NETFLOW FOR ACCOUNTING, ANALYSIS AND ATTACK
|
|
|
- Thomas Gilmore
- 10 years ago
- Views:
Transcription
1 NETFLOW FOR ACCOUNTING, ANALYSIS AND ATTACK Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University
2 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
3 Introduction Goals Service providers must have access to in-depth infomation about their networks A complete view of current use Understand the behavior of their networks Network Problem Determination and Analysis Network security attack detection and prevention Detailed network usage history reports Analytical tools to analyze and predict usage trends Plan for network deployment and expansion Etc. Usage-based Billing, SLA monitoring
4 Introduction Challenges Capturing Characteristics How to capture traffic characteristics from high-speed, high volume networks (Mbps Gbps Tbps)? Analysis How to analyze and generate data needed quickly? Evolving network applications Streaming media (Windows Media, Real, Quicktime) P2P traffic Network Security Attacks Log Generation & Storage What kind of information to save to perform various/long-term analysis? How to minimize storage requirements?
5 Tools Taxonomy IN T A 75 N e t 110 OUT 2 Data Collect RTFM RMON Netflow SNMP PacketDump Analysis Tools cflowd Flow-tools Flowscan Panoptis MINDS Traffic Engineering, User Monitoring, Billing. DDOS, Virus, Worms
6 Data Collection SNMP Data Simple Network Management Protocol (SNMP) Router CPU utilization, link utilization, link loss, Collected from every router/link every few minutes Applications Detecting overloaded links and sudden traffic shifts Measuring link utilization Advantage Open standard, available for every router and switch Disadvantage Coarse granularity, both spatially and temporally Version consistency
7 Data Collection Flow-Level Traces Flow monitoring (e.g., Cisco Netflow) Measurements at the level of sets of related packets Set of packets that belong together Source/destination IP addresses and port numbers Same protocol, ToS bits, Same input/output interfaces at a router (if known) Number of bytes and packets, start and finish times Applications Computing application mix and detecting DoS attacks Measuring the traffic matrix for the network Advantages Medium-grain traffic view, supported on some routers Disadvantages Not uniformly supported across router products Large data volume, and may slow down some routers
8 Data Collection Packet-Level Traces Packet monitoring IP, TCP/UDP, and application-level headers Collected by tapping individual links in the network Applications Fine-grain timing of the packets on the link Fine-grain view of packet header fields Advantages Most detailed view possible at the IP level Disadvantages Expensive to have in more than a few locations Challenging to collect on very high-speed links Extremely high volume of measurement data
9 Business Requirements How do I efficiently track network and application resource usage? How do I know if my customers are adhering to usage policy agreements? How do I account and bill for resources being utilized? How do I effectively plan to allocate and deploy resources most efficiently? How do I track customers to enhance marketing customer service opportunities?
10 Accounting What For? Network monitoring Network planning Security analysis Application monitoring and profiling User monitoring and profiling Traffic engineering Peering agreements Usage-based billing Destination sensitive billing
11 Accounting vs. Billing Steve SAP Accounting Application Billing Application Src Add Dest Add User Resource Steve SAP
12 Accounting Why? Baselining, Performance Network monitoring Application monitoring User monitoring Trends, statistics Deviation from normal History
13 Accounting Why? Network Design Capacity planning Traffic engineering Source Rome POP Paris POP ISP2 ISP3 Dest. Munich POP London POP
14 Accounting Why? Peering Agreements ISP
15 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
16 NetFlow Origination Developed by Darren Kerr and Barry Bruins at Cisco Systems in 1996 US Patent 6,243,667 The value of information in the cache was a secondary discovery Initially designed as a switching path NetFlow is now the primary network accounting technology in the industry Answers questions regarding IP traffic: who, what, where, when, and how
17 Principle NetFlow Benefits Service Provider Peering arrangements Network planning Traffic engineering Accounting and billing Security monitoring Enterprise Internet access monitoring (protocol distribution, where traffic is going/coming) User monitoring Application monitoring Charge back billing for departments Security monitoring
18 NetFlow Enables Traffic Analysis and Monitoring for Network Planning Usage-Based Billing Router Feature Acceleration NetFlow statistics empowers users with the ability to characterize their IP data flows The who, what, where, when, and how much IP traffic questions are answered
19 NetFlow s Value NetFlow enables IP traffic flow analysis without probes Offers a rich data set to be mined for network management, traffic engineering, and valueadded service offerings (i.e. marketing data, personal NMS data) Increasing margins on existing Cisco infrastructure is possible and economical with NetFlow usage based billing
20 What Is a Flow? Defined by Seven Unique Keys: Source IP address Destination IP address Source port Destination port Layer 3 protocol type TOS byte (DSCP) Input logical interface (ifindex) Exported Data
21 NetFlow Principles Inbound traffic only Unidirectional flow Accounts for both transit traffic and traffic destined for the router Works with Cisco Express Forwarding (CEF) or fast switching Not a switching path Supported on all interfaces and Cisco IOS software platforms Returns the subinterface information in the flow records C6500/7600 enables NetFlow on all interfaces by default
22 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
23 NetFlow Components IOS Netflow FlowCollector Netflow Data Analyzer RMON Probe Network Planning Accounting/Billing Data Switching Data Export Data Aggregation Data Collection Data Filtering Data Aggregation Data Storage File System Management Data Presentation NFC Control and Configuration Partner Applications
24 NetFlow Component: IOS IOS RMON Probe Data Switching Data Export Data Aggregation
25 NetFlow Cache Tracks Flows A Flow is defined by Seven Characteristics: Source/Destination IP address pair Source/Destination application port pair IP Protocol Input Physical Interface Index IP Type of Service (ToS) byte Flows are unidirectional NetFlow is enabled on a per input-interface basis
26 NetFlow Feature Acceleration NetFlow Accelerates NetFlow Policy Routing (NPR) Router-based network data encryption Access Control Lists (ACL) RSVP In the future Network Address Translation (NAT) Committed Access Rate (CAR) Web Cache Control Protocol (WCCP) Others Availability of such acceleration will be announced on a feature-by-feature basis
27 NetFlow Data Record Usage Packet Count Byte Count Source IP Address Destination IP Address From/To Time of Day Start Timestamp End Timestamp Source TCP/UDP Port Destination TCP/UDP Port Port Utilization QoS Input Interface Port Output Interface Port Type of Service TCP Flags Protocol Next Hop Address Source AS Number Dest.. AS Number Source Prefix Mask Dest.Prefix Mask Application Routing and Peering
28 Router Based Aggregation AS Prefix Matrix Protocol Type Source Prefix Dest. Prefix
29 NetFlow Components: FlowCollecter IOS Netflow FlowCollector RMON Probe Data Switching Data Export Data Aggregation Data Collection Data Filtering Data Aggregation Data Storage File System Management
30 NetFlow FlowCollector Flow record reception Data volume reduction Filtering Aggregation Flexible thread language Flat file, binary, and/or compressed file storage File cleanup Solaris and HP-UX NetFlow FlowCollector Flow Consumer Applications
31 FlowCollector Aggregation Schemes Over 20 aggregation schemes From Call Detail Records for billing To AS information for statistics Many combinations in-between
32 Highlighted New Features in FlowCollector 3.0 Support for RBA export data 8 additional aggregation schemes Improved disk space management Configuration and Control API Autonomous Message Notification High availability process monitoring on hosting workstation
33 NetFlow Components: Data Analyzer IOS Netflow FlowCollector Netflow Data Analyzer RMON Probe Network Planning Accounting/Billing Data Switching Data Export Data Aggregation Data Collection Data Filtering Data Aggregation Data Storage File System Management Data Presentation NFC Control and Configuration Partner Applications
34 Network Data Analyzer NetFlow FlowCollectors NetFlow FlowAnalyzer Graphical display of NetFlow data Consumes from NetFlow FlowCollector(s) Time-based analysis & data sorting Histograms, Bar Charts, Piecharts Spreadsheet data export
35 Highlighted Features in Network Data Analyzer Search operations Address to Address transactions Address to Subnet transactions Subnet to Subnet transactions Address away from Address/Subnet transactions Multiple router, dataset selection or interface selection DetailASMatrix aggregation & drilldown DNS address and AS number to name translation
36 Highlighted Features in Network Data Analyzer NetFlow Collector Control Traffic Matrix Statistics (TMS) Data Collection Control and Analysis View router-based aggregation schema data Router control for NetFlow and TMS
37 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
38 NetFlow Cache Tracks Flows A Flow is defined by Seven Characteristics: Source/Destination IP address pair Source/Destination application port pair IP Protocol Input Physical Interface Index IP Type of Service (ToS) byte Flows are unidirectional NetFlow is enabled on a per input-interface basis
39 Netflow Formats Version 1 Initial Version Not commonly used Version 8 Router based aggregation Available in 12.0(3)T, 12.0(3)S Version 5 Superset of Version 1 Added AS accounting Datagram Sequencing Commonly used Version 9 Configurable Flow Record Templates Version 7 Cat5K NFFC Only Not available in IOS Versions 2,3,4 and 6 were experimental
40 Cache Management & Data Export Header Sequence number Record count Version number Flow Record Flow Record NetFlow Cache Flow cache manager expires flows No traffic/long life/tcp flags/cache full/etc. Intelligent cache aging ensures cache entries are always available Distributed NetFlow Cache on VIPs Router exports groups of expired flows every second Export uses UDP datagrams with sequence numbers
41 Cache Management & Export NetFlow Cache Flow Entries Flow 1 Flow 2 Flow 3 Flow expired Cache full Timer expired Export Buffer UDP To Collector
42 Flow Management Rules for expiring NetFlow cache Entries Flows which have been idle for a specified time are expired and removed from the cache. (This is configurable) Long lived flows are expired and removed from the cache. Flows are expired after 30min, by default. As the cache becomes full the cache is intelligently purged. TCP connections which have been closed. That is, a FIN/RST has been received.
43 Data Export When does NetFlow export data? Flow datagrams are exported once per second, OR When a complete UDP datagram of flows is available Netflow Version Version 1 Version 5 Version 7 Version 8 Version 9 Number of Flow Records per Export Packet 24 flow records 30 flow records 27 flow records Variable Variable
44 NetFlow Versions NetFlow Version Comments 1 Original 5 Standard and Most Common Specific to Cisco C6500 and 7600 Series Switches Similar to Version 5, but Does Not Include AS, Interface, TCP Flag and ToS Information Choice of Eleven Aggregation Schemes Reduces Resource Usage Flexible, Extensible File Export Format to Enable Easier Support of Additional Fields and Technologies e.g. MPLS, Multicast, BGP Next Hop, and IPv6
45 Version 1 Version 1 is the initial NetFlow format supported on 11.1, 11.2, 11.3, 12.0 On by default No reason to use v.1 unless supporting a legacy collection system.
46 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
47 Netflow - Not a Switching Path In the past (before CEF), Netflow was a switching mechanism. But we faced complications and performance problems When CEF was written, the Netflow code was rewritten to do only the accounting job. No switching anymore. Netflow runs now on the top of CEF to store accounting statistics. We still look into the FIB for adjacencies, encapsulation info, route, As a consequence the Netflow switching name was changed to Netflow services
48 Netflow Acceleration An API used by the other IOS features Needs 12.0(3)T Reserve extra space in the Netflow cache for state information from other features. Apply the feature processing on the first packet versus every packets. Information from the first packet is used to be build the cache entry, accessed by subsequent packets from the same flow Access Control Lists is accelerated by default, nothing to configure
49 Netflow Acceleration Depending on the train 12.0S, 12.0ST, 12.1 or 12.2, Netflow accelerates Ip accounting RSVP Crypto encrypt and decrypt Policy Routing WCCP inbound redirection Cisco Applications and Services Architecture Future: CAR, NAT, etc...
50 NetFlow Feature Acceleration NetFlow Accelerates NetFlow Policy Routing (NPR) Router-based network data encryption Access Control Lists (ACL) RSVP In the future Network Address Translation (NAT) Committed Access Rate (CAR) Web Cache Control Protocol (WCCP) Others Availability of such acceleration will be announced on a feature-by-feature basis
51 Netflow Bypasses the Access-list Y First packet in flow? N ACL acceleration Y Create an Netflow entry Forward the packet with CEF Pass the ACL? N Create an Netflow entry with output i/f null Discard the packet Lookup entry in netflow cache Y Update the Netflow entry stats Output i/f is null? Go through the ACL Maybe deny packet N Update the Netflow entry stats Forward the packet with CEF
52 Acceleration - Netflow Policy Routing The first packet will go through the route-map and the access-list A Netflow cache entry will be created with extra information for policy routing (for example the next hop) Subsequent packets of the same flow will bypass the route-map access-list checks Note that the acceleration doesn t change the switching path!
53 Performance (Approximate Number) Enabling Netflow version 5 on a router increases the cpu utilization by 20 to 25 % The Neflow export increases the cpu utilization by 5 % Enabling Neflow version 8 increases the cpu utilization by 2 to 5%, depending on the number of aggregations enabled With a multiple of 6% for multiple aggregations Netflow is done in hardware on the cat6000 supervisor
54 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
55 Where to Collect the Traffic: Edge vs. Core Edge Core Communication pattern Flow duplication CPU impact Data compression Data reduction (filter) Data aggregation
56 Where to Deploy Netflow? On the edges of the network All routers because Netflow accounts incoming traffic only For billing, on the aggregation routers because some Line Cards only support sampled Netflow For accounting, capacity planning, on the aggregation routers or the router. Sampled netflow could be sufficient
57 Where to Deploy Netflow? For BGP information, on the BGP peering routers Can monitor one link, egress and ingress, but should be on a MPLS PE-CE link. Basic principles: Don t account your exported data Avoid a flow duplication design. Netflow Collector doesn t do flow de-duplication. Done by partner tools export export traffic
58 Creating Export Packets Traffic PE Core Network Enable NetFlow SNMP MIB UDP Export UDP Export Packets Approximately 1500 bytes Typically contain flow records Sent more frequently if traffic increases on NetFlow-enabled interfaces Collector (Solaris, HP-UX, or Linux) Application GUI NMS Station
59 Flow Export Format Usage Packet count Byte count Source IP IP Address address Destination IP IP Address address From/To Time of Day Start sysuptime End sysuptime Source TCP/UDP port Destination TCP/ UDP port Application Port Utilization QoS Input ifindex Output ifindex Type of service TCP flags Protocol Next Hop address Source AS number Dest. AS number Source prefix mask Dest. prefix mask Routing and Peering Version 5 Is Used in This Example Blue key field Black standard field Red lookup
60 NetFlow Cache Example 1. Create and update flows in NetFlow cache Srclf SrclPadd Dstlf DstlPadd Protocol TOS Flgs Pkts Src Port Src Msk Src AS Dst Port Dst Msk Dst AS NextHop Bytes/ Pkt Active Idle Fa1/ Fa0/ A2 / A2 / Fa1/ Fa0/ / / Fa1/ Fa0/ A1 / A1 / Fa1/ Fa0/0 2. Expiration / Inactive timer expired (15 sec is default) Active timer expired (30 min (1800 sec) is default) NetFlow cache is full (oldest flows are expired) RST or FIN TCP Flag 19 / Srclf SrclPadd Dstlf DstlPadd Protocol TOS Flgs Pkts Src Port Src Msk Src AS Dst Port Dst Msk Dst AS NextHop Bytes/ Pkt Active Idle Fa1/ Fa0/ A2 / A2 / Aggregation No Yes 4. Export version Non-Aggregated Flows Export Version 5 or 9 5. Transport protocol Export Packet Header Payload (Flows) e.g. Protocol-Port Aggregation Scheme Becomes Protocol 11 Pkts SrcPort 00A2 DstPort 00A2 Bytes/Pkt 1528 Aggregated Flows Export Version 8 or 9
61 NetFlow Processing Order Features and Services Pre- Processing Post- Processing Packet Sampling Filtering IP Multicast MPLS IPv6 Aggregation schemes Non-key fields lookup Export
62 Active/Inactive Timers Inactive time = The flow expires once no packets are seen for this time duration Active time = If packets continue to be received on this flow beyond this active time setting then the flow will expire and be exported while a new flow is created Default values on software-based routers, and 10000: Inactive timer: 15 seconds (minimum 1 second) Active timer: 30 minutes (minimum 1 minute) Default values on a C6500/7600: Aging time: 256 seconds Fast aging time: disabled (flows that only switch a few packets and are never used again) Long aging time: 1920 seconds (used to prevent counter wraparound and inaccurate stats) Recommendation: Change normal aging time to 32 seconds and fast aging time to 32 seconds and 32 packets
63 Flow Timers and Expiration 1 st & 3 rd Flows Src , Dst , Prot 6, Src & Dst port 15, InIF FE0/0, ToS nd Flow Src , Dst , Prot 6, Src & Dst port 15, InIF FE0/0, ToS 192 Router Boots (sysuptime timer begins) = packet from 1 st or 3 rd flow = packet from 2 nd flow 2 nd Flow Start (sysuptime) 2 nd Flow End (sysuptime) UDP Export Packet containing flows (sysuptime & UTC) 2 nd Flow Expires (sysuptime) 15 seconds Inactive 1 st Flow Start (sysuptime) 1 st Flow End (sysuptime) 15 seconds Inactive 1 st Flow Expires (sysuptime) 3 rd Flow Start (sysuptime) Time SysUptime - Current time in milliseconds since router booted UTC - Coordinated Universal Time can be synchronized to NTP (Network Time Protocol)
64 Netflow and Security There is no authentication mechanism between the routers and the collector The collector is only interpreting received UDP packets, without any checks Make sure your Data Communication Network is secure, including the collector machine Potential problem: someone sending wrong accounting information to the collector with a router stolen IP address
65 How Many Netflow Collector? In theory, one NFC per POP or Aggregation Router (7x00 router) For VPNSC (MPLS VPN environment), we advice one NFC per PE Basic principles: Check your Sun capabilities NFC sizer calculater. Reduce the number of routers per NFC if needed. Rule of thumb: 10 routers per NFC
66 Deployment Tricks Enable the ifindex persistence if accounting per interface Look at the router cpu (<60%) and memory before enabling Netflow Check the export link bandwidth Use a dedicated export lan If you export too much traffic: go for the aggregations, don t export version 5 go for sampled if on a GSR increase the aggregations timers Access-lists still account the traffic
67 What to Collect: Level of Collection Details Link statistics or traffic details: SA, DA Application details (port numbers) QoS Time stamps Routing and peering Header or payload Layer 2 or Layer 3 information Data export: push or pull model Collection interval and history Consider the generated data volume
68 What to Collect: The Two Extremes... S N M P N e t F l o w Usage Time of Day Port Utilization QoS Packet count Byte count Start sysuptime End sysuptime Input ifindex Output ifindex Type of service TCP flags Protocol Source IP address Destination IP address Source TCP/UDP port Destination TCP/UDP port Next hop address Source AS number Dest. AS number Source prefix mask Dest. prefix mask From/To Application Routing and Peering
69 What to Collect: Full Collection vs. Sampling Processing every packet might not scale up to very high-speed interfaces Amount of collected data might be huge It might take longer to process the data than to generate it Network Management traffic might fully utilize the available bandwidth Packet sampling can help to overcome those issues
70 What to Collect: 1 in n Sampling Sampling Interval: 1 in 2 Packets Missed Flows: 1 out of 5 (15 %) Sampling Interval: 1 in 5 Packets Missed Flows: 2 out of 5 (35%)
71 What to Collect: Sampling Best Practices Sampling for monitoring is fine Continuously sampling might be OK even for billing purposes Carefully determine the sampling rate Sampling algorithms: 1 in n (deterministic, random, hash-based) Filter, expressions Time based Trajectory sampling Sampling White Paper: work in progress
72 IP Accounting/Billing Many Different Flavors! Flat-rate billing doesn t always scale Competitive pricing models can be created with usage-based billing Usage-based billing considerations Time of day Application QoS/CoS Transit or peer Within my network or off Distance-based Bandwidth usage Data transferred Traffic class (i.e. going through a secure tunnel, high-speed link, or special arrangement)
73 User Definition Users (IP Address, Name, etc.) User 1 User 2 User 3 User 4 User 5 User 6 User 7 Departments Dept. 1 Dept. 2 Dept. 3 Dept. 4 Dept. 5 Customers Co. 1 Co. 2 Co. 3 Co. 4 Co. 5 Co. 6 Co. 7 Reporting can be offered at any level Customers can self-manage all sub-levels Orange and blue can be sold at a premium
74 Which Aggregations to use on a Router? AS Protocol-Port Source-Prefix Destination-Prefix Prefix Source Prefix Source Prefix Mask Destination Prefix Destination Prefix Mask Source App Port Destination App Port Input Interface Output Interface IP Protocol Source AS Destination AS First Timestamp Last Timestamp # of Flows # of Packets # of Bytes
75 Which Aggregation to use on a Router? AS- TOS Protocol-Port- TOS Source-Prefix- TOS Destination-Prefix- TOS Prefix-TOS Prefix-Port Source Prefix Source Prefix Mask Destination Prefix Destination Prefix Mask Source App Port Destination App Port Input Interface Output Interface IP Protocol Source AS Destination AS TOS First Timestamp Last Timestamp # of Flows # of Packets # of Bytes
76 Network Data Analyzer NetFlow FlowCollectors NetFlow FlowAnalyzer Graphical display of NetFlow data Consumes from NetFlow FlowCollector(s) Time-based analysis ands data sorting Configure routers and FlowCollectors Histograms, bar charts, and pie charts Spreadsheet data export
77 Open API s Enable Third Parties to Leverage NetFlow Cflowd - ANS, BBN and CAIDA Traffic accounting port, AS, network and pure flow matrices NeTraMet/NetFlowMet - by Nevil Brownlee IETF s Realtime Traffic Flow Measurement (RTFM) smurfind - Walter Prue USC/ISI Real time DOS attack warnings
78 End-to-end Coverage Health Reports Service Level Reports Report for Thu 1/15/98 Trend Reports Auto Range: Custom From: 09/04/ :00 AM 01/15/ /13/1997 Baseline: 6 weeks (02/04/98 to 03/17/98) Created : 05/15/98 12:00:16 09/13/1997 Exceptions Reports Router & LAN Stats. WAN Stats. Access Stats. NetFlow Collector RMON Probes SAA Agent Ping MIB Element & L2/L3/Access Stats. Traffic Flow Stats. Response Time/ Availability Stats.
79 Concord and NetFlow Report for Thu 1/15/98 Report for Thu 1/15/98 Report for Thu 1/15/98 Concord Workstation NetFlow Collector Benefits Within Cisco IOS, Lower cost of entry than RMON/RMON2 probes Leverages large installed base of Cisco routers and switches NetFlow enabled Reports Router Link, LAN, router utilization Application mix Communicating pairs NetFlow enabled L3 Switch
80 Cisco NetFlow support Gather high volume NetFlow data Router Router InfoVista NetFlow Agents InfoVista Web Access Server Combine it with other InfoVista data Router Router Données InfoVista Server InfoVista Client Router InfoVista NetFlow Agents InfoVista Client Analyze traffic flows by source and destination autonomous system, average packet size and used protocols
81 Cisco NetFlow support End-User Benefits: A Service Provider can optimize its existing connections with other autonomous systems, plan new connections, and proactively identify problem areas. An Enterprise can use this information to identify network use patterns and to plan the evolution of its network infrastructure. Destination Autonomous System Source Autonomous Systems Packet distribution by source AS Automatic resolution of Autonomous System name
82 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
83 Description RADIUS and TACACS+ accounting allows data to be sent at the start and end of services, indicating the amount of resources such as time, packets, bytes, etc. used during the session AAA is used for login purposes in general Dial-in Telnet and ssh PPP
84 RADIUS and TACACS+ Comparison Remote Authentication Dial In User Service Standards-based clientserver protocol (IETF) UDP-based (fast) Recommended for high performance Only password field encrypted Shared key, never sent in clear over the network User authentication to network access/services Terminal Access Control Access Control System Rich feature set: allows command authorization and accounting Cisco proprietary (but supported by other vendors) TCP-based (reliable) Full packets are encrypted Shared key, never sent in clear over the network User authentication to network devices
85 AAA: Principles Incoming and outgoing packets/bytes of an incoming call (no dial out accounting) Each of the call can generate start and stop records Each call reports 2 logs: Accounting request start with start time Accounting request stop with stop time and full accounting AA Accounting is an improved logging system, but AAA is not used primarily for accounting Adequate for billing because we have the username Supported on all switching paths
86 RADIUS Interaction RADIUS Server User Dials NAS Accept Call Pre-Auth Pre-Auth Access Request Pre-Auth Access Accept Call Connects Accept User User Auth Access Request Access Accept User Connects Call Disconnects User Acctg User Acctg Accounting Request (START) Accounting Ack Accounting Request (STOP) Accounting Ack
87 RADIUS Accounting Attributes, RFC Acct-status-type 41 Acct-delay-time 42 Acct-input-octets 43 Acct-output-octets 44 Acct-session-id 45 Acct-authentic 46 Acct-session-time 47 Acct-input-packets 48 Acct-output-packets 49 Acct-terminate-cause 50 Acct-multi-session-id 51 Acct-link-count
88 AAA Possible Applications Network Monitoring AAA Network Planning Security Analysis X Application Monitoring User Monitoring X Traffic Engineering Peering Agreement Usage-Based Billing X Destination Sensitive Billing
89 Outline Introduction Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Conclusion and Future Work
90 網 路 流 量 量 測 與 分 析 Network Device Flow Generator Flow Capturer Flow Analyzer Scalability Data Store Presenter Web Site User Interface Web browser raw packet Flow information Network Characteristics analyzed data System design for Flow Capture Flow Analyzer Distributed, load-balancing architecture for scalability Traffic Analysis & Data Reduction Presentation & Reporting
91 Ongoing Work Support for various applications Streaming services Other P2P services Distributed, load-balancing architecture for scalability parallel or distributed architecture subdivide monitoring system into several functional components efficient load sharing between each sites Considerations for small storage requirements Significant aggregation based on the ingress point Local reduction of the data should be effective
92 Combine SNMP & RMON Utilize SNMP polling policies to gather key statistics on backbone/core routers and on MIB objects not related to flow-by-flow measurements Interface errors memory and CPU utilization Utilize RMON capabilities for detailed drilldown Application tracking Interface error analysis Packet capture for problem diagnosis and resolution Maximize network monitoring, management, and planning
93 93
網路流量量測與分析 楊竹星 國立中山大學資訊工程系
路 流 量 量 立 Outline Introduction NetFlow Netflow Overview Netflow Architecture Netflow Formats Netflow Feature Acceleration Netflow Deployment AAA Our solutions System Architecture Enhance Flow-Tools Protocol
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
http://www.cisco.com/en/us/products//hw/switches/ps4324/index.html http://www.cisco.com/en/us/products/ps6350/index.html
CHAPTER 54 Supervisor Engine 6-E and Catalyst 4900M chassis do not support Netflow; it is only supported on Supervisor Engine IV, Supervisor Engine V, Supervisor Engine V-10GE, or WS-F4531. This chapter
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
NetFlow Configuration Guide, Cisco IOS Release 12.4
NetFlow Configuration Guide, Cisco IOS Release 12.4 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
NetFlow Configuration Guide, Cisco IOS Release 15M&T
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Configuring NetFlow Data Export (NDE)
49 CHAPTER Prerequisites for NDE, page 49-1 Restrictions for NDE, page 49-1 Information about NDE, page 49-2 Default Settings for NDE, page 49-11 How to Configure NDE, page 49-11 Note For complete syntax
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
NetFlow Configuration Guide, Cisco IOS Release 12.2SR
NetFlow Configuration Guide, Cisco IOS Release 12.2SR Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
IP Accounting C H A P T E R
C H A P T E R 6 IP Accounting This chapter describes the IP Accounting features in Cisco IOS and enables you to distinguish the different IP Accounting functions and understand SNMP MIB details. This chapter
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications
Outline EEC 274 Internet Measurements & Analysis Spring Quarter, 2006 Traffic Measurements Traffic measurements What metrics are we interested in? Measurement and analysis methodologies Traffic characterization
Cisco IOS Flexible NetFlow Overview
Cisco IOS Flexible NetFlow Overview First Published: June 19th, 2006 Last Updated: June 19th, 2006 NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router. NetFlow
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Cisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
SonicOS 5.8: NetFlow Reporting
SonicOS 5.8: NetFlow Reporting Document Scope Rapid growth of IP networks has created interest in new business applications and services. These new services have resulted in increases in demand for network
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
Lab 4.1.2 Characterizing Network Applications
Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Advanced NetFlow for Service Providers. Aamer Akhter ([email protected]) Benoit Claise ([email protected])
Advanced NetFlow for Service Providers Aamer Akhter ([email protected]) Benoit Claise ([email protected]) 1 Agenda Introduction NetFlow Version 9 Interesting Features on Traditional NetFlow Flexible NetFlow
Integrated Traffic Monitoring
61202880L1-29.1E July 2008 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of the
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export
Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export Last Updated: November 28, 2011 This module contains the minimum amount of information about and instructions necessary for configuring
Business and IT are Changing Like Never Before
ADVANCED NETFLOW Business and IT are Changing Like Never Before Drastic Change in Application Type, Delivery, and Consumption Public/Hybrid Cloud SaaS/IaaS Storage Users/ Machines Proliferation of Devices
Net-flow. PacNOG 6 Nadi, Fiji
Net-flow PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools etc
IPv6 network management. Where and when?
IPv6 network management 1 Contributions Simon Muyal, RENATER Bernard Tuy, RENATER Jérôme Durand, RENATER Ralf Wolter, Cisco Patrick Grossetête, Cisco Munechika Sumikawa, Hitachi Patrick Paul, 6WIND 2 Agenda
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
How-To Configure NetFlow v5 & v9 on Cisco Routers
How-To Configure NetFlow v5 & v9 on Cisco Routers Share: Visibility into the network is an indispensable tool for network administrators. Network visibility can be achieved through daily troubleshooting,
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
IPv6 network management. 6DEPLOY. IPv6 Deployment and Support
IPv6 network management 6DEPLOY. IPv6 Deployment and Support 1 Contributions Simon Muyal, RENATER Bernard Tuy, RENATER Jérôme Durand, RENATER Ralf Wolter, Cisco Patrick Grossetête, Cisco 10/28/2010 IPv6
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Flow Monitor for WhatsUp Gold v16.2 User Guide
Flow Monitor for WhatsUp Gold v16.2 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Best Practices for NetFlow/IPFIX Analysis and Reporting
WHITEPAPER Best Practices for NetFlow/IPFIX Analysis and Reporting IT managers and network administrators are constantly making decisions affecting critical business activity on the network. Management
Cisco IOS NetFlow Version 9 Flow-Record Format
White Paper Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: May 0 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
