Nalini Elkins Introduction to TCP/IP Diagnostics (Web-based Seminar)

Similar documents
Nalini Elkins' TCP/IP Performance Management, Security, Tuning, and Troubleshooting on z/os

TCP Performance Management for Dummies

NetView for z/os V6.1 Packet Trace Analysis

Introduction to Mainframe (z/os) Network Management

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON. Ernie Gilman IBM. August 10, 2011: 1:30 PM-2:30 PM.

Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899

Cisco Configuring Commonly Used IP ACLs

How Does Ping Really Work?

Transport Layer Protocols

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Linux Network Security

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security vulnerabilities in the Internet and possible solutions

LESSON Networking Fundamentals. Understand TCP/IP

EXPLORER. TFT Filter CONFIGURATION

Solving complex performance problems in TCP/IP and SNA environments.

Attack Lab: Attacks on TCP/IP Protocols

CPS221 Lecture: Layered Network Architecture

Internet Concepts. What is a Network?

Firewalls. Network Security. Firewalls Defined. Firewalls

IP Monitoring on z/os Requirements and Techniques

Firewall Firewall August, 2003

MCSA CORE-Courses 1 & 2

CS5008: Internet Computing

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

1. Firewall Configuration

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

CA CPT CICS Programmers Toolkit for TCP/IP r6.1

TCP/IP Support Enhancements

B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit

CMPT 471 Networking II

GoToMyPC Corporate Advanced Firewall Support Features

Sage ERP Accpac Online

allow all such packets? While outgoing communications request information from a

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

BASIC ANALYSIS OF TCP/IP NETWORKS

Looking for Trouble: ICMP and IP Statistics to Watch

Overview of TCP/IP. TCP/IP and Internet

Module 1: Reviewing the Suite of TCP/IP Protocols

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Networking Basics and Network Security

ITEC310 Computer Networks II

co Characterizing and Tracing Packet Floods Using Cisco R

Firewalls Netasq. Security Management by NETASQ

VisuSniff: A Tool For The Visualization Of Network Traffic

Network Configuration Settings

Network/Internet Forensic and Intrusion Log Analysis

Firewalls. Chapter 3

Implementing Secure Converged Wide Area Networks (ISCW)

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

How To Pass The Information And Network Security Certificate

Internet Security Firewalls

Troubleshooting TCP/IP Networks with Wireshark

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

Ethernet. Ethernet. Network Devices

Configuring NetFlow Secure Event Logging (NSEL)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall Design Principles

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

CS 356 Lecture 16 Denial of Service. Spring 2013

Visualizations and Correlations in Troubleshooting

Multi-Homing Dual WAN Firewall Router

ACHILLES CERTIFICATION. SIS Module SLS 1508

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Chapter 8 Network Security

Computer Networks. Chapter 5 Transport Protocols

How do I get to

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led

Cisco Secure PIX Firewall with Two Routers Configuration Example

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

NETWORK SECURITY (W/LAB) Course Syllabus

Strategies to Protect Against Distributed Denial of Service (DD

Moonv6 Test Suite. IPv6 Firewall Functionality and Interoperablility Test Suite. Technical Document. Revision 0.6

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Zarządzanie sieciami telekomunikacyjnymi

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Seminar Computer Security

IP Filter/Firewall Setup

VERITAS Cluster Server Traffic Director Option. Product Overview

Solution of Exercise Sheet 5

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Transcription:

Nalini Elkins Introduction to TCP/IP Diagnostics (Web-based Seminar) Do you have the responsibility for TCP/IP problem resolution? When you get a trace, are you clear on what it can tell you or are you mystified? Do you want to brush up on how exactly the core Internet protocols (TCP, IP, UDP and ICMP) work? Can you tell if you have implemented your TCP profile parameters properly from traces? We will look at different packets showing various aspects of the core Internet protocols both in normal situations and in abnormal. The more experience you have with traces, the more you will become comfortable and adept at resolving many problems in the TCP/IP network. We will use case studies from real situations to see how such problems manifest themselves and have been resolved. Nalini Elkins, an experienced TCP/IP network performance expert, with many years in network management and working with IBM, will teach you practical TCP/IP diagnostic skills. You will learn how to identify protocol and performance problems, whether originating from TCP/IP system setup, application problems or hardware failures. You will receive detailed explanations on how to interpret packet traces and how to resolve problem situations. Consider this class as being dedicated to starting to understand the TCP, UDP, IP, and ICMP protocols. Audience This 1 day (two 1/2 days) web based seminar is designed for systems programmers who are responsible for troubleshooting, performance measurement, security, analysis, or tuning of their installation's TCP/IP network, socket applications and TCP/IP stack. You will leave class knowing how to read a packet trace for the core IP protocols (TCP, UDP, IP, and ICMP). Most importantly, you will have an understanding of the protocols and how they interrelate to transport data. Then, when you look at a trace you will understand what you are seeing. You can then find and eliminate potential trouble spots or problems in your TCP/IP stack, network or socket applications. This class is for you if you want to troubleshoot your TCP/IP stack, socket applications or network if you want to know how your TCP stack can be attacked if you are a novice network analyst, or new to the field of TCP/IP networking and need to learn how the core Internet Protocols work to effectively diagnose problems in your TCP/IP stack and socket applications if you are a z/os generalist and interested in learning about TCP/IP networking or analysis 03/18/09 1

Class Overview This intensive seminar is designed to provide the attendee with a basic understanding of how to use packet traces to diagnose problems with the TCP/IP network, socket applications, and TCP/IP stack. It is designed to guide you in learning the basic concepts of TCP/IP network diagnosis by teaching you a step-by-step approach to trace reading. The strength of this seminar not only comes from the information learned, but from the analysis you can perform on your own data during the seminar. Seminar Highlights Detailed explanations on how to interpret packet traces and how to fix many commonly seen problems are provided. You will learn to identify performance problems, whether originating from the TCP/IP network system setup parameters, from socket applications, or network hardware. You will learn if you have security holes in your TCP/IP stack as we have found in many systems Prerequisite A basic understanding of z/os, TCP/IP, and networks is assumed. Seminar Dates and Prices For dates and prices, please contact sales@insidethestack.com or call our office at 831-659-8360. This seminar is offered as a web-based class only. For More Information For more information on this or other seminars, including prices and locations, please contact: Inside Products, Inc. 36-A Upper Circle Carmel Valley CA 93924 Phone: 831-659-8360 Fax: 831-659-8360 Email: bill.jouris@insidethestack.com or Email: sales@insidethestack.com Web: www.insidethestack.com Please do not hesitate to call if you would like more information or details on this seminar. 03/18/09 2

Instructor Nalini Elkins, of Inside Products, Inc., (www.insidethestack.com), is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she is a formidable businesswoman. She has been the founder and cofounder of two start-ups in the high-tech arena. During her career Nalini served in groups responsible for network performance design, analysis, troubleshooting, and systems programming. The classes Nalini produces and instructs, and the products she develops are designed with the needs of systems programmers as a key requirement. Nalini has an excellent understanding for the needs of system programmers because she was in their shoes for many years. Nalini has also developed an expert system for diagnosing network hardware problems. The marketing rights for this product were sold to Boole & Babbage (which was later taken over by BMC). Nalini then joined Boole to further develop and support this product. After some time at Boole, Nalini joined some other Boole employees in co-founding a new company Applied Expert Systems. As Technical Co-founder, Nalini helped to design and develop a number of products in the SNA and TCP/IP network management area. These products included expert systems for SNA diagnostics, web performance diagnostics, TCP/IP routing diagnosis and TCP/IP network management. She was the Chief Developer of the product IBM first marketed as NetView Performance Monitor for TCP/IP. Nalini now has her own company, Inside Products, Inc. (www.insidethestack.com), which designs, develops and markets network management software. The products are Inside the Stack TCP/IP monitor, TCP Problem Finder, EE Problem Finder, SSL Problem Finder, Early Warning System, Connection Log and TCP Response Time Monitor. Inside Products also provides consulting to resolve network problems such as FTP throughput, socket application performance and TCP/IP tuning. Inside Products has international distributors in Australia, Germany, Switzerland, the United Kingdom, Belgium, Netherlands, Luxemburg and Israel. Nalini has published numerous articles in publications such as zjournal, Technical Support, Xephon s TCP/IP Update, and Enterprise Systems Journal. Nalini is also a regular speaker at SHARE, both national and regional Computer Measurement Groups (CMGs), and variety of international conferences. Nalini can be contacted directly at Nalini.elkins@insidethestack.com 03/18/09 3

Seminar Outline The following is a high level outline for this seminar. Since the seminar is constantly being updated, actual seminar content and flow may vary slightly from this outline. TCP/IP Network Performance Introduction TCP/IP network fundamentals Core Internet protocols (TCP, IP, UDP, ICMP) Common RFC s Mainframe TCP architecture (USS, socket applications, TCP/IP Profile, BPX parms) Socket applications, well-known ports (Telnet, FTP, SMTP, Web server) What can we learn with traces? How to Analyze a Trace for TCP Protocol Problems How does the TCP open sequence work? Lab: Read traces with the TCP open sequence for TN3270, CICS, WebSphere, FTP, etc. Negotiating and setting MTU, window and other parameters in the open sequence Data transmission implementation in the TCP protocol How does TCP congestion window work? How do TCP duplicate acks, retransmissions, and retransmit timers work? How does the TCP close sequence work? Lab: Read traces with the TCP close sequence (from server and client) Why is TCP reset used?. Case studies TCP/IP Profile parameters What are they? Case studies to illustrate settings Setting TCP parameters in other platforms such as Windows or Linux TCP Hacks and Security Violations What they are: TCP SYN Flood, SMURF, UDP Packet Storm, etc What part of the protocol is exploited How to prevent and detect security violations How to Analyze a Trace for UDP Protocol Problems How does the UDP protocol work? UDP flow Unnecessary UDP traffic from Windows, Linux Lab: Read traces with the NetBios UDP connections from SQL Server UDP profile parameters what are they? 03/18/09 4

How to Analyze a Trace with ICMP Protocol How does the ICMP protocol work? Lab: Read traces with ICMP protocol messages for problems caused by UDP. Lab: Read traces with ICMP protocol messages for problems caused by TCP. How to Analyze a Trace for IP Protocol Problems How does the IP protocol work? Lab: Read traces with UDP over IP protocol Lab: Read traces with TCP over IP protocol How does PATHMTUDISCOVERY work? IP profile parameters what are they? 03/18/09 5