MUICT Network Management Application v2
MUICT Network Management Application v2
Chapter 13
Network Management Applications
Network Management: Principles and Practice
© Mani Subramanian 2000
1
Outline
◼ I. Today’s Networks & Services
◼ II. Network Management Requirements
◼ III. Network and Systems Management
◼ IV. Configuration Management
◼ V. Other Tasks of Configuration Management
◼ Performance Management
◼ Fault Management
◼ Event Correlation Techniques
◼ Security Management
◼ VI. Accounting Management
◼ VII. Policy-based Management
◼ VIII. Service Level Management
2
I. Today’s Networks & Services
Cloud, VM, Unified Communication, Social Networks, AI, HPC, HCI
(Hyperconverged Infrastructure), Security, WAF Local, Long-distance,
Oversea Phone service
World-Wide Web 080, 070, collect-call
Email, DNS, FTP third-party IN service
News, Telnet, IRC cellular, C2, PCS, TRS
RealAudio, RealVideo
MBone
MPLS SDH Access
IP Networks 4G/5G
Infiniband
Fast/Gigabit WANs SS#7 PSDN PSTN
Ethernet /VoIP
SAN
WiFi ISDN
B-ISDN IN/AIN
4
NM Functional Requirements
◼ Fault Management
❑ detection, isolation and correction of abnormal operations
◼ Configuration Management
❑ identify managed resources and their connectivity, discovery
◼ Accounting Management
❑ keep track of usage for charging
◼ Performance Management
❑ monitor and evaluate the behavior of managed resources
◼ Security Management
❑ allow only authorized access and control
FCAPS
5
Fault Management
◼ Concerned with:
❑ providing a reliable networking environment
❑ ensuring that the systems as a whole, and each essential
component individually, are in proper working order
❑ redundant components and routes can be used to increase fault
tolerance => power supply, fan, interface => redundant
equipment
7
Accounting Management
◼ Concerned with:
❑ keeping track of the usage of network resources
❑ charging the use of network resources
❑ monitoring the end-user activities for possible abuse, for
suggesting better usage to users and for network planning
8
Performance Management
◼ Concerned with:
❑ providing an efficient communication environment
❑ monitoring and analyzing the performance of the components
❑ making proper adjustments to improve network performance
9
https://www.researchgate.net/figure/Traffic-load-incoming-and-outgoing-
10
traffic-sample-monthly-and-yearly-resultslive_fig1_314282026
Security Management
◼ Concerned with:
❑ providing a secure networking environment
❑ preventing hacking, illegal and unauthorized access
❑ managing information protection and access-control facilities
11
III. Network and Systems
Management
Business
Management
Service
Management
Network System
Management Management
Element Resource
Management Management
Network System
Elements Resources
◼ Inventory Management
❑ Equipment
❑ Facilities
◼ Network Topology
◼ Database Considerations
13
Network Topology
◼ Network Topology Discovery
◼ Manual
◼ Auto-discovery by NMS using
❑ Broadcast ping
❑ ARP table in devices
◼ Mapping of network
❑ Layout
❑ Layering
◼ Views
❑ Physical
❑ Logical
14
Network Topology Discovery
163.25.145.0 163.25.146.0
140.112.8.0 140.112.6.0
163.25.146.128
163.25.147.0
140.112.5.0
192.168.13.0 192.168.12.0
15
Mapping of Network
16
Discovery in A Network
17
Node Discovery
◼ Node Discovery
❑ Given an IP Address, find the nodes in the same
network.
◼ Two Major Approaches:
❑ Use Ping (ICMP ECHO) to query the possible IP
addresses.
❑ Use SNMP (ipNetToMediaTable) to retrieve the
ARP Cache of a known node.
18
Use ICMP ECHO
163.25.147.1 alive
163.25.147.2 alive
◼ Eg: IP address: 163.25.147.12 163.25.147.3 no
Subnet mask: 255.255.255.0 163.25.147.4 no
…
◼ All possible addresses: 163.25.147.254 alive
❑ 163.25.147.1 ~ 163.25.147.254 x
❑ 163.25.0.1 – 163.25.255.254
◼ For each of the above addresses, use ICMP
ECHO to inquire the address
◼ If a node replies (ICMP ECHO Reply), then it is
found.
◼ Broadcast Ping
19
Use SNMP
ipNetToMediaPhysAddress ipNetToMediaType
ipNetToMediaIfIndex ipNetToMediaNetAddress
20
Network Discovery (1)
◼ Network Discovery
❑ Find the networks of interest with their
interconnections
◼ Key Issue:
❑ Given a network, what are the networks directly
connected with it ?
◼ Major Approach
❑ Use SNMP (ipRouteTable) to retrieve the routing
table of a router.
21
Network Discovery (2)
Default Router
Routing table
22
Network Discovery (3)
23
24
Service Discovery
25
Use TCP Connection Polling
26
tcpConnTable
27
Use SNMP
◼ If the node supports SNMP
❑ Use SNMP to query tcpConnTable
tcpConnLocalAddress tcpConnRemAddress
tcpConnState tcpConnLocalPort tcpConnRemPort
listen(2) 0.0.0.0 80 0.0.0.0 0
established(5) 163.25.149.254 23 163.25.146.22 1234
30
The Big Picture
- Monitoring Notifications
- Data collection
- Accounting
Ticket
- Change control &
monitoring
Ticket
- Capacity planning
- NOC Tools - Availability (SLAs)
- Ticket system - Trends
- Detect problems
Ticket
Ticket
- Improvements
- Upgrades
Ticket - User complaints
- Requests
- Fix problems
31
A Few Open Source Solutions…
Performance Change Mgmt Net Management
▪ Cricket ▪ Mercurial ▪ Big Brother
▪ IFPFM ▪ Rancid (routers)
▪ flowc ▪ Big Sister
▪ RCS ▪ Cacti
▪ mrtg
▪ Subversion ▪ Hyperic
▪ netflow
▪ NfSen ▪ Munin
▪ ntop Security/NIDS ▪ Nagios*
▪ pmacct ▪ Nessus ▪ Netdisco
▪ rrdtool ▪ OSSEC ▪ Netdot
▪ SmokePing ▪ Prelude ▪ OpenNMS
▪ Samhain ▪ Sysmon
SNMP/Perl/ping ▪ SNORT ▪ Zabbix
▪ Ticketing ▪ Untangle
▪ RT, Trac, Redmine
32
Inventory Management :
Documentation: Diagrams
33
Automated Systems
There are quite a few automated network
documentation systems.
❑ IPplan:
https://sourceforge.net/projects/iptrack/
❑ Netdisco:
http://netdisco.org/
❑ Netdot:
https://github.com/cvicente/Netdot
❑ Wiremaps:
https://github.com/vincentbernat/wiremaps
30
IPplan:
31
The main index page
32
33
34
Netdisco:
◼ Project launched 2003. Version 1.0 released
October 2009.
◼ Some popular uses of Netdisco:
❑ Locate a machine on the network by MAC or IP and
show the switch port it lives at.
❑ Turn Off a switch port while leaving an audit trail.
Admins log why a port was shut down.
❑ Inventory your network hardware by model, vendor,
switch-card, firmware and operating system.
❑ Report on IP address and switch port usage: historical
and current.
❑ Pretty pictures of your network.
https://metacpan.org/pod/App::Netdisco 35
36
37
38
Netdot: (1)
Includes functionality of IPplan and Netdisco and
more.
Core functionality includes:
❑ Device discovery via SNMP
❑ Layer2 topology discovery and graphs, using:
◼ CDP/LLDP (Cisco Discovery Protocol / Link Layer Discovery Protocol )
◼ Spanning Tree Protocol
◼ Switch forwarding tables
◼ Router point-to-point subnets
❑ IPv4 and IPv6 address space management (IPAM)
◼ Address space visualization
◼ DNS/DHCP config management
◼ IP and MAC address tracking
39
CISCOWORKs + (NMS)
Netdot
(NMS)
SNMP SNMP
(CISCO MIB) SNMP X SNMP
(STP MIB) SNMP X
X X
L2 SW L2 SW L2 SW
(CISCO) (Other) (Other) L2 SW L2 SW L2 SW
(CISCO) (Other) (Other)
MIB +
MIB +
STP MIB MIB +
CISCO MIB +
MIB STP MIB
MIB CISCO
MIB
MIB
Netdot: (2)
Functionality (continued):
❑ Cable plant (sites, fiber, copper, closets, circuits...)
❑ Contacts (departments, providers, vendors, etc.)
❑ Export scripts for various tools
(Nagios, Sysmon, RANCID, Cacti, etc)
◼ I.E., how we could automate node creation in Cacti!
❑ Multi-level user access: Admin, Operator, User
❑ It draws pretty pictures of your network
40
Wiremaps (1)
◼ The Wiremaps project is somewhat similar to NetDisco.
◼ L2 related information:
❑ CDP / LLDP,
❑ EDP
◼ Extreme Discovery Protocol (EDP). EDP is a vendor proprietary
protocol from Extreme Networks
❑ SONMP discovery protocols,
◼ The Nortel Discovery Protocol (NDP) formerly called SynOptics
Network Management Protocol (SONMP) is a data link layer (Layer 2)
network
❑ FDB and ARP tables
◼ The FDB (forwarding database) table is used by a Layer 2 device
(switch/bridge) to store the MAC addresses that have been learned and
which ports that MAC address was learned on
❑ Misc information like interface names.
41
Wiremaps (2)
42
Wiremaps (3)
43
VI. Accounting Management
• Least developed
• Usage of resources
• Hidden cost of IT usage (libraries)
• Functional accounting
• Business application
49
Report Management
Table 13.1 Planning and Management Reports
Category Reports
Quality of service / Network availability
Service level agreement Systems availability
Problem reports
Service response
Customer satisfaction
Traffic trends Traffic patterns
Analysis of internal traffic volume
Analysis of external traffic volume
Technology trends Current status
Technology migration projection
Cost of Operations Functional
Usage
Personnel
50
Table 13.2 System Reports
Category Reports
Traffic Traffic load - internal
Traffic load - external
Failures Network failures
System failures
Performance Network
Servers
Applications
51
VII. Policy-Based Management (1)
Network
Attributes
Policy Space
Domain Space
Rule Space
53
Policy-Based Management (3)
◼ Industry driver: Simplified and automated configuration management,
due to
❑ Increasing complexity of devices and services
❑ Lack of experienced human administrators
Goal: specify polices on a “business level” and store at single place.
◼ Standardization activities:
❑ IETF focusing on networking aspects (since 1996)
❑ DMTF, an industry consortium, focusing on enterprise computing and
networking (since 1999)
◼ Application domains
❑ Configuration for performance management (qos, utilization) and security
(encryption, authentication, access control, etc.)
❑ Routing
54
Define Policies
◼ Policies are Goal Statements
◼ Implementing Policies: Conditions and Actions
◼ Conditions
❑ Packet header
❑ External conditions
❑ User
◼ Actions
❑ Filter rules
❑ Encryption requirements
❑ Quality of service requirements
55
Examples of Network Policies
◼ Most policies can be expressed in the forms
❑ IF X THEN Y
If X holds then Y must hold.
❑ ON X IF Y THEN Z
When X occurs, if Y holds the perform Z.
◼ Examples
❑ Access control policies:
Managers of department D can access server S.
❑ Firewall policies
Packets with sender address 128.*.*.* are deleted.
❑ Admission control policies
If more than 20,000 VoIP calls in domain, block additional calls.
56
◼ If user == list of users then
allow access host = 10.34.102.104 && port =
80, 443, 22
57
Representing Policies as Tables
Sender addr Sender port Rec addr Rec port Protocol Class
Critical Change
Customer
operational Response
Responsibilities
periods Times
62