Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os



Similar documents
Nalini Elkins Introduction to TCP/IP Diagnostics (Web-based Seminar)

How To Manage Performance On A Network (Networking) On A Server (Netware) On Your Computer Or Network (Computers) On An Offline) On The Netbook (Network) On Pc Or Mac (Netcom) On

Introduction to Mainframe (z/os) Network Management

TCP Performance Management for Dummies

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.

IP Monitoring on z/os Requirements and Techniques

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

IBM Tivoli Monitoring for Network Performance

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899

Performance Monitoring of Heterogeneous Network Protocols in a Mainframe Environment

NetView for z/os V6.1 Packet Trace Analysis

CA NetMaster Network Management for TCP/IP

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Computer Associates Unicenter Mainframe Network Management

Solving complex performance problems in TCP/IP and SNA environments.

Cross-platform TCP/IP Socket Programming in REXX

Introduction to the new mainframe Chapter 12 - Network Communications on z/os

Performance Tuning and Optimizing SQL Databases 2016

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security. Network Packet Analysis

EXPLORER. TFT Filter CONFIGURATION

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

eeye Digital Security Product Training

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

LESSON Networking Fundamentals. Understand TCP/IP

z/os Firewall Technology Overview

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

z/os V1R11 Communications Server system management and monitoring

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Cisco Secure PIX Firewall with Two Routers Configuration Example

Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Looking for Trouble: ICMP and IP Statistics to Watch

CA CPT CICS Programmers Toolkit for TCP/IP r6.1

Attack Lab: Attacks on TCP/IP Protocols

WHITE PAPER OCTOBER CA Unified Infrastructure Management for Networks

Stateful Inspection Technology

Virtualization: TCP/IP Performance Management in a Virtualized Environment Orlando Share Session 9308

Lauraʹs Corner The CLEVER Solution: Working with Encrypted Data

Chapter 1 Personal Computer Hardware hours

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

WHITE PAPER September CA Nimsoft For Network Monitoring

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments

Best Practices for IP Node Monitoring

Using IPM to Measure Network Performance

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Frequent Denial of Service Attacks

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Linux MDS Firewall Supplement

PIX/ASA 7.x with Syslog Configuration Example

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Visualizations and Correlations in Troubleshooting

Chapter 11. User Datagram Protocol (UDP)

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Introduction to Analytical Modeling

SQL Server Performance Tuning and Optimization

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Mellanox Academy Online Training (E-learning)

CompTIA Network+ (Exam N10-005)

IP Filter/Firewall Setup

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Transport Layer Protocols

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Firewalls & Intrusion Detection

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Configuring the Cisco Secure PIX Firewall with a Single Intern

GoToMyPC Corporate Advanced Firewall Support Features

OS/390 Firewall Technology Overview

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

co Characterizing and Tracing Packet Floods Using Cisco R

Denial Of Service. Types of attacks

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Linux Network Security

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Firewall Firewall August, 2003

How To Block A Ddos Attack On A Network With A Firewall

Microsoft SQL Server: MS Performance Tuning and Optimization Digital

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Linux MPS Firewall Supplement

CMPT 471 Networking II

Mark Wilson Session Details: The Introduction

Chapter 28 Denial of Service (DoS) Attack Prevention

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

Network and Services Discovery

FortiWeb 5.0, Web Application Firewall Course #251

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Who is Watching You? Video Conferencing Security

Transcription:

Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os Do you have the responsibility for TCP/IP performance management? Are you unsure of where to start? Or do you want to brush up on your monitoring, analysis, and tuning skills? Does your TCP/IP network need a performance check-up? Do you need to know how to establish a practical performance management program for your TCP/IP stack and socket applications? For many problems in the TCP/IP network, the only symptom is poor response time. In this class you will learn the many factors which may be responsible for response time and throughput issues. Do you understand how hacks work in the TCP/IP environment? How do security violations such as TCP SYN Flood, Naptha, or UDP packet storm really work? Which part of the protocol is exploited? Are you at risk? In this class, you will learn about such security violations and how to prevent them. Nalini Elkins, an experienced TCP/IP network performance expert, with many years in network management and working with IBM, will teach you practical TCP/IP performance management and tuning skills. You will learn how to identify performance problems, whether originating from TCP/IP system setup or excessive resource consumption. You will receive detailed explanations on how to interpret performance reports and how to remedy bad performance situations. Consider this weeklong class as being dedicated to analyzing your system performance with input and recommendations from your own performance expert. Audience This 4-1/2-day seminar is designed for systems programmers who are responsible for performance measurement, security, analysis, and tuning of their installation's TCP/IP network, socket applications and TCP/IP stack. You will leave class knowing how to do a performance review of your TCP/IP stack, network and socket applications. Most importantly, you will have an understanding of the underlying relationships and how to find and eliminate potential trouble spots. This class is for you o If you want to perform a performance tune up on your TCP/IP stack, socket applications or network o If you want to know how your TCP stack can be attacked o If you are an experienced performance analyst, but want the latest performance information and advice o If you are a novice performance analyst, or new to the field of TCP/IP networking and need to learn how to effectively manage the performance of your TCP/IP stack and socket applications

o If you are already an OS/390 or z/os generalist and are looking to learn about TCP/IP networking, performance measurement, monitoring, analysis, and tuning skills. Class Overview This intensive seminar is designed to provide the attendee with an understanding of the performance management of their TCP/IP network, socket applications, and TCP/IP stack. It is designed to guide you in learning the basic concepts of TCP/IP network performance management by teaching you a step-by-step approach to performance tuning. You will learn how to analyze SMF reports and various TCP/IP profile and setup parameters. You will learn performance management of your TCP/IP stack, how socket application performance may be improved, and basic workload measurement. You will learn where the security vulnerabilities are of the core Internet protocols and how to protect your installation. The strength of this seminar not only comes from the information learned, but from the performance analysis you can perform on your own data during the seminar week. Class Participation During this class you will analyze your own data and installation setup. Each student is strongly encouraged to bring Netstat measurement data and TCP profile examples from their installation. Shortly after you enroll in the seminar you will be provided data collection instructions for the data you will be examining in class. Analysis and class exercises will make use of this data. During the class week Nalini Elkins will be available to help review the data, to answer questions, and provide expert feedback. You can think of this as a week that you've scheduled specifically to perform a performance, security and capacity tune up of your TCP/IP stack, network and socket applications. Seminar Highlights Detailed explanations on how to interpret performance reports and how to remedy bad performance situations are provided. 1. Optionally, your individual system performance reports can be evaluated which includes a written recommendation report. This service is the equivalent of an expert reviewing your installation data and providing a detailed explanation. 2. You will learn to identify performance problems, whether originating from the TCP/IP network system setup parameters or from excessive resource consumption. 3. You will learn if you have security holes in your TCP/IP stack as we have found in many systems

Prerequisite A basic understanding of z/os, SMF, TCP/IP, and networks is assumed. Seminar Dates and Location and Prices For dates and locations and prices, please call our office at 831-659-8360. Seminars are regularly offered in the USA, Europe, and Australia. For More Information For more information on this or other seminars, including prices and locations, please contact: Inside Products, Inc. Carmel Valley CA 93924 Phone: 831-659-8360 Fax: 831-659-8360 Email: training@inside-products.com Please do not hesitate to call if you would like more information or details on this seminar. We would be happy to talk with you. In-house All seminars are available for in-house instruction. Instructor Nalini Elkins, of Inside Products, Inc., (), is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she is a formidable businesswoman. She has been the founder and co-founder of two start-ups in the high-tech arena. During her career Nalini served in groups responsible for network performance design, analysis, troubleshooting, and systems programming. The classes Nalini produces and instructs, and the products she develops are designed with the needs of systems programmers as a key requirement. Nalini has an excellent understanding for the needs of system programmers because she was in their shoes for many years. Nalini has also developed an expert system for diagnosing network hardware problems. The marketing rights for this product were sold to Boole & Babbage (which was later taken over by BMC). Nalini then joined Boole to further develop and support this product. After some time at

Boole, Nalini joined some other Boole employees in co-founding a new company - Applied Expert Systems. As Technical Co-founder, Nalini helped to design and develop a number of products in the SNA and TCP/IP network management area. These products included expert systems for SNA diagnostics, web performance diagnostics, TCP/IP routing diagnosis and TCP/IP network management. She was the Chief Developer of the first product IBM marketed as NetView Performance Monitor for TCP/IP. Nalini now has her own company, Inside Products, Inc. (), which designs, develops and markets network management and Linux management software. The products are Inside the Stack TCP/IP monitor, TCP Problem Finder, and TCP Response Time Monitor. Inside Products also provides consulting to resolve network problems such as FTP throughput, socket application performance and TCP/IP tuning. Inside Products has international distributors in Australia, Germany, Switzerland, the United Kingdom, Belgium, Netherlands, Luxembourg and Brazil. Nalini has published numerous articles in publications such as zjournal, Technical Support, Xephon's TCP/IP Update, and Enterprise Systems Journal. Nalini is also a regular speaker at SHARE, both national and regional Computer Measurement Groups (CMGs), and variety of international conferences. Nalini can be contacted directly at Nalini_Elkins@Inside-Products.com Seminar Outline The following is a high level outline for this seminar. Since the seminar is constantly being updated, actual seminar content and flow may vary slightly from this outline. TCP/IP Network Performance Introduction 1. TCP/IP network fundamentals 2. Core Internet protocols (TCP, IP, UDP, ICMP) 3. Common RFC's 4. Mainframe TCP architecture (USS, socket applications, TCP/IP Profile, BPX parms) 5. Socket applications, well-known ports (Telnet, FTP, SMTP, Web server) 6. Objectives of performance monitoring 7. What does response time mean in a TCP/IP network? 8. Understanding resource consumption How to Measure TCP/IP Performance 1. SNMP 2. What is SNMP? 3. Public vs. private MIBs 4. How to use the z/os private MIB to solve performance problems

5. SMF 6. OS/390 SMF record type 118 - TCP/IP 7. z/os SMF record type 119 - TCP/IP 8. SMF record type 30 - MVS address space information 9. Integration of TCP/IP and MVS SMF data 10. FTP CPU time 11. CPU and paging analysis of socket applications 12. Commands 13. Netstat 14. VTAM commands (buffer pool and CSM monitoring, Enterprise Extender) 15. USS (Unix System Services) Commands TCP/IP Profile parameters 1. What are they? 2. How do they impact performance? 3. What can go wrong? 4. Case studies to illustrate settings TCP Hacks and Security Violations 1. What they are: TCP SYN Flood, Naptha, UDP Packet Storm, etc 2. What part of the protocol is exploited 3. How to prevent and detect Workload characterization 1. Benchmark and trend application usage 2. How to analyze response time and degradation for sections of the network 3. Case studies and troubleshooting techniques Analyzing CPU, Paging, DASD for Sockets and TCP/IP 1. MVS components of TCP/IP 2. TCB / SRB time 3. EXCP's, DASD pending time 4. Storage and Paging usage 5. Queue times (Initiator, Job preparation) 6. Look at an FTP 7. What happens in MVS when you do an FTP 8. Break out an FTP into host and network components 9. Use charge back to enforce performance goals 10. What should be charged in TCP/IP? 11. Sample charge back scenario

Analyzing Buffer Pools 1. Communications Storage Manager (CSM) Buffer Pools 2. VTAM Buffer Pools Analyzing Socket Application Problems 1. TCP sockets 2. FTP 3. Web server applications 4. TN3270 5. Response time, 6. Parameters to manage sessions (timemark, etc.) Analyzing Channel Attachments 1. OSA Express - how to measure and benchmark 2. Cisco CIP - how to measure and benchmark 3. Enterprise Extender - how to measure and benchmark Analyzing TCP/IP Flow 1. Looping and flapping routes 2. Round trip time and variance 3. Retransmissions and duplicate acknowledgments