How To Create A Distributed Virtual Network Control System

Size: px
Start display at page:

Download "How To Create A Distributed Virtual Network Control System"

Transcription

1 Network Management Framework: A Distributed Virtual NOC Architecture Octavian Rusu RoEduNet Iasi Branch Iasi, Romania octavian@roedu.net Abstract Today s networks superpose multiple sets of services belonging to different participants (universities, research networks, governmental organizations) on the same communication infrastructure (data backbones, operator s NOCs). Each of the participants should implement different services and different policies, without deploying full size personnel at every node location. We propose a model that illustrates the way a participant should organize and manage its network presence with minimum investment and maximum efficiency. The model is based on a structure named Distributed Virtual NOC, which contains a centralized component, allows delegation of different tasks and services to remote locations, but keeps the global behavior coherent by implementing distributed control mechanisms in both geographic and service dimensions. An implementation of the model based on Open Source software with web management interfaces was developed successfully by RoEduNet Iasi. The general structure of Distributed Virtual NOCs, together with concrete issues and solutions of the implementation are presented in this paper. 1. Introduction There are three classical strategies used in network management: centralized, distributed and hierarchical. These strategies work fine when there is a clear separation of the networks based on physical criteria, and when each network is observing a single set of rules and a unique management for its entire activity. Network management is defined as the mechanism used for monitoring, controlling and coordination of all managed objects within the Physical and Data Link Layer [1]. System Management is active through Application Layer protocols and provides mechanisms for monitoring control and coordination of all managed objects within open systems. In this paper we will include all the activities under System management in the generic term of network management. Modern trends in network development, especially in the academic and governmental worlds, are to use a collective financial and personnel effort to build and maintain networks. In such cases, the notion of standalone ISP tends to soften up being replaced by a group Florin B. Manolache Mellon College of Sciences Carnegie Mellon University Pittsburgh, PA, USA florin@andrew.cmu.edu of specialists under multiple authorities that are supposed to implement a different set of rules and policies on different traffic and services. To optimize the network management for such cases, we present a model that has both centralized and distributed features. The model is based on the idea of Distributed Virtual Network Operation Centers (DVNOC). The structure of a DVNOC has roots in the distributed network management paradigm, but some of the distributed components were replaced by centralized ones plus a set of software packages that supplement the communication channels and the consistency of different components. The centralized models are less expensive to operate, but exhibit poor flexibility and long response time to provide a consistent behavior. The distributed models have high operating costs. The DVNOC model tries to extract the advantages from both groups of strategies, by starting from a distributed structure and then move as many components as possible to a centralized implementation without importantly affecting the overall flexibility and efficiency, but decreasing the operating costs as much as possible. According to OSI (FCAPS model [1]) there are five components involved in network management and three components used for service management. We see the two classes of components as different dimensions of the DVNOC architecture implementation: the network management covers the geographical dimension, and the service management covers the services dimension. Every decision provided by our model is determined by the two types of criteria: (a) local traffic and conditions observed by the NOC operators and (b) type of service. This kind of perspective, fundamental to the DVNOC structure, helps combine the consistency of the services offered to the network clients, with the flexibility of adapting fast to the local traffic constraints. The following components are used for network management[1]: 1. Configuration management - detects and controls the state of the network. 2. Performance management - controls and analyses throughput and error rate. 3. Fault management is responsible for detecting, isolating and controlling abnormal behavior. 221

2 4. Accounting management collects and processes data about resource consumption in the network. 5. Security management deals with access control. The components of the service management are: 1. Monitoring - involves gathering data about the network 2. Control - manipulation of devices 3. Reporting - abnormal events are reported Modern network management solutions must deal with all components described above. The challenge consists in balancing the network management components between centralized and distributed approaches. As the DVNOC architecture and implementation will be described in the next sections, we ll keep track of these components and of their possible distributed/centralized character or even the redundancy of some components, to balance between a clear view of the network status and the elements involved in network operation. Section 2 describes the structure of the DVNOC architecture and information flow within management structure and Section 3 proposes Open Source software that fits into the DVNOC framework. 2. The Distributed Virtual NOC Architecture This Section studies the optimal architecture of a DVNOC, including the structural units, their responsibilities, and the relations between them. NMCU NMEU ESP # SSU # Help Desk APMs NOCs Figure 1. The structural entities of a DVNOC. As shown in Figure 1, the DVNOC model implies a series of entities that work on top of the physical network infrastructure offered by the operators. These entities take care of the implementation of the network management components described in the previous Section. The Network Management Coordinating Unit (NMCU) is the administrative management body that proposes and supervises the network policy, network development, and service implementation at the highest level. Some of its main functions are: sets up the main network policies, including the network evolution and upgrades of the equipments and services; establishes relations and appoints services with External Service Providers (ESPs); performs the high level design of all services; decides about special solutions and services by appropriate Special Solutions Units (SSU); coordinates the Network Management Executive Unit (NMEU) activities; The Network Management Executive Unit (NMEU) is the supervising technical unit that implements the decisions and policies of NMCU. It has write access to the networking equipment and performs the following functions: is responsible for the technical integrity of the services provided on the network; implements new services using configuration solutions provided by SSUs; technically defines and modifies network policies; plans network development; operates a Help Desk which interacts with: o o o APMs; ESP, to provide fault isolation and management of the lines and/or services supervised by a different authority; SSUs during testing period for new services. The Special Solutions Units (SSUs) are specialized task teams distributed in the service dimension, i.e. one per service or class of related services (e.g. IPv6, VoIP, etc.). One advantage of this approach is that different solutions, plans, or service implementations can be outsourced. These teams have limited access to the networking equipment and have the following main functions: provide studies for proposed services by NMCU, specifying issues of interest for the network objectives and policies; provide configuration files for network equipment to implement the proposed services; interact with NMEU during service activation; report through the Help Desk problems related to a service; 222

3 monitor service operation using network management tools during the implementation period. The Access Port Managers (APMs) are geographically distributed teams (one for each NOC) responsible for the local NOC activities. Their main functions are to: monitor the network operation in their area of authority; configure the local communication equipment; monitor the implementation of the services within their NOCs; interact with NMEU to maintain the centralized management system; interact with the users at the NOC level. Figure 1. shows the communication channels between different Units. The Network Management Coordinating Unit regularly communicates with the Network Management Executive Unit and the Special Solutions Units, to guarantee efficient problem solving and network operation. NMCU is also responsible for a high level interaction with the External Service Providers, dealing with issues such as ordering of new communication capacities, etc. Network Management Executive Unit is the technical core of the management team for the entire network. NMEU is the main node of communication between management entities, interacting directly with the APMs that support the network. NMEU operates the Help Desk and a Trouble Ticket System witch is the main communication channel to NMEU. If user level support must be offered, Help Desk representatives can be distributed to the NOCs and coordinated by APMs. Help Desk, with centralized or distributed components, must be operated by qualified personnel that should provide first level support, and should channel advanced requests to the appropriate authority via a trouble ticketing system. The NMEU, through the Help Desk group, communicates with External Service Units for fault management purposes and installation issues. Trouble Ticket System (TTS) must be unique in the entire management structure to provide a unitary consistent image of faults and events. At the same time tickets related to different types of events should go to different queues, to separate activities and to filter the right information to the right people. The main advantage of the proposed framework is that all information flows through the NMEU to provide a centralized character to the network operation. In the same time a distributed character is achieved through APMs and SSUs: APMs provide network management and user support within a geographical area of authority, SSUs are responsible for particular services implementation on the entire network. It should be noticed that SSUs do not interact directly with APMs. Their interaction is handled by NMCU which assures the consistency of all operations. The next Section analyzes several implementation components of the DVNOC model. 3. Implementation. Open Source Software The DVONC model can be implemented for a wide range of cases where cvasi-independent networks offering different services and observing different local policies, must coexist and share hardware and human resources. Typical cases are: a national resource (e.g. a connection to an international research network) shared by joint regional networks, a campus network composed of departmental networks. The general approach does not depend on the network topology and management structure, even the implementation is mostly independent on the concrete conditions. In this Section we extracted some common tasks, features, and tools that can provide opportunities of centralized implementation for some network management components. We considered as an important issue when distributed versus centralized strategies are weighted, the amount and the type of the traffic overhead produced by centralizing a management component. Experimental determination of an upper limit for the ICMP traffic and of the implications of large amount of UDP traffic associated with SNMP should be very useful for networks that are expected to operate most of the time close to the maximum capacity. Other related issues are the operating environment of the network management software and the amount of alarms generated when a section of the network is unreachable. Also, the security of the transactions involved by the management of distributed network devices is important: all traffic generated by management activities should be secured such that sensitive information cannot be spoofed or intercepted. The first component of the network management, configuration management, should be implemented in a manner that allows SSUs read-only access to the configuration files of the network equipment, and write access for NMCU and APMs. NMCU and SSUs should have access to all the equipment, and APMs should have access only to devices within their area of responsibility. To provide secure access to network devices, each NOC has to provide a secure channel for each of the managed device. This is done either using an encrypted connection (SSH access) directly to the device or through a management UNIX workstation on the same secured LAN with the device. Access to the 223

4 management workstation is allowed only for NMEU staff and the local APM. Read-only access is used by SSUs and can provide a fast way to directly access devices for monitoring purpose. Good tools for fast web based (read-only) access to the routers are fundamental for the efficiency of the SSUs. Such software should have the following features: user level access authorization; configuration file viewer; interfaces status and parameter viewer; IP routing table and/or single IP route viewer; routing protocols status viewer; simple debugging tools (ping and traceroute); router command line interface. A good tool for this purpose is Looking Glass [4]. Looking Glass can be installed distributed on the network, the centralized element being the web server that provides the unique interface for all managed devices. The transactions can be encrypted using https protocol. Figure 2 shows an example of Looking Glass usage though web interface. distributed. By using a web interface, public and private access can be offered. Figure 3 shows an example for output of Cricket. Figure 2. Looking Glass. The performance management component must be implemented hierarchical. This is necessary because, usually, necessary data to build reports for traffic values, error rates, CPU load device temperature. etc., are obtained using SNMP form different devices. Under a loaded network, a centralized implementation for the software used for performance management can lead to false alarms. In this respect, a distributed approach provides good results. The centralized component is achieved by using a single web based interface for the entire network. Following the Open Source approach, there are many software tools that are used for traffic and error rates reporting. In this respect, useful software is Cricket based on MRTG/RRD [6], [7] and Weathermap [5]. Both this solutions can be implemented centralized or Figure 3. Traffic monitoring with Cricket. Reports are available based on SNMP access to devices on the network. Transaction security for this component can be achieved using SNMPv3, a new SNMP protocol framework which is already available. The security component for SNMPv3 was proposed in RFC 2274 and described by the User-based Security Model (USB). The USB model defines elements of procedures for providing SNMP message-level security, and is supposed to protect against modification of information, masquerade, and disclosure. The USB uses MD5 (Message Digest Algorithm) and the Secure Hash Algorithm to provide data integrity, to directly protect against data modification attacks, to indirectly provide data origin authentication, and to defend against masquerade attacks. Data Encryption Standard (DES) is used to protect against disclosure. One of the most important components to be analyzed is the fault management. It consists in 3 steps: identify the problem, isolation, and correction. The first step is achieved by monitoring the network and looking for signatures of typical problems. If a signature is detected, a fault is reported (automatically or by the support personnel) to the Help Desk, issuing a trouble ticket. Depending on the importance of the problem, different entities could be required to take the appropriate decision and perform the isolation. Correction can be done either centralized or distributed 224

5 considering the nature of the fault and area of authority. An important component that can be centralized is monitoring. Good monitoring is essential for fast fault isolation. Specialized tools are needed for: monitoring of host, routers, resources, and environment (SNMP); monitoring of network services (HTTP, SMTP, FTP). Serious monitoring software should have as many as possible of the following features: contact notifications - , pager, phone.; ability to define event handlers for service and host events; capability to scheduled downtime for suppressing host and service; web interface for viewing current network status, notification and problem history, log file, etc.; support for user defined plug-ins to perform service checks; hierarchical user authorization for access to the web interface; A good quality Open Source package that was tested by us and offers the above features is Nagios [8]. An output of Nagios is shown in Figure 4. Figure 3. Tactical Overview screen of Nagios. Accounting management is a component that, in the most cases, uses important network resources. A distributed approach is the best solution to use to fulfill this task. There are few options for accounting management solutions using Open Source software, due to strong relation between different types of equipment involved in the final accounting scheme. A reliable package, IPaccounting, is available from Istituto Nazionale di Fisica Nucleare, Italy. Other approaches based on traffic flow are available. Network security management implementation depends on the network structure and on the responsibility of each NOC to the local users for the offered services. There are two aspects involved in network security management: security of the network devices and security of the network services. In consequence, network security management involves: a set of permissions that limits access to networking equipment by username/ip address; notification policies and action plans to annihilate security-related violations as e.g. DoS attacks. There is no generally valid solution. Network security management cannot be classified as centralized or distributed. A centralized view of the entire component can lead to better network policy enforcement, but a distributed implementation of the software that is actually used for detecting and blocking network attacks is more efficient. Both, accounting management and network security management, typically use the same distributed/centralized scheme, and a common reliable solution is based on traffic flow analysis. A very good tool for network security management is Snort, an Open Source network intrusion detection system. Snort is capable of realtime traffic analysis and packet logging on IP networks ( A web interface for Snort is available and permits to centralize the results at the top level of the network management still using a distributed scheme. Snort uses a flexible rule-based language to describe traffic that should be collected or passed, as well as a detection engine based on modular plug-in architecture. A real-time alerting capability is available. Other tools that deal directly with the network equipment (usually Cisco routers) are available. Such a tool, available as Open Source, is under development by a RoEduNet team ( Finally, no centralized/distributed hybrid network management system can be implemented efficiently without a good trouble ticket system as the core of the Help Desk. The Help Desk is the main mechanism to efficiently centralize parts of the network management components. All the problems appearing on the network are gathered by the Help Desk, and trouble tickets are issued. A trouble ticked should include the following information: the APM that reported the problem; the entity that should consider solving the problem (CNMSE and possibly some SIEs); description of the problem. The management entity charged with a trouble ticket will report to the Help Desk on the status of the ticket. A trouble ticket will be considered having an OPEN status as long as the problem was not solved. 225

6 When the problem is solved the trouble ticket will become CLOSED. For all trouble tickets that are OPEN, the Help Desk will send regular updates describing the actions that have been performed, as well as what is to be done. For obtaining this information, the Help Desk will regularly communicate with all involved parties (NMEU, SSU and APMs). The most useful features of a good ticket system are: web-based interface with user level authentication; support of multiple queues (administrative, technical, etc.); interface for ticket submitting and operation via ; granular user access control (requestor, watcher, admin, owner, etc.); SQL database storage system; hierarchical ticket linking system (parentchild relationships); customizable templates for system messages. We had a good experience with Request Tracker ( that provides all the above features. 4. Conclusions DVNOC framework, based on a centralized/distributed approach of functions to be fulfilled by a network management infrastructure, is proposed. This framework establishes the responsibilities of each unit involved in the management of a network structure with branches spread over a large geographical area and offering services to a number of different institutions. The DVNOC model for network management offers good opportunities to optimize both the performance and the operating costs of multiple networks using the same communication infrastructure. Due to the precise split of functions to different groups, and to the optimization of communication channels, a DVNOC architecture can be implemented using a mix of distributed and centralized strategies. To help realize such a mix, several free software packages were tested by the authors and are recommended. An important advantage of this approach to be emphasized: operation of NOCs and even the service implementation procedures are distributed and can be outsourced. We recommend the implementation of such a model for the management of fluid network structures, such as research and governmental networks, which have fluctuating operating budget provided by different sources and are offering an ever changing set of services to communities with heterogeneous resources. References [1] Udupa, Divakara K., Network Management System Essentials, McGraw-Hill, U.S.A., [2] Udupa, Divakara K., TMN-Telecommunications Management Network, McGraw-Hill, U.S.A., [3] Stallings W., SNMP and SNMPv2: The Infrastructure for Network Management, IEEE Communications Magazine, March [4] [5] [6] [7] [8] 226

Edu. Network Management Framework: A Distributed Virtual NOC Architecture. DVNOC Model. Octavian RUSU octavian@iasi.roedu.net

Edu. Network Management Framework: A Distributed Virtual NOC Architecture. DVNOC Model. Octavian RUSU octavian@iasi.roedu.net R O M A N I A N E D U C A T I O N N E T W O R K Ro work Management Framework: A Distributed Virtual NOC Architecture DVNOC Model Octavian RUSU octavian@iasi.roedu.net Florin B. MANOLACHE florin@andrew.cmu.edu

More information

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1 Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations

Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contract Number: IST-2000-26417 Project Title: Deliverable D8 : Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations Contractual Date: 31 May 2002 Actual Date: 14 August

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Network Management & Monitoring Overview

Network Management & Monitoring Overview Network Management & Monitoring Overview Advanced cctld Workshop September, 2008, Holland What is network management? System & Service monitoring Reachability, availability Resource measurement/monitoring

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Comparison of SNMP. Versions 1, 2 and 3

Comparison of SNMP. Versions 1, 2 and 3 Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

The Virtual Network Operations Center and Network Management Framework in SEEREN

The Virtual Network Operations Center and Network Management Framework in SEEREN The Virtual Network Operations Center and Network Management Framework in SEEREN Jorge-A. Sanchez-P. (main contact), Constantinos Kotsokalis, GRNET Mesogion Avenue 56, GR-11527, Ampelokipi, Athens, Greece

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

A SURVEY ON AUTOMATED SERVER MONITORING

A SURVEY ON AUTOMATED SERVER MONITORING A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. priscillapersis@gmail.com Abstract This paper covers the automatic way of server

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

RAVEN, Network Security and Health for the Enterprise

RAVEN, Network Security and Health for the Enterprise RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Network monitoring systems & tools

Network monitoring systems & tools Network monitoring systems & tools Network & Service Monitoring tools Nagios server and service monitor Can monitor pretty much anything HTTP, SMTP, DNS, Disk space, CPU usage,... Easy to write new plugins

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into

More information

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0 Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Network Monitoring and Management Introduction to Networking Monitoring and Management

Network Monitoring and Management Introduction to Networking Monitoring and Management Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

CARENET-SE. NOC Tools Review. Communication System Design Summer 2010. Project team. Champion Björn Pehrson Coach Hans Eriksson

CARENET-SE. NOC Tools Review. Communication System Design Summer 2010. Project team. Champion Björn Pehrson Coach Hans Eriksson NOC Tools Review CARENET-SE Communication System Design Summer 2010 Project team IK2207 Alin Pastrama pastrama@kth.se Champion Björn Pehrson Coach Hans Eriksson IK2207 Annika Holmgren annika.holmgren@gmail.com

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Introduction to Network Monitoring and Management

Introduction to Network Monitoring and Management Introduction to Network Monitoring and Management Jonathan Brewer Network Startup Resource Center jon@nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Monitoring Traffic manager

Monitoring Traffic manager Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Network Management - SNMP

Network Management - SNMP Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow

More information

PROTECTING NETWORKS WITH FIREWALLS

PROTECTING NETWORKS WITH FIREWALLS 83-10-44 DATA SECURITY MANAGEMENT PROTECTING NETWORKS WITH FIREWALLS Gilbert Held INSIDE Connecting to the Internet; Router Packet Filtering; Firewalls; Address Hiding; Proxy Services; Authentication;

More information

WhatsUp Gold vs. Orion

WhatsUp Gold vs. Orion Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Network Monitoring and Management NetFlow Overview

Network Monitoring and Management NetFlow Overview Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes

More information

CA Spectrum and CA Performance Center

CA Spectrum and CA Performance Center CA Spectrum and CA Performance Center Integration Guide CA Spectrum Release 9.3 - CA Performance Center r2.3.00 This Documentation, which includes embedded help systems and electronically distributed materials,

More information

Cisco Advanced Services Network Management Systems Architectural Leading Practice

Cisco Advanced Services Network Management Systems Architectural Leading Practice Cisco Advanced Services Network Management Systems Architectural Leading Practice Contents Introduction Preface Intent Network Management Goals and Requirements Operational Goals Functional Requirements

More information

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

CS2107 Introduction to Information and System Security (Slid. (Slide set 8) Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

AfNOG 2010 Network Monitoring and Management Tutorial. Introduction to Networking Monitoring and Management

AfNOG 2010 Network Monitoring and Management Tutorial. Introduction to Networking Monitoring and Management AfNOG 2010 Network Monitoring and Management Tutorial Introduction to Networking Monitoring and Management Part I: Overview Core concepts presented: What is network monitoring What is network management

More information

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS.

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. MarWatch Fault & Performance Management SaaS REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. Detecting and resolving problems on today s increasingly complex business communications networks is a

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

CheckPoint FireWall-1 Version 3.0 Highlights Contents

CheckPoint FireWall-1 Version 3.0 Highlights Contents CheckPoint FireWall-1 Version 3.0 Highlights Contents Abstract...2 Active Network Management...3 Accounting... 3 Live Connections Report... 3 Load balancing... 3 Exporting log records to Informix database...

More information

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP -overview. Based on: W.Stallings Data and Computer Communications SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use

More information

Wireless Controller DWC-1000

Wireless Controller DWC-1000 Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Router Security - Approaches and Techniques You Can Use Today

Router Security - Approaches and Techniques You Can Use Today Router Security - Approaches and Techniques You Can Use Today Neal Ziring System and Network Attack Center Information Assurance Directorate National Security Agency 1 Introduction and Outline GOAL: Define

More information

Network Management & Monitoring Overview

Network Management & Monitoring Overview Network Management & Monitoring Overview Unix & Network Management June 16-18 Papeete, French Polynesia Hervey Allen, Phil Regnauld Introduction This is a big topic... We'll try to respond to what you

More information

How To Block A Ddos Attack On A Network With A Firewall

How To Block A Ddos Attack On A Network With A Firewall A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz 8/26/2007 Network Monitor Analysis Preformed for Home National Bank Paul F Bergetz Network Monitor Analysis Preformed for Home National Bank Scope of Project: Determine proper Network Monitor System (

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

Identifying functional and Performance related issues in a network based on Auto Test Packet generation

Identifying functional and Performance related issues in a network based on Auto Test Packet generation Identifying functional and Performance related issues in a network based on Auto Test Packet generation Kanakati Sravan Kumar M.Tech Student Department of CSE Sri Venkateswara Engineering College-Suryapet

More information

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1 NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865 NOVEMBER 25, 2013 SNMP SECURITY 2 ABSTRACT As a Network Monitoring System Administrator I have gained a substantial amount

More information

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS.

REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. MarWatch Fault & Performance Management SaaS REDUCE DOWNTIME. DRIVE REVENUE. LOWER SUPPORT COSTS. Detecting and resolving problems on today s increasingly complex business communications networks is a

More information

Wholesale Dial NMS Case Study

Wholesale Dial NMS Case Study CHAPTER 3 The chapter presents a case study illustrating a network management system designed to meet the requirements of a wholesale dial network. The design presented here uses components intended to

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

Network Management Deployment Guide

Network Management Deployment Guide Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Microsoft 70-246. Version: Demo 30.0

Microsoft 70-246. Version: Demo 30.0 Microsoft 70-246 Monitoring and Operating a Private Cloud with System Center 2012 Version: Demo 30.0 QUESTION NO: 1 System Center 2012 Operations Manager (SCOM) is used to monitor all network devices.

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

Network Manager 6.1. Network operations management software. NEC Corporation

Network Manager 6.1. Network operations management software. NEC Corporation Manager 6.1 operations management software NEC Corporation Product Overview Product Features Functions and Features System Examples Product Information (details) Page 2 Page 3 Product Overview MasterScope

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Networking Basics and Network Security

Networking Basics and Network Security Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,

More information

Chapter 6.2: Network Management

Chapter 6.2: Network Management Chapter 6.2: Network Management NGUYỄN CAO ĐẠT E-mail:dat@hcmut.edu.vn 1 Outline Network Management Standards Network Management Configuration Network Operations Center (NOC) 2 Network Management Standards

More information

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC Background and Overview The Computer Security Incidents Internet2 (CSI2) working group organizes activities to better identify

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System

Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System xii Contents Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System Access 24 Privilege Escalation 24 DoS

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Introduction to Netflow

Introduction to Netflow Introduction to Netflow Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information