These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

Slides:



Advertisements
Similar presentations
Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
Advertisements

Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Implementing a Secure Console Server The Cyclades Project Co-Op Summer 2003 by Robert Perriero.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
COEN 252: Computer Forensics Router Investigation.
Voyager Server Security and Monitoring Best practices and tools.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
M ONITORING SERVER PERFORMANCE Unit objectives Use Task Manager to monitor server performance and resource usage Use Event Viewer to identify and troubleshoot.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Implementing Dynamic Host Configuration Protocol
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
An Introduction to IBM Systems Director
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
Week 7 Objectives Installing a DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
National Chi Nan University Automatic Event-Driven System for Network Management Author: Ya-Ling Wang, Arak Sae Yuan, Quincy Wu Date : 2/21/2012.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
New Delhi, India Smokeping/Cacti/Munin SANOG 10 Workshop August 29-Sep 2 – New Delhi, India Hervey Allen.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Intrusion Intrusion Detection Systems with Snort Hailun Yan 564-project.
1 Daemons & inetd Refs: Chapter Daemons A daemon is a process that: –runs in the background –not associated with any terminal Unix systems typically.
2010 These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SWATCH Chris Anderson Matt White. Swatch: Its purpose Log file watcher – Originally, Swatch was written to actively monitor messages as they are written.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Network Management Tutorial Log management. Log management and monitoring ■ What is log management and monitoring ? ■ It's about keeping your logs in.
Implementing the syslog Protocol on a Radlan router
Working at a Small-to-Medium Business or ISP – Chapter 8
CCNA Routing and Switching Routing and Switching Essentials v6.0
Module Overview Installing and Configuring a Network Policy Server
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
Chapter 4: Security Baselines
Smokeping/Cacti/Munin
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Log management AfNOG 2008 Rabat, Morocco.
Chapter 2: Basic Switching Concepts and Configuration
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 10: Device Discovery, Management, and Maintenance
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Presentation transcript:

These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license ( as part of the ICANN, ISOC and NSRC Registry Operations Curriculum. Log Management Advanced Registry Operations Curriculum

What is log management and monitoring? Keeping your logs in a secure place where they can be easily inspected. Watching your log files. They contain important information: –Lots of things happen and someone needs to review them. –It’s not practical to do this manually.

On your routers and switches Sep 1 04:40: INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp (2167) -> (6662), 1 packet Sep 1 04:42: INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 ( ) %CI-3-TEMP: Overtemperature warning Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down Sep 1 04:40: INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp (2167) -> (6662), 1 packet Sep 1 04:42: INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 ( ) %CI-3-TEMP: Overtemperature warning Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down Aug 31 17:53:12 ubuntu nagios3: Caught SIGTERM, shutting down... Aug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from port 2039 ssh2 Aug 31 17:53:12 ubuntu nagios3: Caught SIGTERM, shutting down... Aug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from port 2039 ssh2 And, your servers

Centralize and consolidate log files Send all log messages from your routers, switches and servers to a single node – a log server. All network hardware and UNIX/Linux servers can be monitored using syslog. Windows can, also, use syslog using extra tools. Save logs locally, but, also, save them to a central log server.

router switch Syslog storage syslog server syslog server

Cisco hardware –At a minimum: logging ip.of.logging.host Unix and Linux nodes –In /etc/syslog.conf, add: –Restart syslogd Other equipment have similar options –Options to control facility y level

Identify the facility that the equipment is going to use to send its messages. Reconfigure syslogd to listen to the network.  Ubuntu: add ”-r” to /etc/defaults/syslogd Add an entry to syslodg where messages are going to be written: local7.*/var/log/routers Create the file touch /var/log/routers Restart syslogd /etc/init.d/syslogd restart

Uses UDP protocol, port 514 Syslog message have two attributes (in addition to the message itself): FacilityLevel AuthSecurity|Emergency(0) AuthprivUser|Alert(1) ConsoleSyslog|Critical(2) CronUUCP|Error(3) DaemonMail|Warning(4) FtpNtp|Notice(5) KernNews|Info(6) Lpr|Debug(7) Local0...Local7|

Using facility and level you can group by category in distinct files. With software such as syslog-ng you can group by machine, date, etc. automatically in different directories. You can use grep to review logs. You can use typical UNIX tools to group and eliminate items that you wish to filter: egrep -v '(list 100 denied|logging rate-limited)' mylogfile Is there a way to do this automatically?

Simple Log Watcher –Written in Perl –Monitors logs looking for patterns using regular expressions. –Executes a specific action if a pattern is found. –Can be any pattern and any action. –Defining the patterns is the hard part.

ignore /things to ignore/ watchfor /NATIVE_VLAN_MISMATCH/ mail=root,subject=VLAN problem threshold type=limit,count=1,seconds=3600 watchfor /CONFIG_I/ mail=root,subject=Router config threshold type=limit,count=1,seconds=3600 ignore /things to ignore/ watchfor /NATIVE_VLAN_MISMATCH/ mail=root,subject=VLAN problem threshold type=limit,count=1,seconds=3600 watchfor /CONFIG_I/ mail=root,subject=Router config threshold type=limit,count=1,seconds=3600 What are these? What does it mean?

Syslog NG – Windows Event Log a Syslog: – SWATCH log watcher – – skendrick.txt – – _id=25401

?