Unraveling Network Configuration Management



Similar documents
How To Configure Some Basic OSPF Routing Scenarios. Introduction. Technical Guide. List of terms

- Route Filtering and Route-Maps -

Configuring RIP. Overview. Routing Update Process CHAPTER

Troubleshooting Bundles and Load Balancing

Security and Access Control Lists (ACLs)

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

ICND IOS CLI Study Guide (CCENT)

CCIE R&S Lab Workbook Volume I Version 5.0

Table of Contents. Cisco How Does Load Balancing Work?

8 steps to protect your Cisco router

Using the Border Gateway Protocol for Interdomain Routing

Configuring a Gateway of Last Resort Using IP Commands

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Network Simulator Lab Study Plan

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

Configuring Denial of Service Protection

Interconnecting Cisco Network Devices 1 Course, Class Outline

Troubleshooting and Maintaining Cisco IP Networks Volume 1

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

- Basic Router Security -

Course Contents CCNP (CISco certified network professional)

CCNA 2 v5.0 Routing Protocols Final Exam Answers

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

How To Understand and Configure Your Network for IntraVUE

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

How to Configure Cisco 2600 Routers

ISOM3380 Advanced Network Management. Spring Course Description

A Systematic Approach to BGP Configuration Checking

Interconnecting Cisco Networking Devices Part 2

Skills Assessment Student Training Exam

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Teldat Router. ARP Proxy

Cisco Configuring Commonly Used IP ACLs

CCT vs. CCENT Skill Set Comparison

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

: Interconnecting Cisco Networking Devices Part 2 v1.1

Unicast Reverse Path Forwarding

Configuring Network Address Translation

Configuration Examples. D-Link Switches L3 Features and Examples IP Multicast Routing

Securing Networks with PIX and ASA

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Configuring NetFlow-lite

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

ASM Educational Center (ASM) Est. 1992

Brocade to Cisco Comparisons

Configuring a Basic MPLS VPN

Traffic Mirroring Commands on the Cisco IOS XR Software

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

During this lab time you will configure the routing protocol OSPF with IPv4 addresses.

Link-State Routing Protocols

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Configuring NetFlow Secure Event Logging (NSEL)

How To Learn Cisco Cisco Ios And Cisco Vlan

Lab 2 - Basic Router Configuration

Cisco Configuring Basic MPLS Using OSPF

Security Policies Tekenen? Florian Buijs

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Design, Implementation and Evolution of a DNS anycast resolving service in a country-wide ISP network

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

"Charting the Course...

Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual.

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Adding an Extended Access List

Lab Configure IOS Firewall IDS

Wen Temitim and Christopher Papandreou NANOG 58, June 2013

Configure Policy-based Routing

Module 12 Multihoming to the Same ISP

Both CCNP ROUTE and CCNP SWITCH. Plan and document the most common maintenance functions in complex enterprise networks

Cisco Change Management: Best Practices White Paper

BGP (Border Gateway Protocol)

Troubleshooting an Enterprise Network

Network Security Knowledge is Everything! Network Operations

Table of Contents. Cisco Configuring a Basic MPLS VPN

Router and Routing Basics

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Welcome to Todd Lammle s CCNA Bootcamp

MPLS VPN Security Best Practice Guidelines

RSA Security Analytics

Cisco IOS MPLS configuration

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Implementing Secure Converged Wide Area Networks (ISCW)

SUBNETTING SCENARIO S

Lab Introduction to the Modular QoS Command-Line Interface

Cisco Active Network Abstraction 4.0

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Access Control Lists: Overview and Guidelines

Virtual Fragmentation Reassembly

Transcription:

Unraveling Network Configuration Management Theophilus Benson (U of Wisconsin) Aditya Akella (U of Wisconsin) Dale Carder (U of Wisconsin) Dave Maltz (Microsoft)

Agenda Why is documentation useful? Can we develop metadata for network configuration files? Can we utilize administrator s common practice? What we've learned Call for help

Change is Constant Technology evolves Network requirements adapts Operators are constantly tweaking Documentation lags implementation Uninformed changes lead to error Same policy different implementation New or unfamiliar operator collaborating networks; GENI

Tracking Changes: Operator s Toolbox Current Config management tools Maintains accountability for change Does not ensure correctness Other commercial network management tools Device discovery Automation of VLAN, and routing Coarse grained constraint checking Rest left to Home-grown tools

Why should we care? Benefits of a well documented network: Easier to make changes More informed operators are less likely to make less errors Easier to spot policy inconsistencies

Operational Insights Operators utilize templates Templates simplify and automate tasks A tool must go beyond tracking identical template to discovering and tracking modified/transformed templates Filtering, routing, and distribution are intertwined Must track references

Operational Insights (cont.) Devices have different roles A device s role is reflected by commands used in configuration file Device with identical or similar roles will have similar sets of configuration. Operators validate configuration through network operational state Use Set of packets allowed between devices (reachability set) to confirm intent

Discovering References IOS commands reference each other through label For example: an interface references an ACL through ACL s label References discovered using 2 steps: Parse configuration files and discover Labels Link stanza declaring labels with commands referencing labels

Dependency Example 1 Interface Vlan901 2 ip 128.2.1.23 255.255.255.252 3 ip access-group 9 in 4 5 Router ospf 1 6 router-id 128.1.2.133 7 passive-interface default 8 no passive-interface Vlan901 9 no passive-interface Vlan900 10 network 128.2.0.0 0.0.255.255 11 distribute-list in 12 12 redistribute connected subnets 13 14 access-list 9 permit 128.2.1.23 0.0.0.3 any 15 access-list 9 deny any 16 access-list 11 permit 128.2.0.0 0.0.255.255 Vlan901 Access-list 9 ospf 1 Access-list 12

Discovering Template & Roles A Template is a Cisco stanza that is used on several devices Template are discovered using datamining algorithms that detect code copy & pasting Roles are defined as devices with identical templates

Templates Example Config A Config B Config C Interface Vlan901 ip 128.2.1.23 255.255.255.252 ip access-group 9 in ip access-group 11 out Interface Vlan902 ip 128.2.1.28 255.255.255.252 ip ospf cost 23 no ip redirects no ip proxy-arp Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets Interface Vlan900 ip 128.2.1.26 255.255.255.252 mtu 1000 Interface Vlan901 ip 128.2.1.24 255.255.255.252 ip access-group 9 in ip access-group 11 out Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets Interface Vlan900 ip 128.2.1.25 255.255.255.252 mtu 1000 Interface Vlan902 ip 128.2.1.29 255.255.255.252 ip ospf cost 23 no ip redirects no ip proxy-arp Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets access-list 12 permit 128.2.0.0 access-list 12 permit 128.2.0.0 access-list 12 permit 128.2.0.0

Templates Example Config A Config B Config C Interface Vlan901 ip 128.2.1.23 255.255.255.252 ip access-group 9 in ip access-group 11 out Interface Vlan902 ip 128.2.1.28 255.255.255.252 ip ospf cost 23 no ip redirects no ip proxy-arp Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets Interface Vlan900 ip 128.2.1.26 255.255.255.252 mtu 1000 Interface Vlan901 ip 128.2.1.24 255.255.255.252 ip access-group 9 in ip access-group 11 out Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets Interface Vlan900 ip 128.2.1.25 255.255.255.252 mtu 1000 Interface Vlan902 ip 128.2.1.29 255.255.255.252 ip ospf cost 23 no ip redirects no ip proxy-arp Router ospf 1 router-id 128.1.2.133 passive-interface defualt no passiver-interface Vlan901 no passiver-interface Vlan900 network 128.2.0.0 0.0.255.255 distribute-list in 12 redistribute connected subnets access-list 12 permit 128.2.0.0 access-list 12 permit 128.2.0.0 access-list 12 permit 128.2.0.0

Discovering Reachability Sets Reachability set is the set of packets accepted between two end points How to discover reachability sets Simulate routing protocol convergence Calculate impact of data plane and control plane filtering on packets sent along an valid path between two subnets

Reachability Example 192.168.147/24 Router R1 Router C Deny any 192.168.145.128/25 192.168.145/24 10.1.1/24 Router R2

Uses Error Detection: Changes to underlying documentation Planning changes Understand ripple effect of a change Understanding Network Evolution Changes in dependencies Changes in templates

Current Collaborators Microsoft BBN U of Wisconsin, Madison Northwestern U of Michigan, Ann harbor U of Minnesota

Preliminary Results Vestigial Stanzas Unused ACL ACL filtering removed Subnets Routing Misconfiguration Subnet redistributed by in appropriate device

Call To Action Try out our tools on your configuration files Provide us with feedback on what you found useful Thoughts and insights are welcomed configuration file Misconfiguration data

Questions??