Presentation is loading. Please wait.

Presentation is loading. Please wait.

Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.

Similar presentations


Presentation on theme: "Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain."— Presentation transcript:

1 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain the uses of network monitoring –Explain the operation of SNMP –Differentiate between SNMP and RMON –Explain the construction of MIBs –Construct a simple network monitoring strategy using SNMP commands and MIBs –Distinguish the advantages and disadvantages of network monitoring

2 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Introduction Network monitoring and management is used to ensure that: Resources are operating optimally As many faults as possible are prevented Faults are identified and fixed timely

3 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Resources & Elements NMS NMA NMS Network Management System (Station) NMA Network Management Agent NMP Network Management Protocol Resources: any device attached to the network.

4 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Network Management Protocols Network Management Protocols determine how the NMS and the NMAs will work and the information they provide and collect: –SNMP v1 –SNMP v2 –SNMP v3 (not really an NMP) –RMONv1 –RMONv2

5 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 SNMP v1 SNMP – Simple Network Management Protocol Basic operation: Polls – NMS query NMAs in devices about specific status and NMAs respond to NMS Traps – NMAs in devices inform NMS of changes in status (need to be configured) Polls and traps can occur simultaneously

6 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Structure of Management Information and MIBs The Structure of Management Information (SMI) is the way in which an NMS organises collected information. A Management Information Base (MIB) is the way in which an NMA organises the monitored information. SMI defines the managed objects and MIB is a managed object.

7 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 MIB-II Standard MIBs are defined by the MIB-II RFC (rfc 1213) and address general TCP/IP management information –Interface speeds –Maximum Transfer Unit (MTU) –Octets sent –Octets received (MIB was the original standard but was absorbed by MIB-II)

8 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 SMI object tree

9 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Other standard MIBs Other standard MIBs have been defined by the standard groups for several purposes: –ATM MIB (RFC 2515) –Frame Relay DTE Interface type MIB (RFC 2115) –Mail Monitoring MIB (RFC 2249) –DNS Server MIB (RFC 1611) Network managers are also able to design ad hoc MIBs for their network devices.

10 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 SNMP main characteristics Uses UDP as a transport protocol (port 162 for polls and 161 for traps) Security by using community names: –Read-only –Read-write –Trap SNMPv1 basic version SNMPv2 enhances SNMPv1 SNMPv3 adds security to SNMPv2

11 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 SNMP commands SNMPv1 PDU SNMPv2 PDUDirectionDescription GetRequest NMS  NMARequest value for each listed object GetRequest NMS  NMARequest next value for each listed object ------GetBulkRequestNMS  NMARequest multiple values SetRequest NMS  NMASet value for each listed object ------InformRequestNMS  NMSTransmit unsolicited information GetResponseResponseNMA  NMS NMS  NMS Respond to manager request ------Report (implemented in SNMPv3) NMS  NMSProblems with processing SNMP messages NotificationNMA  NMSAs trap but with same format as get & set TrapSNMPv2-TrapNMA  NMSTransmit unsolicited information

12 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Remote Monitoring (RMON) RMONv1 –Monitors that watch traffic on network segments in LANs or WANs –Also uses MIBs in order to organise information –Some vendors include the probing (polling) facility RMONv2 –Enhances RMONv1 by providing network and application level statistical gathering (like passive network measurement)

13 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Advantages & Disadvantages Advantages Network monitoring allows a centralised vision of all of the devices in the network Allows flexibility and mobility to network managers Disadvantages Introduces administration traffic into the network (roughly 5% of all traffic is control traffic) Needs careful planning on traps and polls in order to maintain the balance between management and bandwidth utilisation.

14 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Conclusions Network monitoring facilitates the task of managing several devices at a time The network monitoring centres need to be manned at all times for large networks and the network manager needs to be on call at all times for smaller networks SNMP provides a set of simple commands that collect a wide range of information about devices through MIBs RMON is similar to passive traffic measurement and allows minimal probing of devices

15 Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Resources SNMPv1 - RFC 1157 SNMPv2 - RFC 1905, 1906, 1907 SNMPv3 - RFC 2571, 2573, 2574, 2575 RMONv2 - RFC 2021 RFCs can be found at: http://www.ietf.org/rfc.html http://www.ietf.org/rfc.html D. R. Mauro, Essential SNMP, O’Reilly. 2001


Download ppt "Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain."

Similar presentations


Ads by Google