780 likes | 933 Views
INFO 331 Computer Networking Technology II. Chapter 9 Network Management Glenn Booker. Network Management History. Network management didn’t exist in its current form until the 1980’s
E N D
INFO 331Computer Networking Technology II Chapter 9 Network Management Glenn Booker INFO 331 chapter 9
Network Management History • Network management didn’t exist in its current form until the 1980’s • From the ’40s to ’70s, networks were typically very homogeneous (proprietary-only), so network management tools were specific to that insular environment, if used at all • The advent of the PC and Macintosh made networks get much more heterogeneous, and increased the complexity of network management INFO 331 chapter 9
Network Management • A network typically consists of many unrelated types of equipment, which are all supposed to work together in perfect harmony, in spite of the myriad protocols, operating systems, interfaces, etc. involved • Servers and workstations • Routers, switches, and hubs • Wireless access points and hosts • Firewalls INFO 331 chapter 9
Network Management • In order to manage this mess, there is often a Network Operations Center (NOC) to coordinate maintenance, upgrades, monitoring, optimization (if you have time), repairs, etc. • Akin to a pilot’s cockpit, or the control room for a power station, or the mixing board at a concert INFO 331 chapter 9
Network Management • We need to know • What to monitor • What is worth focusing your attention on? • How to analyze what we see • How to respond to changing conditions (fix problems) • How to proactively manage the system (prevent problems) INFO 331 chapter 9
Typical Problems • Even a simple network can have challenges which help motivate the need for network management • Detect interface card failure at a host or router • The host or router might report the interface failure to the NOC • Better, network monitoring might reveal imminent failure, so the card is replaced before failure INFO 331 chapter 9
Typical Problems • Monitor traffic to guide resource deployment • Traffic patterns or congestion monitoring can show which parts of the network are most used • This could lead to improved usage of servers, simplifying physical layout or improving the speed of high traffic LAN segments, or make good upgrade decisions INFO 331 chapter 9
Typical Problems • Detect rapid routing changes • Routing can become unstable, causing rapid changes in routing tables (route flapping) • The network admin would like to know this is happening before something crashes as a result! • Host is down • Network monitoring could detect a system down before the user notices it INFO 331 chapter 9
Not this SLA! Typical Problems • Monitor SLAs • Service Level Agreements (SLAs) are contracts to guarantee specific services, such as Internet service, in terms of availability, throughput, latency, and other agreed-upon measures • Major ISPs (tier 1) can provide SLAs to major business customers • If you pay for this service, it’s nice to know if they are really providing what you paid for! Image from www.answers.com/topic/symbionese-liberation-army INFO 331 chapter 9
Typical Problems • Intrusion detection • The network admin can look for traffic from odd sources, destined for unusual ports, lots of SYN packets, and other security threats we recently covered • This can lead to refinement of filters & firewalls INFO 331 chapter 9
ISO Network Management • ISO has produced guidance on the types of network management activities • ISO network management (ISO/IEC 10733:1998) • ISO network security (ISO/IEC TR 13335:2004, ISO/IEC 18026:2009 and ISO/IEC 18028-1:2006) • See Global IHS for buying ISO standards INFO 331 chapter 9
ISO Network Management • Cisco overview white paper (free, unlike ISO standards, and summarized herein thru slide 35) • ISO identifies five areas of network management • Fault, configuration, performance, security, and accounting management INFO 331 chapter 9
ISO Network Management • Fault Management • Detect, isolate, notify, and correct faults encountered in the network • Configuration Management • Configuration aspects of network devices such as configuration file management, inventory management, and software management INFO 331 chapter 9
ISO Network Management • Performance Management • Monitor and measure various aspects of performance so that overall performance can be maintained at an acceptable level • Security Management • Provide access to network devices and corporate resources to authorized individuals • Accounting Management • Usage information of network resources INFO 331 chapter 9
Fault Management • This is the main focus of network management for most organizations • Faults are errors or problems in the network • Often a shorter term perspective than performance management • Hence fast detection of problems is critical, often via color-coded graphical network maps INFO 331 chapter 9
Fault Management • Typically want a network management platform to do: • Network discovery and topology mapping • Event handler • Performance data collection and presentation • Management data browsing • Network management platforms include HP OpenView, Aprisma Spectrum, and Sun Solstice INFO 331 chapter 9
Fault Management • Devices can send SNMP traps (RFC 3410) of events which change their status • These events are logged, such as in a Management Information Base (MIB) • Platforms can be geographically located, and communicate with each other to centralize network monitoring • Web interfaces on devices can allow remote management and configuration INFO 331 chapter 9
Fault Management • Equipment vendors often use different management systems • They can communicate using CORBA or CIM standards to exchange management data • Troubleshooting a network often uses TFTP and syslog servers • The trivial FTP (TFTP) server stores configuration files; routers and switches can send system log (syslog) messages to the syslog server INFO 331 chapter 9
Fault Management • Faults can be detected with SNMP trap events, SNMP polling, remote monitoring (RMON, RFC 2819) and syslog messages • Module changing to up or down state • Chassis alarms for hardware failures (fans, memory, voltage levels, temperature, etc.) • Responses can be just notification and logging of the event, or shutdown of that device, e.g. temps can be defined for warning, critical, or shutdown INFO 331 chapter 9
Fault Management • Fault detection can also be done at the protocol or interface levels • Such as a router interface failure • A management station polls the device to determine status or measure something (CPU usage, buffer failure, I/O drops, etc.), and flags it with an RMON alarm when the measure exceeds some threshold value INFO 331 chapter 9
Configuration Management • Configuration management (CM) tracks equipment and software in the network • Can assess which elements are causing trouble, or which vendors are preferred • What if a vendor recalls a certain device? Do you have any of them? Where? • Whose routers or switches are most reliable? • Where do you send a service vendor to replace a dead router? INFO 331 chapter 9
Configuration Management • CM data includes • Make, model, version, serial number of equipment • Software versions and licenses • Physical location of hardware • Site, building, room, rack number, etc. • Contact info for equipment owners and service vendors • Naming conventions are often used to keep names meaningful, not just yoda.drexel.edu INFO 331 chapter 9
Configuration Management • CM also includes file management • Changes to device configuration files should be carefully controlled, so that older versions can be used if the new ones don’t work • A change audit log can help track changes, and who made them • Inventory management is based on the ability to discover what devices exist, and their configuration information INFO 331 chapter 9
Configuration Management • Software management can include the automation of software upgrades across devices • Download new software images, verify compatibility with hardware, back up existing software, then load new software • Large sites may script the process and run during low activity times INFO 331 chapter 9
Performance Management • The same SNMP methods to capture fault data can be used for performance data, such as queue drops, ignored packets, etc. • These can be used to assess SLA compliance • On a larger scale, WAN protocols (frame relay, ATM, ISDN) can also collect performance data INFO 331 chapter 9
Performance Management • Performance management tools include • Concord Network Health • InfoVista VistaView • SAS IT Service Vision • Trinagy TREND • These all collect, store, and analyze data from around one’s enterprise, and typically use web-based interfaces to allow access to it from anywhere INFO 331 chapter 9
Performance Management • Increased network traffic has led to more attention to user and application traffic • RFC 4502 (replacing RFCs 2021 and 3273) defines how RMON can be used to analyze applications and the network layer, not just lower layer (e.g. MAC) protocols • Many other performance monitoring tools exist, e.g. Cisco NetFlow INFO 331 chapter 9
Security Management • Security management covers controlling access to the network and its resources • Can include monitoring user login, refusing access to failed login attempts, as well as either intentional or unintentional sabotage • Security management starts with good policies and procedures • The minimum security settings for routers, switches, and hosts is important to define INFO 331 chapter 9
Security Management • Methods for control of security at the device level (router) include • Access control lists (ACLs) and what they are permitted to do • User ID’s and passwords • Terminal Access Controller Access Control System (TACACS) • TACACS (RFC 1492) is a security protocol between devices and a TACACS server INFO 331 chapter 9
Security Management • A refinement of TACACS is TACACS+, which gives more detailed control over who can access a given device • It separates the Authentication (verify user), Authorization (control remote access to device), and Accounting functions (collect security information for network management) (AAA) INFO 331 chapter 9
Security Management • In Cisco’s world, AAA functions are managed with commands such as • aaa • tacacs-server • set authentication • set authorization • set accounting INFO 331 chapter 9
Security Management • In SNMP, configuration changes can be made to routers and switches just like from a command line • Hence strong SNMP passwords are critical! • SNMP management hosts (‘managing entities’ in Kurose) should have static IP, and sole SNMP rights with network devices (managed devices) according to a specific Access Control List (ACL) INFO 331 chapter 9
Security Management • SNMP can set router security: • Privilege Level = RO (read only) or = RW (read and write); only RW can change router settings • Access Control List (ACL) can be set to only allow specific hosts to request router management info; ACL control over interfaces can help prevent spoofing INFO 331 chapter 9
Security Management • View – controls what router data can be viewed • SNMPv3 provides secure exchange of data • Switches can restrict Telnet and SNMP via an IP Permit List INFO 331 chapter 9
Accounting Management • Accounting management measures utilization of the network so that specific groups or users can be billed correctly for snarfing up resources • Yes, it’s all about money • Data can be collected using various tools, such as NetFlow, IP Accounting, Evident Software • This can also be used to measure how well SLAs are being followed or not INFO 331 chapter 9
Other aspects of net mgmt • So network management is a huge field • We’ll focus on basic infrastructure issues • Omit service management, network administration, provisioning, and sizing networks (see TINA and TMN standards) INFO 331 chapter 9
Network Management Infrastructure • Network management is like the CEO of an organization getting status reports from middle managers, and they get status from first line managers • The CEO has to make decisions about the entire company based on this data • Corrective action may be needed, based on good or bad results obtained • The CEO of General Motors may build new plants, or shut others down INFO 331 chapter 9
Network Management Infrastructure • Network management establishes managers (called managing entities, often located in a NOC) who are allowed (via an ACL) to talk to network devices (managed devices, such as servers or routers) • Each managed device has a network management agent, who collects the desired data • Each managed device has one or more managed objects (such as network cards, memory chips, etc.) INFO 331 chapter 9
Network Management Infrastructure INFO 331 chapter 9
Network Management Infrastructure • Descriptions of all managed objects, and the devices they belong to, are collected in the Management Information Base (MIB) • A MIB is a database of managed object data • Managed devices communicate with managing entities using a network management protocol • Devices don’t generally talk to each other, but managing entities can INFO 331 chapter 9
Network Management Infrastructure • The network management protocol doesn’t manage the network per se – it just provides a means for the network admin to do so INFO 331 chapter 9
Network Management Standards • The architecture just described applies to most any network management approach • Many specific standards have been developed • The OSI CMISE/CMIP standards, used in telecommunications • In the Internet, SNMP (Simple Network Management Protocol, RFCs 3411-3418) • We’ll focus on SNMP INFO 331 chapter 9
SNMP isn’t Simple! • Derived from SGMP (RFC 1028, 1987) • Key goals of network management include • What is being monitored? • What form of control does the network administrator have? • What is the form of data reported and exchanged? • What is the communication protocol for theexchange of data? INFO 331 chapter 9
SNMP • To address these goals, SNMP has four modular parts • Network management objects, called MIB objects • The MIB tracks MIB objects • A MIB object might be a kind of data (datagrams discarded, description of a router, status of an object, routing path to a destination, etc.) • MIB objects can be grouped into MIB modules INFO 331 chapter 9
SNMP • A data definition language, SMI (Structure of Management Information) • SMI defines what an object is, what data types exist, and rules for writing and changing management information • A protocol, SNMP, for the exchange of information and commands between manager-agent and manager-manager (between two managing entities) • Security and administrative capabilities INFO 331 chapter 9
[SMI is part of MIB, so a SMI object is the same as a MIB managed object.] SMI • SMI is defined by RFCs 2578-2580 (1999) • SMI has three levels of structure • Base data types • Managed objects • Managed modules INFO 331 chapter 9
SMI • SMI Base Data Types are an extension on the ASN.1 structure (Abstract Syntax Notation One, ISO/IEC 8824:2008) • There are eleven basic data types (p. 783) • Signed and unsigned (>0) integers, IP addresses, counters, time in 1/100 second counts, etc. • Most important is the OBJECT IDENTIFIER type, which allows definition of an SMI object as some ordered collection of other data types INFO 331 chapter 9
SMI • The OBJECT IDENTIFIER is like a struct in C • Here, it names an Object • To create a managed object, the OBJECT-TYPE construct is used • Over 10,000 object-types have been defined – these are the heart of data that can be collected for network management • Analogy: OBJECT IDENTIFIER defines the class, OBJECT-TYPE instantiates the object INFO 331 chapter 9
SMI Objects • An object-type includes four fields • SYNTAX – is the data type of the object, e.g. ‘Counter32’ • MAX-ACCESS – is whether the object can be read, written, created, e.g. ‘read-only’ • STATUS – is whether the object is current, obsolete, or deprecated, e.g. ‘current’ • DESCRIPTION – gives a definition of the object, which is a long text narrative INFO 331 chapter 9
SMI Modules • The MODULE-IDENTITY construct creates a module from related objects • Fields include when it was last updated, the organization who did so, contact info for them, a description of the module, a revision entry, and description of the revision • The end of the MODULE-IDENTITY gives the ASN.1 code for the type of information in the module (often MIB-2) INFO 331 chapter 9