Title: Standards-based Secure Management of Networks, Systems, Applications and Services using SNMPv3 and HP OpenView Session #: 325 Speaker: David



Similar documents
A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

SNMP Research is located in the scenic foothills of the Great Smoky Mountains in Tennessee on a 75-acre farm overlooking the French Broad River.

A Guide to Understanding SNMP

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Network Monitoring with SNMP

Simple Network Management Protocol (SNMP) Primer

Comparison of SNMP. Versions 1, 2 and 3

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865

Simulation of an SNMP Agent: Operations, Analysis and Results

Simple Network Management Protocol

SNMP I/O Devices Make Monitoring Environmental Conditions Easy. Austin Lin Product Manager Wayne Chen Technical Service Moxa Inc.

Configuring SNMP Monitoring

W H I T E P A P E R SYSTEMS MANAGEMENT

HP Insight Management Agents architecture for Windows servers

Network Management - SNMP

Cisco CMTS Router MIB Overview

securitymodel who securityname com2sec secname ipsource community default group groupname model secname v1 v2c usm

Network Management & Monitoring Introduction to SNMP

PROACTIVE MANAGEMENT OF THE MICROSOFT WINDOWS SERVER 2003 PLATFORM

SNMP -overview. Based on: W.Stallings Data and Computer Communications

Management, Logging and Troubleshooting

Brocade Product Training

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Simple Network Management Protocol

Configuring Simple Network Management Protocol (SNMP)

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Introduction to Simple Network Management Protocol (SNMP)

MIB Explorer Feature Matrix

Monitoring Traffic manager

Technical Notes P/N Rev 01

WhatsUp Gold vs. Orion

HP OpenView Network Node Manager

Monitoring DoubleTake Availability

TNT SOFTWARE White Paper Series

SNMP Simple Network Management Protocol

NNMi120 Network Node Manager i Software 9.x Essentials

How To Understand Network Performance Monitoring And Performance Monitoring Tools

ECView Pro Network Management System. Installation Guide.

Vital Security Web Appliances NG-1100/NG-5100/NG How to Use Simple Network Management Protocol (SNMP) Monitoring

Integrated Management 2.1. Network Management Applications and Device Managers Configuration

SapphireIMS Business Service Monitoring Feature Specification

Cisco Application Networking Manager Version 2.0

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science

Network Monitoring with SNMP

Simple Network Management Protocol (SNMP) version 4.13

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

Simple Network Management Protocol

HP PCM Plus v4 Network Management Software Series

Simple Network Management Protocol

Network Management Card Security Implementation

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

How To Set Up Foglight Nms For A Proof Of Concept

Simple Network Management Protocol (SNMP) version 3.4

Abstract. An SNMP Agent for a DTV Data Server. Dinkar Bhat David Catapano James Kenealy Gomer Thomas

Configuration Commands. SNMP System Commands. engineid XRS System Management Guide Page 303 SNMP. Syntax [no] engineid engine-id

SNMP Monitoring and SWG MIB

Spotlight on Messaging. Evaluator s Guide

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Operations Manager: Network Monitoring

Alternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati

OpenView Operations Native Agent and Smart Plug-In for OpenVMS

WhatsUp Gold v11 Features Overview

Simple Network Management Protocol (SNMP)

HP OpenView Network Node Manager

User s Guide. SNMPWEBCARD Firmware Version through Revision A

SNMPV3: A SECURITY ENHANCEMENT FOR SNMP

Chapter 18. Network Management Basics

For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.

Network Management Card. User Manual

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager

SapphireIMS 4.0 BSM Feature Specification

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

SNMP Network Management Concepts

Intel Simple Network Management Protocol (SNMP) Subagent v6.0

An Overview of SNMP on the IMG

SolarWinds Certified Professional. Exam Preparation Guide

Chapter 19: Network Management. Business Data Communications, 5e

Xerox SMart esolutions. Security White Paper

Top-Down Network Design

HP Insight Management Agents. Installation Guide

SSL VPN Technical Primer

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014

Network Monitoring & Management Introduction to SNMP

11.1. Performance Monitoring

CA Spectrum and CA Performance Center

Lesson Plans Configuring Exchange Server 2007

Server & Application Monitor

Whitepaper. Business Service monitoring approach

SyncThru TM Web Admin Service Administrator Manual

Administrator s Guide

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

SystemWatch SM. Remote Network Monitoring

Configuring SNMP CHAPTER7

SNMP Reference Manual

SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3

HP PCM Plus v3 Network Management Software Series Overview

Transcription:

Title: Standards-based Secure Management of Networks, Systems, Applications and Services using SNMPv3 and HP OpenView Session #: 325 Speaker: David Reid and Steve Blizzard Company: SNMP Research 1

Topics Summary of Current Situation The Internet Standard Management Framework Management of Networks, Systems, Applications, and Services SNMPv3 with Security and Administration HP OpenView NNM and SNMPv3 Management of Networks, Systems, Applications, and Services revisited Examples 2

Current Situation Management solutions based on IETF standards have been deployed pervasively for network monitoring using SNMP, standard MIB objects, and enterprise MIB objects OpenView NNM is widely deployed as the heart of management ecosystems, in conjunction with many integrated management tools Not as widely used for configuration and control due to lack of security Most system and application management tools are proprietary 3

Deficiencies of current tools SNMPv1 and v2c are not secure, therefore: Not used for configuration Not used for system and application management Not configured for acknowledged informs System and application monitoring products are frequently not interoperable, even from same vendor Proprietary solutions do not support selecting best of breed building block components Discontinuity in adding system management to network management infrastructure No elegant way to encapsulate home-grown management tools in standards-based framework 4

The Internet Standard Management Framework Built around the Simple Network Management Protocol More than merely a protocol for moving management data - a complete framework, defined by Internet standards and consisting of: A data definition language the Structure of Management Information (SMI) Definitions of management information (Protocol Independent) - Instrumentation described in the Management Information Base (MIB) Protocol definition (MIB Independent) for SNMPv3 5

Increasing Scope The SNMP Management Framework has traditionally been used most widely for network management The scope of SNMP-based management is increasing Not only traditional network management Management of the systems connected to the network Management of the applications running on those systems Management of the services provided by those applications System and Application Management may be the most rapidly growing portion of the management software market 6

Value of Standards-based Solutions Interoperability between products from different vendors Enables selection of best of breed components Internet standards process results in a highlevel of completeness and robustness End-users may deploy management solutions in pragmatic building-block, step-by-step solutions, instead of higher-risk enterprisewide management re-architectures 7

Standardization Process SNMPv3 with security and administration is now an IETF to full standard. The IETF also moved SNMPv1 and SNMPv2c to historic status. While vendors will continue to support SNMPv1 and SNMPv2c for some time to come, SNMPv3 should be used for Internet management, as it provides security and administration that was not previously available. 8

Management of Network, Systems, Applications and Services These divisions are often arbitrary: often it is difficult to distinguish between systems and applications Is management of a service level application application management or system management Is a web server an application or a managed network service No matter where you are standing, the application is the layer above you Users care primarily about the services delivered by these applications 9

Management of Network, Systems, Applications and Services Two parts of the problem: knowing (definition and instrumentation) telling (import and export): extensible agents Systems and Applications can be designed for manageability But often are not, at least in a truly open way 10

Two implementation options Non-invasive: watch the external behavior of processes from the outside Invasive or fully-integrated: watch the internal behavior of applications from the inside Each has a time and place and they are not mutually exclusive 11

Non-invasive management It is often not timely or practical to add instrumentation for invasive monitoring of applications which were not designed for manageability In the meantime, some progress can be made in a non-intrusive manner for the monitoring and control of mission critical applications Watch mission-critical applications from the outside including distributed client-server applications Monitor processes, CPU time, memory size, etc 12

Non-Invasive management Make inferences about their health by watching the resources they consume using the instrumentation provided by the run-time environment (operating system) Start applications as children so you can catch them along with their exit codes [if and] when they die 13

Fully Integrated approach Watch applications from the inside Design for manageability Install the instrumentation inside the application to meter the appropriate data Implement MIB in the application using a user-friendly toolkit (e.g. a Subagent Development Kit) to provide direct access to the instrumentation 14

Enabling Technologies Two important enabling technologies for making systems and applications SNMP aware: MIB standards (Host Resources, System Application, etc) extensible agents (including tools to extend) 15

System Management SNMPv3 agent CPU Memory File system s Disks 16

System Management React to problems File systems filling up CPU overutilized Low memory availability Anticipate problems Watch trend of shrinking file system free space Troubleshoot Where is activity when problem is occurring? 17

Application and Service Management SNMP agent Processes Process memory use Log files Installed applications Services 18

Application Management Process management is key component of application management Example: HP OpenView Are all processes running? Is trapd.log growing? Any processes using lots of CPU? Any processes using lots of memory? ovwdb pmd trapd netmon... 19

System & Application Management Using SNMPv1 Pros Host Resources MIB (RFC 1514) provides much system information Applications MIB (RFC 2287) provides much application information Cons Security not rigorous Access control generally non-existent 20

System & Application Management Using SNMPv1:Risks If someone knows the read-write community string then they could Set your system date Set the boot device Halt processes, like inetd like can be done via the host resources MIB 21

System and Application Management with SNMPv1 Security could be better Need better administrative functions Poor performance retrieving lots of data (no get-bulk) 22

Features of SNMPv2 Expanded data types 64-bit counters Improved efficiency and performance Get-bulk operator Confirmed event notifications SNMPv1 SNMPv2 Trap Inform (acknowledged trap) 23

Features of SNMPv2 (cont d) Better error handling Request 10 MIB objects One object not available in agent Result SNMPv1 Error. nosuchname. (Even though 9 of 10 are OK.) SNMPv2 9 values returned. One nosuchvalue returned for nonexistent object. 24

SNMPv3 is key enabling technology SNMPv2 + Security 1 Administration 2 25

SNMPv3 Security User-based security model Fine-grained access control Authentication MD5 SHA Privacy (encryption) DES 3DES AES 26

User-based Security Model Defends against the following four threats Masquerade/data origin authentication Interloper assumes the identity of a sender to gain its privileges Modification of information/data integrity Alteration of in-transit messages Message stream modification Messages are re-ordered, delayed, or replayed Disclosure/data confidentiality Privileged information is obtained via eavesdropping on 27 messages

SNMPv3 Administration Fine-grained authorization and access control Remotely configurable via SNMP set operations Logical contexts 28

View-based Access Control Model access is a function of... who: securitymodel, securityname how: securitymodel, securitylevel why: read, write, notification where: contextengineid (constant), contextname what: objectname which: objectinstance 29

MIB Views Allow: (instance level granularity is optional) some groups of users to have read-only access all MIB data other groups to have read-only access to subsets of the MIB data others get read-write access to some of the data some could have read-write access to all of the data all others get no access 30

MIB Views Source-side notification Trap and inform Filtering configurable via a standard MIB module Source-side suppression of unwanted notifications 31

SNMPv3 Configuration Configure both agents and managers using SNMP sets Manually, one target at a time, or Semi-automated using configuration applications Easy-to-use tool for one target at a time (example = SNMPv3 Configuration Wizard) Policy-based configuration pushed to multiple targets (example = Simple PolicyPro) 32

SNMPv3 Configuration Wizard 33

SNMPv3 Configuration Wizard 34

SNMPv3 and HP OpenView SNMPv3 support available today using the SNMP Security Pack for HP OpenView NNM, OVPI, OVO, etc. EMANATE agent release 15.1 and above 35

Management of Networks, Systems, Applications, and Services (revisited) SNMPv3 allows you to manage what you want Securely Easily More efficiently More reliably And elegantly integrates with existing management ecosystems 36

Standards-based, Secure, Smart Agents Standards-based SNMPv3 with security and administration Standard MIBs Host Resources (RFC1514) Application (RFC 2287) Distributed Management (DISMAN) etc Secure SNMPv3 USM Authentication and privacy Smart Configure agent for distributed monitoring tasks Distributed Management (Disman) Intelligent notifications to management stations Source-side suppression Private MIB extensions Critical application monitoring Log file monitoring Service monitoring 37

Extensible SNMPv3 Agent Run-time extensible SNMP agent Add/remove modules dynamically Master agent/subagent architecture Development kit to add agent extensions (subagents) SNMPv1 SNMPv3 with security and administration Consistent tools Can be integrated with existing management products 38

Host Resources MIB RFC 2970 Information about systems and applications running on those systems Approximately 85 MIB objects Software information Software installed Software running 39

Host Resources MIB System Information Number and type of CPU(s) Processor speeds System uptime Processor load Storage and file system information Number and type of disks Disk utilization System swap configuration System memory and utilization 40

System Application MIB RFC 2287 Applications installed on the system Elements and processes that are included in an application Currently running applications Past run applications 41

Application Monitoring via NNM and sysappl MIB 42

Application Monitoring via EnterPol and sysappl MIB 43

DISMAN Event MIB Defined by the IETF distributed management working group Monitor MIB objects and perform actions based on given conditions Reduces network traffic Designed to test SNMP MIB objects Thresholds Boolean tests Existence tests 44

DISMAN Script MIB Defined by the IETF distributed management working group Monitor MIB objects and perform actions based on given conditions Reduces network traffic Uses scripts to aggregate, summarize, and transform data into useful information 45

DISMAN Schedule MIB Defined by the IETF distributed management working group Periodically perform SNMP operations at scheduled intervals 46

Remote Operations MIB Defined by the IETF distributed management working group Designed to perform ping, traceroute, and nslookup operations from a remote host Perform operations periodically and report problems 47

Critical Application Monitor Monitor an application Send a trap when the application terminates Automatically restart the application 48

NNM Application Monitoring Monitor processes via private MIB 49

NNM Application Monitoring Monitor processes via private MIB 50

Log File Monitor Examine log files Perform an action when user defined patters are encountered Perform and action when the log file exceeds a certain size Actions Send a trap Run a command and/or script 51

NNM Log File Monitoring Monitor application log files via private MIB 52

NNM Log File Monitoring Monitor application log files via private MIB 53

File System Monitor Shows current file system information (df k command) Sends notifications when a file system reaches near capacity Perform actions based on file system problems Actions include sending a trap and running a command or script 54

NNM File System Monitoring Monitor file systems via host resources or private MIBs 55

Service Monitor Determine if a service is working properly Measure the response time of a service Services include http, ftp, dns, smtp, pop3, and snmp User defined services are also supported 56

Native Agent/Subagent adapters Allows for smooth coexistence superagents and the native SNMP agent provided by the underlying operating system or other SNMP agents Other SNMP agents will work seamlessly 57

Summary The combination of HP OpenView NNM and Standards-based, Secure, Smart Agents provides functionality, security, administration, and performance needed to perform integrated management of networks, systems, applications, and services, while integrating with your existing management infrastructure. 58