Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management.

Slides:



Advertisements
Similar presentations
Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Network Operations and Network Management.
Syslog and log files1-1 Syslog and Log Files  From logfiles, you can find m important information m History m Errors/warnings  Logging policies m Reset.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
COEN 252: Computer Forensics Router Investigation.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Maintaining Host Security Logs.  Security logs are invaluable for verifying whether the host's defenses are operating properly.  Another reason to maintain.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
System Administration: Linux Track 2 Workshop June 2010 Pago Pago, American Samoa.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
New SA Training Topic 9: Logging, Monitoring, and Performance  Logging  Windows – “Auditing”  Linux – syslog  Monitoring  MRTG  Big Brother  Performance.
NMS Labs Mikko Suomi LAB1 Choose SNMP device managment software Features: –Gives Nice overview of network –Bandwith monitoring –Multible.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
1. 2 Device management refers to the IDS Sensor's ability to dynamically reconfigure the filters and access control lists (ACL) on a router, switch, and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
Cisco Router Hardware Software overview. In this lecture we will investigate an overview of Cisco router hardware and software. We will first turn our.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
FORESEC Academy FORESEC Academy Security Essentials (III)
Cisco Configuration Elements Network Monitoring and Management Tutorial.
CVS – concurrent versions system Network Management Workshop intERlab at AIT Thailand March 11-15, 2008.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
CENT 305 Information Systems Security Overview of System Logging syslog 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Security monitoring boxes Andrew McNab University of Manchester.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
National Chi Nan University Automatic Event-Driven System for Network Management Author: Ya-Ling Wang, Arak Sae Yuan, Quincy Wu Date : 2/21/2012.
NetSearch: Googling Large-scale Network Management Data GROUP 2 MEMBERS SAMUEL LAWER WENBO HAN HUAN YAN PEI YAN SHREY YADAV SHUAI YU SHINE PANDITA.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 Daemons & inetd Refs: Chapter Daemons A daemon is a process that: –runs in the background –not associated with any terminal Unix systems typically.
Routing Basics Chapter 8. powered by DJ 1. C HAPTER O BJECTIVES At the end of this Chapter you will be able to:  Understand routing basics. powered by.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
SWATCH Chris Anderson Matt White. Swatch: Its purpose Log file watcher – Originally, Swatch was written to actively monitor messages as they are written.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
Network Management Tutorial Log management. Log management and monitoring ■ What is log management and monitoring ? ■ It's about keeping your logs in.
Implementing the syslog Protocol on a Radlan router
CCNA Routing and Switching Routing and Switching Essentials v6.0
Network Operations and Network Management
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
ITIS 3110 IT Infrastructure II
Smokeping/Cacti/Munin
Introduction to the Junos Operating System
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Chapter 10: Device Discovery, Management, and Maintenance
Cisco configuration elements
CCNA Routing and Switching Routing and Switching Essentials v6.0
Log management AfNOG 2008 Rabat, Morocco.
Chapter 2: Basic Switching Concepts and Configuration
Chapter 10: Device Discovery, Management, and Maintenance
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Daemons & inetd Refs: Chapter 12.
Presentation transcript:

Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management

Log management and monitoring ■ What is log management and monitoring ? ■ It's about keeping your logs in a safe place, putting them where you can easily inspect them with tools ■ Keep an eye on your log files ■ They tell you something important... ● Lots of things happen, and someone needs to keep an eye on them... ● Not really practictal to do it by hand!

Log management and monitoring ■ On your routers and switches ● Sep 1 04:40: INDIA: %SEC-6-IPACCESSLOGP: list 100 denied tcp (2167) -> (6662), 1 packet ● Sep 1 04:42: INDIA: %SYS-5-CONFIG_I: Configured from console by pr on vty0 ( ) ‏ ● %CI-3-TEMP: Overtemperature warning ● Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down ■ On your servers as well ● Aug 31 17:53:12 ubuntu nagios2: Caught SIGTERM, shutting down... ● Aug 31 19:19:36 ubuntu sshd[16404]: Failed password for root from port 2039 ssh2

Log management ■ First, need to centralize and consolidate log files ■ Log all messages from routers, switches and servers to a single machine – a logserver ■ All logging from network equipment and UNIX servers is done using syslog ■ Windows can be configured to use syslog as well, with some tools ■ Log locally, but also to the central server

Centralized logging Local disk server syslog routerswitch Syslog storage Syslog server

Configuring centralized logging ■ Cisco equipment ● Minimum:  logging ip.of.log.host ■ UNIX host ● Edit /etc/syslog.conf ● Add a line ● Restart syslogd ■ Other equipments have similar options ● Options to control facility and level

Receiving the messages ■ Identify the facility that the SENDING host or device will send their message on ■ Reconfigure syslogd to listen to the network (on Ubuntu/Debian: add ”-r” to /etc/defaults/syslogd ■ Add an entry to syslogd indicating where to write messages: ● local7.*/var/log/routers ■ Create the file: ● touch /var/log/routers ■ Restart syslogd ● /etc/init.d/sysklogd restart

Syslog basics ■ UDP protocol, port 514 ■ Syslog messages contain: ● Facility: AuthLevel:Emergency(0) Authpriv|Alert(1) Console|Critical(2) Cron|Error(3) Daemon|Warning(4) Ftp|Notice(5) Kern|Info(6) LprMail|Debug(7) News Ntp | SecuritySyslog UserUUCP Local0...Local7

Sorting logs ■ Using facility and level, sort by category into different files ■ With tools like syslog-ng, sort by host, date,... automatically into different directories ■ Grep your way through the logs. ■ Use standard UNIX tools to sort, and eliminate, things you want to filter out: ● egrep -v '(list 100 denied|logging rate- limited)' mylogfile ● Is there a way to do this automatically ?

SWATCH ■ Simple Log Watcher ● Written in Perl ● Monitors log files, looking for patterns (”regular expressions”) to match in the logs ● Perform a given action if the pattern is found

Sample config ■ watchfor /%LINK-3-UPDOWN/ mail addresses=inst,subject=Link updown throttle 1:00 watchfor /%SEC-6-IPACCESSLOGP/ exec /usr/bin/echo $* >> /tmp/accesslist.log watchfor /%SYS-5-CONFIG/ mail addresses=inst,subject=Configuration of router

References ■ ■ Syslog NG ● ■ Windows Event Log to Syslog: ● ents/UNIX/evtsys ■ SWATCH log watcher ● ● -swatch-skendrick.txt ● ● d=5332&group_id=25401

Questions ? ?