Network Monitoring and Traffic CSTNET, CNIC



Similar documents
Passive Measurement in CSTNET

Cisco IOS Flexible NetFlow Technology

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

IPv6 measurement in CSTNET. CSTNET, CNIC, Sep. 2014

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

PANDORA FMS NETWORK DEVICES MONITORING

Monitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER

SolarWinds Certified Professional. Exam Preparation Guide

PANDORA FMS NETWORK DEVICE MONITORING

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept

Flow Analysis Versus Packet Analysis. What Should You Choose?

mbits Network Operations Centrec

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Monitoring and analyzing audio, video, and multimedia traffic on the network

Network Monitoring Comparison

Accurate End-to-End Performance Management Using CA Application Delivery Analysis and Cisco Wide Area Application Services

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

How To Set Up Foglight Nms For A Proof Of Concept

Avaya ExpertNet Lite Assessment Tool

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

Network Management Back to the Basics. Brad Hale

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

The use of SNMP and other network management tools in UNINETT. Arne Øslebø March 4, 2014

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Research on Errors of Utilized Bandwidth Measured by NetFlow

NMS300 Network Management System

Introduction. The Inherent Unpredictability of IP Networks # $# #

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Introducing FortiDDoS. Mar, 2013

Network Monitoring and Management NetFlow Overview

A Summary of Network Traffic Monitoring and Analysis Techniques

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

TELCO challenge: Learning and managing the network behavior

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

NSC E

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Network Performance Monitoring at Minimal Capex

Network Management & Monitoring

LESSON Networking Fundamentals. Understand TCP/IP

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Using IPM to Measure Network Performance

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Monitoring commercial cloud service providers

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Flow Based Traffic Analysis

Take the NetFlow Challenge!

Introducing the Microsoft IIS deployment guide

CNS-200-1I Basic Administration for Citrix NetScaler 9.0

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Network performance in virtual infrastructures

Restorable Logical Topology using Cross-Layer Optimization

Using WhatsUp IP Address Manager 1.0

Introduction to Netflow

Netflow Overview. PacNOG 6 Nadi, Fiji

Basic Administration for Citrix NetScaler 9.0

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Lab Characterizing Network Applications

MULTI WAN TECHNICAL OVERVIEW

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Application Note - Using Tenor behind a Firewall/NAT

1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

IPv6 Network Management.

Firewall Defaults and Some Basic Rules

Network Management & Security (CS 330) RMON

Chapter 11 Cloud Application Development

How To Understand and Configure Your Network for IntraVUE

Secure Networks for Process Control

Limitations of Packet Measurement

RAVEN, Network Security and Health for the Enterprise

NetFlow Configuration Guide, Cisco IOS Release 15M&T

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Cisco IOS Flexible NetFlow Overview

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

Details. Some details on the core concepts:

NetFlow Auditor Manual Getting Started

DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, Ian Silvester DNA Manager.

NfSen Plugin Supporting The Virtual Network Monitoring

A FAULT MANAGEMENT WHITEPAPER

Network Management Deployment Guide

1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Internet Security Firewalls

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

HP IMC User Behavior Auditor

Compare E SPIN NMS SaaS Plan & Addon

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IP Filter/Firewall Setup

Flow Monitor for WhatsUp Gold v16.2 User Guide

NetFlow/IPFIX Various Thoughts

Scrutinizer. Application traffic analytics, visualization and reporting tool

NetFlow Analytics for Splunk

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Transcription:

Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC

Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring and traffic analysis systems in CSTNET

1, Background of network monitoring

Network monitoring and traffic analysis systems in CSTNET Question: for network management center Network equipment utilization Traffic utilization for a link or organization Traffic TopN: IP URL protocol Application distribution User behavior analysis Network attack and security events

2, Network monitoring protocols and related tools

Network monitoring protocols and related tools Monitoring Network technologies categories Passive SNMP, Netflow Active Ping,Iperf

Passvie monitoring-snmp SNMP(Simple network management protocol) Version 1, 2, 3 Management information base (MIB) An SNMP-managed network consists of three key components: Managed device Agent software which runs on managed devices Network management system (NMS) software which runs on the manager SNMP Architecture >

Passvie monitoring-netflow Netflow 5-tuple fields Define a Flow 1. Source Address 2. Destination Address 3. Source Port 4. Destination Port 5. Layer 3 Protocol NetFlow Data Exported

NetFlow define TWO flows for ONE TCP connection Request Response Client Server Flow Cache Active Timeout Inactive timeout Content Client Server ONE flow for ONE UDP Stream

Netflow development Using UDP to send multiple flow records in one packet Formats Version 1 (V1) Version 5 (V5) Version 7 (V7) Version 8 (V8) Version 9 (V9) Header Sequence Number Record Count Version Number Flow Record Flow Record Versions 2, 3, 4, and 6 were not released Flow Record Flow Record

3, Network monitoring and traffic analysis systems in CSTNET

CNMS (Cloud network management system) A network management system based on cloud computing technology a multi-tenant cloud application, SaaS Cloud core and probe model

System function modules of CNMS Data collecting Data center executes data collection, through SNMP, Ping, etc; Data receiving and processing Data receiving, data model and alarm rules matching, sending alarm events to alarm process model, data persistence; Alarm processing Correlation, filtering and compress of alarm events; Alarm releasing According to the rules of the alarm, releasing the related alarm notice to administrator; Data visualization Using the graph and tables tools to show the network data result Cloud server Data visualization i Alarm release Alarm processing Data receiving and processing Data collecting Selfmanagement

Collecting data probe Topology discovery Regularly scan topology according to the topology discovery requests Data collecting Through SNMP, Ping, Telnet and service simulation method, probes collect the data of network management objects ; Data visualization Built in Web Server can view the local information when the WAN link failure occurs Data Sending Formatting and sending the management data to the cloud management center Self management Self status monitoring; Communicate with the center of the CNMS; upgrading software version automatically; Local Database caching data in local probe, providing local ability; probe Data visualization Data Sending Data collecting Selfmanagement

Fucntion module Overview TOP N performance, topology thumbnail, custom dashboard view manages IPv4/IPv6 network topology machine room architecture resource management Network devices, server management, and the management of the IP and MAC Performance management Traffic of device (bps pps loss packet packet error ratio etc.) Ping: Rtt, loss,jitter Configuration management Storing configuration of device and providing version comparison feature Alarm center Implementation of alarm filtering, compression, correlation and other related operations, providing an unification of the alarm center. System management Tenants, accounts, permissions, role management

LDTM( Large scale distribution traffic monitor) A large scale distribution traffic monitor Comprehensive traffic direction and volume analysis Advanced traffic data comparison and intelligent analysis techniques

Flexible deployments Software deployment

Features list Traffic weather map Traffic trend Distribution of region, application, organization Top N IP,session, protocol, packet size Capture packet service IP utilization statistic IP location service IP traffic report

Network overview traffic weather map A geo-view of top IP session and traffic volume distribution. Two levels of zoom: continent, country and area Many time granularity query condition Top IP session and organization, region distribution

Top N analysis When the customer s network congestion happens, the first thing we need to do is query toe Top N IP address, mostly a certain IP address can gobble up a most of the bandwidth. By this, operator can quickly locate the IP address which will be blocked. Top N packet size: When the network has a DDos Top N packet size: When the network has a DDos attack, for Top N package size traffic ranking,, generally small size package flow occupy the front of the rankings under the pps units.

IP address usage statistic IPv4 address resource is very precious, we need to monitor IP usage each customer. By counting IP addresses on which actual flows transfer, we get the real statistics of IP ratio. Although the number of IPv6 address approaches infinity, we still need the analysis of the address utilization. According to the IPv6 usage, we can locate the customers who has rarely use IPv6 and find the cause why they are reluctant to use IPv6 network, which all gradually to improve the IPv6 transition.

北 京 市 海 淀 区 中 关 村 南 四 街 四 号 中 科 院 软 件 园 邮 编 : 100190 www.cnnic.cn