190 likes | 365 Views
The Evolution of Network Configuration: A Tale of Two Campuses Hyojoon Kim † , Theophilus Benson ‡ Aditya Akella ‡ , Nick Feamster † † Georgia Tech ‡ University of Wisconsin, Madison. What is Network Configuration?. Collection of configuration files Express network policy
E N D
The Evolution of Network Configuration: A Tale of Two Campuses Hyojoon Kim†, Theophilus Benson‡ AdityaAkella‡, Nick Feamster† †Georgia Tech ‡University of Wisconsin, Madison
What is Network Configuration? • Collection of configuration files • Express network policy • Determines the overall network behavior
The Network State Changes • Topology change • Policy change Configuration change Growth of firewalls in Georgia Tech How does network configuration change over time?
Configuration Changes What are causing the changes? Where are the changes happening? Line changes in the past 5 years Is there a noticeable pattern?
Our Contribution • Examine change patterns over time • Look at many different types of devices • Provide better understanding • Help develop better configuration tools • e.g., Change recommendations, feedbacks • Reduce misconfigurations
Our Data • Configuration data from two campus networks • 5 years of accumulated configuration files • Tools • CVS • RANCID (Really Awesome New Cisco confIgDiffer)
Collecting Configuration Files … Pull configuration Remote login (telnet, ssh) RANCID CVS commit CVS Server
Revision Control on Configuration Files ... 1.51 log @Fri Feb 5 15:04:28 EST 2010 @ text @a141 1 port-object range bootpsbootpc a160 4 object-group service 12-123-12-13-any-udp udp port-object range bootpsbootpc object-group service 12-123-12-14-any-udp udp port-object range bootpsbootpc d173 16 a188 9 object-group service 13-14-15-16-any-udp udp port-object range bootpsbootpc object-group service 14-15-16-17-any-udp udp ... RCS Format • When is the change? • What changed? • Regenerate each revision
Our Approach Take latest snapshot Snapshot Analysis Compare revisions Change Analysis Longitudinal Analysis Sort revisions by time Data (RCS) Revisions Group simultaneous changes Correlation Analysis
Classifying Configuration lines logging buffered 1024000 enable secret [deleted] username [deleted] aaa new-model … Interface Port-channel1 description WiSM-A virtual channel switchport trunk encapsulation dot1q switchport trunk allowed vlan 316,805,807-809,816,1296,1312 switchport mode trunk … router ospfxxxx router-id x.x.x.x … ip access-list extended access-vty-in permit tcp x.x.0.0 0.0.255.255 any range 22 telnet log-input permit tcp x.x.0.0 0.0.255.255 any range 22 telnet log-input … Management Layer 1 Layer 2 VLAN Layer 3 ACL Security Control Filter QoS
Overview of Results • Routers are multi-functional • Univ. of Wisc: Layer 3 changes are 30% of total changes • Georgia Tech: Layer 3 changes are 5% of the total changes • Firewall changes are concentrated on ACL • Around 87% of the total changes • Steep increase in the access control list lines • Switches are about providing connectivity • Port-centric changes
Change Analysis on Routers 78% Static ARP Number of line changes in all routers over 5 years - GT
Change Analysis on Firewalls 87% Access Control Number of changes in all Georgia Tech firewalls over 5 years
Longitudinal Analysis on Firewalls Change in number of Lines in all Georgia Tech firewalls Change in number of firewalls in Georgia Tech
Change Analysis on Switches snmp trap Number of line changes in all switches in Univ. of Wisconsin
Conclusion • Study on how network configuration changes over time • Reveal interesting characteristics about network changes • Magnitude and frequency of changes • Causes of changes
Conclusion • Provide better understanding • Improve current methods of configuring and managing network devices • Change recommendations • Reduce misconfigurations • More automation Questions? joonk@gatech.edu