted-pair cable, fibre optic, etc.) 22
23 B. NETCONF One reason why the poor security of SNMP has been tolerated for so long is that the protocol in practice is mostly used for monitoring. For configuration of equipment, CLI is the most widespread method. There are several reasons for this, one being that CLI is text-based and easy to deal with. Besides, the majority of equipment suppliers do not implement full functionality through SNMP. An IETF work group was set up to consider an alternative protocol for configuring network equipment in a secure, scaleable and flexible manner. In December 2006 the work resulted in the Network Configuration Protocol, RFC 4741 (NETCONF). NETCONF provides mechanisms for installing, modifying and deleting the configuration of network equipment. The operations are implemented through an RPC (Remote Procedure Call) layer. NETCONF uses XML (Extensible Markup Language) based data encoding. NETCONF can be run with the help of several alternative transport protocols. Conceptually, NETCONF is divided into four layers: Layer Example Content Configuration data Operations <get-config>, <edit-config>, <notification> RPC <rpc>, <rpc-reply> Transport BEEP, SSH, SSL, console Protocol XML can be difficult to work with and a separate IETF work group, NETMOD, defined a more user-friendly modelling language, YANG, in RFC (October 2010). Work is in progress in the NETMOD work group to consider ways of improving NETCONF s compatibility with SNMP. So far, there are few implementations of NETCONF and YANG. 23
24 References [1] The GigaCampus programme ( ): [2] UNINETT s toolbox products: [3] UNINETT s beacon platform: [4] NAV (Network Administration Visualized): [5] Stager: [6] Software developed by UNINETT: [7] UFS 114 Fault-tolerant Campus Networks, [8] ITIL (IT Infrastructure Library), [9] FCAPS, [10] UFS122: Recommended ICT Security Architecture in the Higher Education Sector [11] GigaCampus profitability assessment, 4 July
25 Definitions CLI GBIC HSRP HTTPS IM IRC ITIL MIB NMS RCS RRD RSS SFP SNMP SSH TFTP UPS VRRP Command Line Interface GigaBit Interface Converter (fibre optics for GigaBit Ethernet) Hot Standby Routing Protocol (proprietary Cisco protocol) HTTPS is a secure version of HTTP, which is the communication protocol of the World Wide Web Instant Messaging Internet Relay Chat Information Technology Infrastructure Library Management Information Base Network Management System Revision Control System Round Robin Database Really Simple Syndication Small Form-factor Pluggable (same function as GBIC, but smaller form-factor) Simple Network Management Protocol Secure Shell Trivial File Transfer Protocol Uninterruptible Power Supply Virtual Router Redundancy Protocol 25
26 More Best Practice Documents are available at
Best Practices on Campus Network Monitoring. Ljubljana, October 20 2011 Vidar Faltinsen, UNINETT
Best Practices on Campus Network Monitoring Ljubljana, October 20 2011 Vidar Faltinsen, UNINETT We are convinced that most campuses do not take the task of measuring and understanding their traffic flows
Recommended Configuration of Switches in Campus Networks Best Practice Document
Recommended Configuration of Switches in Campus Networks Best Practice Document Produced by UNINETT led working group on LAN infrastructure (No UFS105) Authors: Børge Brunes, Vidar Faltinsen, Einar Lillebrygfjeld,
Infrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Recommendations for a redundant campus network Best Practice Document
Recommendations for a redundant campus network Best Practice Document Produced by UNINETT led working group on campus networking (UFS114) Authors: Gunnar Bøe, Vidar Faltinsen, Einar Lillebrygfjeld December
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
Network Monitoring with SNMP
Network Monitoring with SNMP This document describes how SNMP is used in WhatsUp Gold v11 and provides examples on how to configure performance, active, and passive monitors. Introduction SNMP (Simple
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
SNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
The use of SNMP and other network management tools in UNINETT. Arne Øslebø [email protected] March 4, 2014
The use of SNMP and other network management tools in UNINETT Arne Øslebø [email protected] March 4, 2014 1 UNINETTs network GEANT 3 4 What is monitored? Link status Are all connections up? General
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
1 Data Center Infrastructure Remote Monitoring
Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
Outline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Outline of the SNMP Framework Management Program
TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL5428E. www.tp-link.com
TP-LINK 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream L2 managed switch provides high performance, enterprise-level QoS, advanced security strategies and rich layer 2
Cisco Performance Visibility Manager 1.0.1
Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing
Using SolarWinds Orion for Cisco Assessments
Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
TP-LINK. 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch. Overview. Datasheet TL-SL3428. www.tp-link.com
TP-LINK TM 24-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch Overview TP-LINK JetStream TM gigabit L2 managed switch provides 24 10/100Mbps ports. The switch provides high performance, enterprise-level
Network Monitoring with SNMP
Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
SapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Special Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes
AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes Supported Platforms Please read this document before you begin to
(Refer Slide Time: 1:17-1:40 min)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 37 Network management Good day, so today we will talk about network management.
Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper
Nimsoft for Network Monitoring A Nimsoft Service Level Management Solution White Paper Nimsoft for Network Monitoring Table of Contents Nimsoft for Network Monitoring Solution Summary... 3 Solution Overview...
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference
SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any
A FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Choosing Tap or SPAN for Data Center Monitoring
Choosing Tap or SPAN for Data Center Monitoring Technical Brief Key Points Taps are passive, silent, and deliver a perfect record of link traffic, but require additional hardware and create a point of
SNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
AT-S63 Version 3.1.0 Management Software for the AT-9400 Basic Layer 3 Gigabit Ethernet Switches Software Release Notes
AT-S63 Version 3.1.0 Management Software for the AT-9400 Basic Layer 3 Gigabit Ethernet Switches Software Release Notes Please read this document before you begin to use the management software. Supported
OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0
Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring
Study of Network Performance Monitoring Tools-SNMP
310 Study of Network Performance Monitoring Tools-SNMP Mr. G.S. Nagaraja, Ranjana R.Chittal, Kamod Kumar Summary Computer networks have influenced the software industry by providing enormous resources
TP-LINK L2 Managed Switch
NEW TP-LINK L2 Managed Switch TM NEW TL-SL3428/TL-SL3452 Overview TP-LINK JetStream TM L2 managed switch TL-SL3428/TL-SL3452 provides 24/48 10/100Mbps ports, the switch provide high performance, enterprise-level
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
Cisco Small Business Managed Switches
Cisco SRW224P 24-Port 10/100 + 2-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches Secure, Reliable, Intelligent Switching with PoE for Growing Businesses Highlights Connects up to
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV
Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch
GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Introducing Tripp Lite s PowerAlert Network Management Software
Introducing Tripp Lite s PowerAlert Network Management Software What Can It Do For You? Improve the accuracy and efficiency of the network operations staff in the context of power and environmental management
Operations Manager: Network Monitoring
Operations Manager: Network Monitoring Phil Bracher Chris Maiden Agenda Network Monitoring Overview Network Monitoring Features Out of the box discovery, monitoring, dashboards & reporting. Server to network
ENC Enterprise Network Center. Intuitive, Real-time Monitoring and Management of Distributed Devices. Benefits. Access anytime, anywhere
Scalability management up to 2,000 devices Network and device auto-discovery Firmware upgrade/backup and device configurations Performance alerts and monitoring ZyXEL switch specialized in RMON management
TP-LINK. Gigabit L2 Managed Switch. Overview. Datasheet TL-SG3216 / TL-SG3424. www.tp-link.com
TP-LINK TM Gigabit L2 Managed Switch TL-SG3216 / TL-SG3424 Overview TP-LINK JetStream TM gigabit L2 managed switch 3 series family consists of two switches: TL-SG3216 with 16 10/100/1000Mbps ports and
Monitoring Your Network
CHAPTER 17 Date: 3/22/13 When naming ACE objects (such as a real server, virtual server, parameter map, class map, health probe, and so on), enter an alphanumeric string of 1 to 64 characters, which can
N5 NETWORKING BEST PRACTICES
N5 NETWORKING BEST PRACTICES Table of Contents Nexgen N5 Networking... 2 Overview of Storage Networking Best Practices... 2 Recommended Switch features for an iscsi Network... 2 Setting up the iscsi Network
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
SNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Network Management Card. User Manual
User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
BlackBerry Enterprise Server Version: 5.0. Monitoring Guide
BlackBerry Enterprise Server Version: 5.0 Monitoring Guide SWD-567890-0331093029-001 Contents 1 BlackBerry Enterprise Server monitoring solution... 5 BlackBerry Monitoring Service... 5 Web address and
Elfiq Link Load Balancer Frequently Asked Questions (FAQ)
lin Elfiq Link Load Balancer Frequently Asked Questions (FAQ) For Elfiq Operating System (EOS) version 3.1.x Document Revision 1.8 May 2006 Elfiq Solutions www.elfiq.com Page 2 / 14 Table of contents 1
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
SOLARWINDS NETWORK PERFORMANCE MONITOR
DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems
SNMP Web card User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Features... 3 1.3 Overlook... 3 1.4 Installation and
