230 likes | 368 Views
FYI VPNs and SNMP. Tahir Azim. Virtual Private Networks. Private Networks. To be used inside the organization Intranet: A private network whose access is only limited to the users inside the organization Extranet Same as the intranet, but with one addition
E N D
FYIVPNs and SNMP Tahir Azim Courtesy: Umar Kalim, NIIT
Virtual Private Networks Courtesy: Umar Kalim, NIIT
Private Networks • To be used inside the organization • Intranet: A private network whose access is only limited to the users inside the organization • Extranet • Same as the intranet, but with one addition • Some users outside the organization can also access (some or all) resources • Limitations defined by the network administrator Courtesy: Umar Kalim, NIIT
Achieving Privacy • A small organization can remain isolated • Single site • A large organization with multiple sites can have its private “internet” Courtesy: Umar Kalim, NIIT
Achieving Privacy in Hybrid Networks • Require privacy, but also need to connect to the Internet • Solution: Hybrid network Courtesy: Umar Kalim, NIIT
Drawbacks of Hybrid and Private Networks • Private & Hybrid Networks are very costly • Duplication of equipment • Leased lines for inter-site connectivity • Difficult to administer if Internet connectivity is required (as well as privacy) Courtesy: Umar Kalim, NIIT
Overview: Virtual Private Networks • Use the global Internet for Internet access as well as inter-site access, i.e. both public & private communication • R1 & R2 use VPN-tech. to guarantee privacy Courtesy: Umar Kalim, NIIT
What is a VPN? • A technology based on two techniques which guarantee privacy • Tunneling • Simple • TLS/SSL • IPSec • Authentication Header (AH) • Encrypted Security Payload (ESP) Courtesy: Umar Kalim, NIIT
Tunneling • VPN specifies that each IP datagram destined for a private use in the organization must be encapsulated inside another datagram Actual source and destination Routers connecting the two sites Courtesy: Umar Kalim, NIIT
Addressing in VPN Courtesy: Umar Kalim, NIIT
Simple Network Management Protocol Courtesy: Umar Kalim, NIIT
SNMP • A framework for managing devices in an internet using the TCP/IP protocol suite • It provides the fundamental operations for monitoring and maintaining an internet • Application level protocol • So that it may monitor devices made by different manufacturers, installed on different networks • Limitations of the type of the network as well as the type of the device is removed Courtesy: Umar Kalim, NIIT
Concept of SNMP • Uses the concept of a manager and an agent • Manager is the host that controls/monitors a (set of) agent(s) • Agents are hosts that are being monitored • Mostly routers Courtesy: Umar Kalim, NIIT
Manager and Agents • Manager runs the SNMP client • Agent runs the SNMP server • Management is achieved by the simple interaction b/w the client and the server • Agents maintain information about parameters affecting performance • e.g. # of packets received, # of packets forwarded etc • The Manager has access to these parameters • Manager can also have the agent perform certain actions • e.g. Reboot the router Courtesy: Umar Kalim, NIIT
Manager and Agents • Agents can also contribute to the management process • The server program checks the parameters for certain defined thresholds • If a threshold is reached, or there is some unusual activity, the agent sends a warning message (called a trap) to the manager Courtesy: Umar Kalim, NIIT
Concept of SNMP • Manager checks an agent by requesting information that reflects the behaviour of the agent • A manager can force an agent to perform a task (by resetting certain values in the agents database) • An agent can help in the management by generating trap messages/warning in case of an unusual activity Courtesy: Umar Kalim, NIIT
Management Components • SNMP uses two other protocols to achieve its objectives • Structure of Management Information (SMI) • Management Information Base (MIB) Courtesy: Umar Kalim, NIIT
Role of SNMP • It defines the format of the packet to be sent from a manager to an agent and vice versa • Packets exchanged contain object names and their status • SNMP is responsible for reading and changing these values • It interprets the results and creates statistics (often using other s/w) Courtesy: Umar Kalim, NIIT
Role of SMI • To use SNMP we require rules • To name objects using a uniform convention for open access • To define what type of objects can be used (simple or structured, which simple types are available, their sizes etc), again for open access • SMI defines such rules • How to define objects • How to list their types Courtesy: Umar Kalim, NIIT
Role of MIB • For each entity to be managed, we must define • The number of objects • Name them • Associate a type with each • MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed Courtesy: Umar Kalim, NIIT
An Analogy to understand the relationship • Before we write a computer program, the syntax must be defined. Also, the available data types must be defined etc [SMI] • Declaration of variables in the program [MIB] • Write code to read, change the variables, interpret their meaning etc [SNMP] Courtesy: Umar Kalim, NIIT
Operational Overview Courtesy: Umar Kalim, NIIT
THE END! Good Luck! Courtesy: Umar Kalim, NIIT