Chapt-7 Net MGT
Chapt-7 Net MGT
Net Management
1) Fault Management(FM)
2) Configuration Management(CM)
3) Accounting Management(AM)
4) Performance Management(PM)
5) Security Management(SM)
• Every syslog message contains a time stamp, level, and facility. Syslog levels are as
follows:
■ Emergency (level 0, the most severe level)
■ Alert (level 1)
■ Critical (level 2)
■ Error (level 3)
■ Warning (level 4)
■ Notice (level 5)
■ Informational (level 6)
■ Debugging (level 7)
Network Management Processes cont’d…
2) Configuration Management(CM): Controlling, operating,
identifying, and collecting data from managed devices.
• CM helps a network manager keep track of network devices and
maintain information on how devices are configured.
• It can be used to define and save a default configuration for
similar devices, modify the default configuration for specific
devices, and load the configuration on devices.
• It lets maintain an inventory of network assets and do version-
logging.
• Version-logging refers to keeping track of the version of
operating systems or applications running on network devices.
• The inventory of network assets can also include information on
the hardware configuration of devices, such as the amount of
RAM, the size of flash memory, and the type of cabling that
the devices use. Example conf. mgt…. DHCP, VLAN, VTP…
Etc
Network Management Processes cont’d…
3) Accounting Management (AM):
Accounting of network usage to allocate costs to network
users and/or plan for changes in capacity requirements.
• AM facilitates usage-based billing, whereby individual
departments or projects are charged for network
services.
• Even in cases in which there is no money exchange,
accounting of network usage can be useful to catch
departments or individuals who “abuse” the network.
• The abuse could be intentional.
• A practical reason to track unexpected traffic growth is
so that the traffic can be considered during the next
capacity-planning phase.
Network Management Processes cont’d…
4) Performance Management(PM): Analyzing traffic and application
behavior to optimize a network, meet service-level agreements,
and plan for expansion.
• PM includes examining network application and protocol behavior,
analyzing reachability, measuring response time, and recording
network route changes. Ping(ICMP), SNMP tools can be used.
• You should monitor two types of performance:
i) End-to-end performance: Measures performance across an
internetwork. It can measure availability, capacity, utilization,
delay, delay variation, throughput, reachability, response
time, errors, and the burstiness of traffic.
ii) Component performance: Measures the performance of
individual links or devices. For example, throughput and utilization
on a particular network segment can be measured. Additionally,
routers and switches can be monitored for throughput (packets
per second), memory and CPU usage, and errors.
Network Management Processes cont’d…
5) Security Management(SM): Monitoring and testing security
and protection policies, maintaining and distributing passwords
and other authentication and authorization information,
managing encryption keys, and auditing adherence to security
policies.
• SM is a process for collecting, storing, and examining
security audit logs. Audit logs should document logins and
logouts (but not save passwords) and attempts by people to
change their level of authorization.
• Collecting audit data can result in a rapid accumulation of
data.
• The required storage can be minimized by keeping data for
a short period of time and summarizing the data.
• One drawback to keeping less data, however, is that it
makes it harder to investigate security incidents.
Sec. Management Cont’d…
• In SM, Compressing the data, instead of keeping less data, is
often a better solution.
• It is also a good idea to encrypt audit logs.
-A hacker who accesses audit logs can cause a lot of damage
to
a network if the audit log is not encrypted.
-The hacker can alter the log without detection and also glean
sensitive information from the log.
• A variety of tools exist for maintaining security logs, including
Event Viewer on Windows systems and syslog on UNIX and
Cisco IOS devices.
• Most contemporary operating systems, including Windows,
Solaris, Mac OS X, and FreeBSD, support audit event
logging because of requirements in the Common Criteria for
Information Technology Security Evaluation, an international
standard for computer security certification.
Network Management Architectures
• A network management architecture consists of three major
components:
■ A managed device: A network node that collects and stores
management information. Managed devices can be routers,
servers, switches, bridges, hubs, end systems, or printers.
■ An agent: Network management software that resides in a
managed device. An agent tracks local management information
and uses a protocol such as SNMP to send information to
NMSs.
■ A network management system (NMS): Runs applications to
display management data, monitor and control managed
devices, and communicate with agents.
An NMS is generally a powerful workstation that has
sophisticated graphics, memory, storage, and processing
capabilities. The NMS is typically located in a network operations
center (NOC).
Network Management Architectures
Selecting Network Management Tools and Protocols
• You can meet most customers’ needs by recommending tools that
support SNMP and RMON (Remote Monitoring) Standards.
-Cisco Discovery Protocol (CDP) and Cisco NetFlow Accounting
are also helpful
• At a minimum, a network management solution should include
tools for isolating, diagnosing, and reporting problems to
facilitate quick repair and recovery.
• Network management tools should provide an
intuitive user interface that can react quickly to user input.
-In many cases, having both a
browser interface and command-line interface (CLI) is
beneficial.
• Management software that supports the dynamic configuration
of devices should require authentication to avoid an
unauthorized user making changes.
Simple Network Management Protocol