140 likes | 150 Views
This comprehensive guide explores passive monitoring techniques like packet capturing, sampling, flow generation, and flow technologies like NetFlow and sFlow. Learn about effective data collection, processing high-speed packets, flow data generation, and equipment supporting sFlow.
E N D
Probe system Probe system Splitting Mirroring 5. Passive Monitoring - Packet Capturing • Packets can be captured using Port Mirroring or Network Splitter (Tap)
5. Passive Monitoring - Packet Capturing • Difficulties in packet capturing • Massive amount of data • How much packet data is generated from 100 Mbps network in an hour? Port speed ⅹIn&Out ⅹLink Utilization ⅹ sec/hour = throughput 100 Mbps ⅹ 2 ⅹ 0.5 ⅹ 3600 = 360 Gbps Throughput / avg. packet lengthⅹ bytes of packet data = data size 360 Gbps / (1500 ⅹ 8) ⅹ 30 = 1 Gbyte • Processing of high-speed packets • Processing time for 100 Mbps network • Port speed ⅹ In&Out ⅹ Link Utilization / average packet length = 8333 packets/sec => 0.12 msec/packet
5. Passive Monitoring - Sampling • If the rate is too high to capture all packets reliably, there is no alternative but to sample the packets • Sampling algorithms: every Nth packet or fixed time interval 1 2 3 4 5 6 7 8 9 10 11 (a) 2:1 sampling 0 msec 1 msec 2 msec 3 msec 4 msec (b) 1 msec sampling
5. Passive Monitoring - Flow Generation • Flowis a collection of packets with the same{SRC and DST IP address, SRC and DST port number, protocol number, TOS} • Flow data can be collected from routers directly, or standalone flow generator having packet capturing capability • Popular flow formats • NetFlow (Cisco), sFlow (sFlow.org), IPFIX (IETF) • Issues in flow generation • What information should be included in a flow data? • How to generate flow data from raw packet information efficiently? • How to save bulk flow data into DB or binary file in a collector? • How long should the data be preserved? flow 1 flow 2 flow 3 flow 4
5. Passive Monitoring - Flow Technology: NetFlow • Cisco NetFlow • is an option configurable in Cisco routers that exports data on each IP flow passed through an interface • Cisco IOS NetFlow technology • is an integral part of Cisco IOS software that collects and measures data as it enters specific routers or switch interfaces • enables to perform IP traffic flow analysis without custom probes • 3 key components in a NetFlow system • Flow Exporter • Flow Collector • Network Data Analyzer (Flow Analyzer)
5. Passive Monitoring - Flow Technology: NetFlow • NetFlow Export Datagram • Version 1, Version 5, Version 7, Version 8 • Version 1: original format supported in the initial Cisco IOS software releases. • Version 5: Header · Sequence number · Record count · Version number Flow Record Flow Record Flow Record Flow Record Flow Record From/To • Packet Count • Byte Count • Source IP Address • Destination IP Address Usage • Start Timestamp • End Timestamp • Source TCP/UDP Port • Destination TCP/UDP Port Time of Day Application • Input Interface Port • Output Interface Port Port Utilization • Next Hop Address • Source AS Number • Dest. AS Number • Source Prefix Mask • Dest. Prefix Mask Routingand Peering • Type of Service • TCP Flags • Protocol QoS
5. Passive Monitoring - Flow Technology: NetFlow • Version 7 • Enhancement that supports Cisco Catalyst 5000 Series switches equipped with NetFlow Feature Card (NFFC). • Version 8 • developed mainly to MINIMIZE output size from exporter by adding Router-Based Aggregation schemes type UDP datagramrecords/datagrammax udp pktsize ASMatrix 51 1456 ProtocolPortMatrix 51 1456 SourcePrefixMatrix 44 1436 DestPrefixMatrix 44 1436 PrefixMatrix 35 1428 • available on Cisco routers from IOS release 12.0(3)T
5. Passive Monitoring - Flow Technology: sFlow • sFlow is described in RFC 3176: “InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks” • sFlow is a monitoring technology that gives visibility into the use of networks, enabling performance optimization, accounting/billing for usage, and defense against security threats • sFlow provides an effective means of embedding traffic monitoring in high-speed switches and routers • sFlow samples packets using statistical sampling theory
5. Passive Monitoring - Flow Technology: sFlow • sFlow Datagram Format • is specified using the XDR standard • XDR is a standard for the description and encoding of data. (eXternal Data Representation Standard, RFC1014) • version 4 • Packet Header Data • Header Protocol (Format of sampled header) • Frame_length • Header bytes • Packet IP v4 Data • Length • Protocol (IP Protocol Type) • src_ip / dst_ip • src_port / dst_port • TCP flags • tos • Packet IP v6 Data • Length • IP next Header • src_ip / dst_ip • src_port / dst_port • TCP flags • IP priority
5. Passive Monitoring - Flow Technology: sFlow • Equipment Supporting sFlow • Foundry Networks • BigIron, FastIron, NetIron Series • InMon’s sFlow Probe • By attaching to a monitor/SPAN port • Gathers mirrored or tapped (using a splitter) traffic data • The resulting data is forwarded in sFlow datagrams to a central sFlow collector (for example InMon Traffic Server) for analysis. Source: InMon
5. Passive Monitoring - Flow Technology: IPFIX • IPFIX (IP Flow Information eXport) Working Group • http://www.ietf.org/html.charters/ipfix-charter.html • Background • There are a number of IP flow export systems in common use • These systems differ significantly, even though some have adopted a common transport mechanism • such differences make it difficult to develop generalized flow analysis tools • Goal • To produce a standard method for exporting flow info from network devices, as an eventual replacement for the various proprietary methods in use now
5. Passive Monitoring - Flow Technology: IPFIX • IPFIX Internet Drafts • Requirements for IP Flow Information Export • J. Quittek et al., Jan 2003 (work in progress) • Architecture Model for IP Flow Information Export • K.C. Norseth, G. Sadasivan, June 2002 (work in progress) • Early stage of work….
5. Passive Monitoring - Traffic Analysis • Spatialaspect • The patterns of traffic flow relative to the network topology • Important for proper network design and planning • Identification of bottleneck & avoidance of congestion • Example: Flow aggregation by src, dst IP address or AS number • Temporalaspect • The stochastic behavior of a traffic flow, usually described in statistical terms • Important for resource management and traffic control • Important for traffic shaping and caching policies • Example: Packet or byte per hour, day, week, month • Compositionof traffic • A breakdown of traffic according to the contents, application, packet length, flow duration • Helps to explain its temporal and spatial characteristics • Example: game, streaming media traffic for a week from peer ISP